Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 2 months agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square34fedilinkarrow-up1171arrow-down14file-textcross-posted to: cybersec@fed.dyne.orghackernews@lemmy.bestiver.se
arrow-up1167arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 2 months agomessage-square34fedilinkfile-textcross-posted to: cybersec@fed.dyne.orghackernews@lemmy.bestiver.se
minus-squarekbal@fedia.iolinkfedilinkarrow-up4·2 months agoIndeed. But cups-browsed isn’t necessary in order to be able to print things, it’s for automatically discovering new printers on the network.
Indeed. But cups-browsed isn’t necessary in order to be able to print things, it’s for automatically discovering new printers on the network.