<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>What happened to the 9.9 CVSS Linux CVE? - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/81e5aa36-d66f-44b9-ac7b-ff1185d62ec1</link>
        <description>⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev NEW VIDEO: https://www.youtube.com/watch?v=17lyi46UzA0&amp;ab_channel=AliDiamond Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 00:00  0 - Intro 00:07 1 - Mega Meta Fine 01:24 2 - Kia Web App Vulnerability 03:20 3 - Linux CUPS CVE 05:42 4 - Outro LINKS 🔗 Story 1: Mega Meta Fine https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-opens-statutory-inquiry-facebook-0 https://krebsonsecurity.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/ https://petapixel.com/2024/09/30/meta-fined-102-million-for-storing-users-passwords-in-plain-text/ 🔗 Story 2: Kia Web App Vulnerability https://samcurry.net/hacking-kia 🔗 Story 3: Linux CUPS CVE Out of respect for the victims of the security researcher from the CUPS story, I’ve chosen not to link to any of the researcher’s work. If you believe you’re a victim of domestic abuse, please check out https://www.thehotline.org/ for more resources. https://www.aquasec.com/blog/cups-a-critical-9-9-linux-vulnerability-reviewed/ https://securitylabs.datadoghq.com/articles/emerging-vulnerability-cups/ -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  http://hakshop.myshopify.com/ Community → https://www.hak5.org/community Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong. What happened to the 9.9 CVSS Linux CVE? - ThreatWire</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:29:17 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>What happened to the 9.9 CVSS Linux CVE? - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/81e5aa36-d66f-44b9-ac7b-ff1185d62ec1</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=81e5aa36-d66f-44b9-ac7b-ff1185d62ec1" rel="self" type="application/rss+xml"/>
    </channel>
</rss>