Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 3 months agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square34fedilinkarrow-up1170arrow-down14file-textcross-posted to: [email protected]
arrow-up1166arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 3 months agomessage-square34fedilinkfile-textcross-posted to: [email protected]
minus-squareryannathanslinkfedilinkarrow-up5arrow-down6·3 months agoGoing to rely on security through obscurity instead?
Going to rely on security through obscurity instead?