Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 2 days agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square33fedilinkarrow-up1153arrow-down14file-textcross-posted to: netsec@zerobytes.monsterlinux@zerobytes.monstercybersecurity@zerobytes.monstercybersec@fed.dyne.org
arrow-up1149arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 2 days agomessage-square33fedilinkfile-textcross-posted to: netsec@zerobytes.monsterlinux@zerobytes.monstercybersecurity@zerobytes.monstercybersec@fed.dyne.org
minus-squareNunar@lemmy.worldlinkfedilinkarrow-up3·1 day agoYou’ve just described every enterprise who allows Linux in their environment.
You’ve just described every enterprise who allows Linux in their environment.