Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 2 months agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square35fedilinkarrow-up1169arrow-down15file-textcross-posted to: cybersec@fed.dyne.org
arrow-up1164arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 2 months agomessage-square35fedilinkfile-textcross-posted to: cybersec@fed.dyne.org
minus-squareryannathans@aussie.zonelinkfedilinkarrow-up5arrow-down6·2 months agoGoing to rely on security through obscurity instead?
Going to rely on security through obscurity instead?