A security researcher has developed an exploit that leverages several vulnerabilities in CUPS (common UNIX printing system), the default printing system on most Linux systems. The exploit chain allows attackers to remotely register a rogue printer device on the system and then execute commands as root if the user directs a printing job to it. […]
Category Archives: Hacking, Threat and Vulnerability Management, Vulnerabilities
Auto Added by WPeMatico
