WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April

Vulnerability allows hackers to execute malicious code when targets open malicious ZIP files.

https://arstechnica.com/security/2023/08/winrar-0-day-that-uses-poisoned-jpg-and-txt-files-under-exploit-since-april/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April

Vulnerability allows hackers to execute malicious code when targets open malicious ZIP files.

Ars Technica
@arstechnica people still use it?? #7zip
@ryan2one3 @arstechnica I feel like most people don’t know/care alternatives exist, even if they’re better. They know winrar and change is hard, so they use it to their dying days!!
@benjamincodes @arstechnica I wonder if they paid for it too. LOL
@ryan2one3
@arstechnica if it ain't broke, don't fix it. But now it's broke, so time for a change
@arstechnica so is this the punishment for nobody buying it?
@arstechnica WinRAR? It's been 20 years since I thought about WinRAR. Who uses it still?
@arstechnica …why is there a 4 in the binary?

@arstechnica

This is punishment from God for never registering that software, despite being reminded to do so every time you launch it!