new CVE
Look inside
Its unsanitized text input
new CVE
Look inside
Its unsanitized text input

We may be laughing now, but Microslop is going to roll out 10-factor authentication on Shithub because of this.
for security reasons your readme must be in docx format
.DOCM None of that macro free bs
Shithub
What are good alternatives if any
codeberg and gitlab come to mind
Forgejo is really easy to operate if you already have a server.
Codeberg is a large public Forgejo instance.
There is also https://tangled.org/ which I've meant to look into for a while but never gotten around to. I think it's promising but it's still alpha software. Forgejo and Gitea before it have been around for almost 10 years altogether.
hilarious
or maybe it was just a backdoor that the wrong person noticed
The 3 people who reported it are:
Cristian Papa, Romanian in Romania,
Alasdair Gorniak, slav (?) in the UK,
Chen, Chinese person, https://x.com/chen9918b/status/2015688020356407548, "Chinese history and culture enthusiasts & market analysis"
its so over for the Amerikkkans. Can't even install remote code execution backdoors in peace.
wtf version of notepad even lets you create clickable hyperlinks in the first place?
My main uses for notepad:
Second clipboard I can paste stuff into without worrying about consequences.
Paste formatted text into notepad and copy it immediately to strip away formatting.
You can paste without formatting with ctrl + shift + V
✨ sometimes ✨
So AI slop coding is going great!
win11 shitty notepad or all notepad?
The former. Classic notepad would never support clickable links
The Windows Notepad app has a glaring vulnerability. It sends all your contained data to some Microsoft AI if you click the wrong button.
The US has lost the AI race.
I'm not a tech guy so I don't know why I - cough - clicked the link. I assumed I wouldn't be able to understand anything. But after taking a ~10 second gander at the page I saw this and it made me laugh.
How could an attacker exploit this vulnerability?
An attacker could trick a user into clicking a malicious link inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.
On the road to fully automated luxury gay space communism.
Spreading Linux propaganda since 2020
Rules: