Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with VenomRAT

A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability on GitHub with an aim to infect users who downloaded the code with VenomRAT malware. "The fake PoC meant to exploit this WinRAR vulnerability was based on a publicly available PoC script that exploited a SQL injection vulnerability in an application called GeoServer, which is tracked as

Posted from: Click here for the full article.

留言

此網誌的熱門文章

Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems

OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation

Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk