Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows Notepad | 11.0.0 ~ 11.2512 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC | https://github.com/BTtea/CVE-2026-20841-PoC | POC Details |
| 2 | CVE-2026-20841 - Windows notepad.exe RCE | https://github.com/RajaUzairAbdullah/CVE-2026-20841 | POC Details |
| 3 | PoC for the "Windows Notepad RCE" | https://github.com/tangent65536/CVE-2026-20841 | POC Details |
| 4 | None | https://github.com/patchpoint/CVE-2026-20841 | POC Details |
| 5 | None | https://github.com/uky007/CVE-2026-20841_notepad_analysis | POC Details |
| 6 | None | https://github.com/atiilla/CVE-2026-20841 | POC Details |
| 7 | CVE-2026-20841 | https://github.com/dogukankurnaz/CVE-2026-20841-PoC | POC Details |
| 8 | PoC for a remote code execution flaw in Windows Notepad's markdown renderer. The markdown engine does not restrict URL protocols, allowing arbitrary protocol handlers to be triggered via clickable links | https://github.com/SecureWithUmer/CVE-2026-20841 | POC Details |
| 9 | Proof of Concept for CVE-2026-20841 | https://github.com/hackfaiz/CVE-2026-20841-PoC | POC Details |
| 10 | None | https://github.com/EleniChristopoulou/PoC-CVE-2026-20841 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-21531 | 9.8 CRITICAL | Azure SDK for Python Remote Code Execution Vulnerability |
| CVE-2026-21537 | 8.8 HIGH | Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability |
| CVE-2026-21510 | 8.8 HIGH | Windows Shell Security Feature Bypass Vulnerability |
| CVE-2026-21516 | 8.8 HIGH | GitHub Copilot for Jetbrains Remote Code Execution Vulnerability |
| CVE-2026-21513 | 8.8 HIGH | MSHTML Framework Security Feature Bypass Vulnerability |
| CVE-2026-21255 | 8.8 HIGH | Windows Hyper-V Security Feature Bypass Vulnerability |
| CVE-2026-21518 | 8.8 HIGH | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability |
| CVE-2026-21256 | 8.8 HIGH | GitHub Copilot and Visual Studio Remote Code Execution Vulnerability |
| CVE-2026-21228 | 8.1 HIGH | Azure Local Remote Code Execution Vulnerability |
| CVE-2026-21257 | 8.0 HIGH | GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability |
| CVE-2026-21229 | 8.0 HIGH | Power BI Remote Code Execution Vulnerability |
| CVE-2026-21523 | 8.0 HIGH | GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability |
| CVE-2026-21250 | 7.8 HIGH | Windows HTTP.sys Elevation of Privilege Vulnerability |
| CVE-2026-21259 | 7.8 HIGH | Microsoft Excel Elevation of Privilege Vulnerability |
| CVE-2026-21533 | 7.8 HIGH | Windows Remote Desktop Services Elevation of Privilege Vulnerability |
| CVE-2026-21514 | 7.8 HIGH | Microsoft Word Security Feature Bypass Vulnerability |
| CVE-2026-21231 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2026-21238 | 7.8 HIGH | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
| CVE-2026-21236 | 7.8 HIGH | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
| CVE-2026-21239 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
Showing top 20 of 54 CVEs. View all on vendor page → →
No comments yet