@TheAnonymouseJokerM to TechnologyEnglish • 8 months ago[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.comexternal-linkmessage-square19arrow-up1100arrow-down115file-textcross-posted to: technology@lemmy.worldprivatelifehackernews@derp.foo
arrow-up185arrow-down1external-link[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.com@TheAnonymouseJokerM to TechnologyEnglish • 8 months agomessage-square19file-textcross-posted to: technology@lemmy.worldprivatelifehackernews@derp.foo
minus-square@Xtallll@lemmy.blahaj.zonelinkfedilinkEnglish9•8 months agoIf the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
minus-square@TheAnonymouseJokerOPMlink-3•edit-28 months agoMost users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.
If the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
Most users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.