TheAnonymouseJoker@lemmy.ml to Technology@lemmy.mlEnglish · 2 years ago[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.comexternal-linkmessage-square19linkfedilinkarrow-up199arrow-down115file-textcross-posted to: privatelife@lemmy.ml
arrow-up184arrow-down1external-link[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.comTheAnonymouseJoker@lemmy.ml to Technology@lemmy.mlEnglish · 2 years agomessage-square19linkfedilinkfile-textcross-posted to: privatelife@lemmy.ml
minus-squareXtallll@lemmy.blahaj.zonelinkfedilinkEnglisharrow-up9·2 years agoIf the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
minus-squareTheAnonymouseJoker@lemmy.mlOPlinkfedilinkarrow-up4arrow-down6·edit-22 years agoMost users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.
If the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
Most users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.