Categories: The Verge

Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company’s Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users “into clicking a malicious link inside a Markdown file opened in Notepad,” as reported earlier by The Register.

Clicking the link would “launch unverified protocols,” allowing attackers to remotely load and execute malicious files on a victim’s computer, according to the patch notes. Microsoft says there isn’t any evidence of attackers exploiting the Notepad vulnerability (CVE-2026-20841) in the wild, but it issued a fix for …

Read the full story at The Verge.

rssfeeds-admin

Share
Published by
rssfeeds-admin

Recent Posts

Greta Gerwig Narnia Movie Lands Wide Theatrical Premiere from Netflix With Early 2027 Release Date

Netflix is officially bringing Barbie director Greta Gerwig back to theaters with a release date…

34 seconds ago

Academy Awards Rule Updates Tackle AI, Multiple Nominations for the Same Actor, and More Ahead of 99th Oscars

The Academy of Motion Pictures Arts and Sciences has revealed a collection of major rule…

59 seconds ago

Crimson Desert Player Takes a Dragon Ride Out of Bounds, Discovers Previously Unseen Parts of Pywel

An intrepid Crimson Desert player has ventured far out of bounds and discovered a deserted…

1 minute ago

Surfshark’s 8th Birthday Deal Means Big Savings on VPN Protection for Unlimited Devices

There are a ton of VPN options out there, but they’re not all created equally.…

59 minutes ago

Save Over $100 On the Highly Rated Bluetti AC70 768Wh 1,000W LiFePO4 Power Station

Bluetti is well known for its high quality yet affordable power stations and solar generators.…

59 minutes ago

Everything Coming to Apple TV in May 2026

Despite reports that it's far from the most lucrative part of the Apple ecosystem, Apple…

60 minutes ago

This website uses cookies.