@[email protected] to [email protected]English • 2 years ago[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.comexternal-linkmessage-square19fedilinkarrow-up1100cross-posted to: [email protected][email protected][email protected]
arrow-up1100external-link[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.com@[email protected] to [email protected]English • 2 years agomessage-square19fedilinkcross-posted to: [email protected][email protected][email protected]
minus-square@[email protected]linkfedilinkEnglish8•2 years agoIf the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
minus-square@[email protected]OPlinkfedilink3•edit-22 years agoMost users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.
If the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
Most users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.