Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 8 days agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square33fedilinkarrow-up1129arrow-down13file-text
arrow-up1126arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 8 days agomessage-square33fedilinkfile-text
minus-squareryannathans@aussie.zonelinkfedilinkarrow-up4arrow-down4·8 days agoGoing to rely on security through obscurity instead?
Going to rely on security through obscurity instead?