{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreicrt2n32idqiw62k26x7k6rbb3flezs4atzdzlzhqlzrfrtqcpgjy",
"uri": "at://did:plc:yao7hyhhhxmtkcmsycnrlykz/app.bsky.feed.post/3men6qqhnygi2"
},
"path": "/post/20660452",
"publishedAt": "2026-02-11T11:35:59.000Z",
"site": "https://rblind.com",
"tags": [
"Technology",
"als",
"40 comments",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841"
],
"textContent": "submitted by als to technology\n560 points | 40 comments\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841\n\nThey finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.\n\nThis CVE is an 8.8 severity RCE in Notepad of all things.\n\nApparently, the “innovation” of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.\n\nWe have reached a point where the simple act of opening a .md file in a native utility can compromise your system.",
"title": "A remote code execution vulnerability has been found in Microslop Notepad"
}