<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/2026-05-18-nvd-CVE-2026-47090/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T20:22:55+03:00</news:publication_date>
      <news:title></news:title>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-48213 — Add.Php That Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9089/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T19:16:23+03:00</news:publication_date>
      <news:title>ConnectWise Automate Agent Fails Plugin Verification, CVSS 8.8</news:title><news:keywords>vulnerability, cve, high-severity, cwe-494</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39531/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T19:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-39531: WP Directory Kit Blind SQL Injection Flaw Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1816/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T18:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-1816 — Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile  Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1815/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T18:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-1815 — Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile  Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-plans-for-cybercrime-law-reform-would-protect-almost-no-o-bph85/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:47:00+03:00</news:publication_date>
      <news:title>UK Cybercrime Law Reform Threatens Vulnerability Research</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/showboat-linux-malware-hits-middle-east-telecom-with-socks5-c13t6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:17:09+03:00</news:publication_date>
      <news:title>Showboat Linux Malware Targets Middle East Telecom with SOCKS5 Proxy</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45208/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45208: Apex One/SEP Agent Vulnerability Allows Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45207/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45207: Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-45206: Privilege Escalation in Apex One/SEP Agent</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34930: Trend Micro Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34929/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34929: Trend Micro Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34928/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34928: Trend Micro Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34927/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34927: Trend Micro Apex One/SEP Agent Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34926/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34926 — The Apex One (On-Premise) Server Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2740/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:44+03:00</news:publication_date>
      <news:title>Zohocorp ManageEngine RCE in ADSelfService Plus, DataSecurity Plus, RecoveryManager Plus</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One CVE-2025-71213: Local Privilege Escalation Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Vulnerability Allows Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Console Vulnerability Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Console RCE (CVE-2025-71210) — Patch Now</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13479/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>PosCube QR Menu: Authorization Bypass via User-Controlled Key (CVE-2025-13479)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13477/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>CVE-2025-13477: WifiBurada Authentication Bypass Exposes Private Data</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-359, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/inside-a-crypto-drainer-how-to-spot-it-before-it-empties-yo-swdre/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:00:10+03:00</news:publication_date>
      <news:title>Crypto Drainers Scale Wallet Theft via Phishing and Automation</news:title><news:keywords>threat-intel, data-breach, malware, phishing, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T16:16:20+03:00</news:publication_date>
      <news:title>Divi Form Builder Privilege Escalation: Unauthenticated Admin Account Creation</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/police-seize-first-vpn-service-used-in-ransomware-data-th-5fshx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T16:09:51+03:00</news:publication_date>
      <news:title>Law Enforcement Seizes &apos;First VPN&apos; Service Used in Ransomware, Data Theft</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisco-patches-critical-vulnerability-in-secure-workload-3b5qv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:04:13+03:00</news:publication_date>
      <news:title>Cisco Patches Critical Secure Workload API Vulnerability</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8967/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:01:37+03:00</news:publication_date>
      <news:title>TeamPCP Interview Reveals Motives: Anti-Establishment, Not Ideological</news:title><news:keywords>israel, data-breach, threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-linux-rootkits-router-0-day-ai-intrus-n6m5z/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T14:52:14+03:00</news:publication_date>
      <news:title>Attackers Exploit Trusted Components: A New Era of Stealth</news:title><news:keywords>threat-intel, vulnerability, cloud, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/apple-rejected-2-million-app-store-submissions-in-2025-for-s-vuxt8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T14:17:15+03:00</news:publication_date>
      <news:title>Apple Rejected 2 Million App Store Submissions for Security and Fraud Prevention</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/flipper-one-project-needs-community-help-to-build-open-linux-7i42e/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T14:00:00+03:00</news:publication_date>
      <news:title>Flipper Devices Seeks Community for Flipper One Linux Platform</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/when-identity-is-the-attack-path-7rspt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:30:00+03:00</news:publication_date>
      <news:title>Cached AWS Access Keys: A Cloud Identity Attack Path</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5042/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:19:04+03:00</news:publication_date>
      <news:title>New Breaches Expose Sensitive Business Data, PII for Targeted Attacks</news:title><news:keywords>darkweb, threat-intel, ransomware, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42396/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42396 — Insufficient Validation of Member Zone Data May Cause</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42002 — Concurrency and locking defects in</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42001: Autoprimary SOA Queries Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42000/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42000 — Insufficient Validation of Names During</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41999/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41999 — Incorrect Behaviour of Views with TCP PROXY</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28764/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>MediaInfoLib LXF Parsing Heap Overflow: High-Severity Vulnerability Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-823</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:42:55+03:00</news:publication_date>
      <news:title>Microsoft Patches YellowKey: Public PoC Violates Disclosure</news:title><news:keywords>israel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-s-surge-in-chrome-vulnerability-discoveries-likely-dr-rbzlu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:37:08+03:00</news:publication_date>
      <news:title>Google Chrome Vulnerability Surge Suggests AI&apos;s Role in Discovery</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4605/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:30:04+03:00</news:publication_date>
      <news:title>DOJ, FBI Crack Down on AI Deepfake Pornography Under &apos;Take It Down Act&apos;</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9157/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>Gmission Web Fax Vulnerability (CVE-2026-9157) Allows Remote Code Inclusion</news:title><news:keywords>vulnerability, cve, high-severity, unrestricted-file-upload, cwe-20, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5434/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-5434 — Honeywell Control Network Module (CNM) contains insertion</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-538</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5433/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>Honeywell Control Network Module: Critical RCE Vulnerability Discovered</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4858/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>Mattermost Path Traversal Allows API Calls with Admin Token</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-27393 — Tobias CF7 WOW Styler Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-27349 — WPFunnels Team Mail Mint Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22880/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-22880 — Mattermost Mobile Apps versions &lt;=2.37 11.4 2.0.37 11.0.4</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44076/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-44076 — In Netatalk 3.1.0 through 4.4.2, shell injection via volume</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44068/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:22+03:00</news:publication_date>
      <news:title>Netatalk Path Traversal (CVE-2026-44068) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44066/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-44066: Netatalk Heap Out-of-Bounds Read Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44064/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:22+03:00</news:publication_date>
      <news:title>Netatalk CVE-2026-44064: Out-of-Bounds Access Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44062/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>Netatalk CVE-2026-44062: High-Severity RCE Risk in Legacy File Sharing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44060/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-44060: Netatalk DoS Vulnerability Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44058/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>Netatalk Authentication Bypass (CVE-2026-44058) Allows Admin Access</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44055/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>Netatalk CVE-2026-44055: Shell Injection Vulnerability Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44053/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-44053: Netatalk dhcast128 Weak Crypto Exposes File Shares</news:title><news:keywords>vulnerability, cve, high-severity, cwe-327</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44052/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-44052: Netatalk Exposes LDAP Passwords in Logs</news:title><news:keywords>vulnerability, cve, high-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44051/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk Arbitrary File Read (CVE-2026-44051) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44050/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk Heap Buffer Overflow (CVE-2026-44050) — Critical RCE Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44049/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-44049: Netatalk Out-of-Bounds Write Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44048/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk Stack Buffer Overflow (CVE-2026-44048) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44047/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk SQL Injection (CVE-2026-44047) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-warns-of-new-defender-zero-days-exploited-in-attac-eiqxs/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T10:49:48+03:00</news:publication_date>
      <news:title>Microsoft Defender Zero-Days Under Active Exploitation</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/9-year-old-linux-kernel-flaw-enables-root-command-execution-7f38n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T10:35:53+03:00</news:publication_date>
      <news:title>Linux Kernel Flaw CVE-2026-46333 Allows Root Command Execution</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8964/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T10:02:58+03:00</news:publication_date>
      <news:title>Ukrainian Teen Arrested for $721K Infostealer Operation Targeting US</news:title><news:keywords>israel, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8959/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T09:55:21+03:00</news:publication_date>
      <news:title>Operation Ramz: INTERPOL Arrests 201 Cybercriminals in MENA Region</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-links-repo-breach-to-tanstack-npm-supply-chain-attack-13d14/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T09:54:01+03:00</news:publication_date>
      <news:title>GitHub Repo Breach Linked to TanStack npm Supply Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6279/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T08:16:23+03:00</news:publication_date>
      <news:title>Avada Builder RCE (CVE-2026-6279) Exposes WordPress Sites</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2734/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-2734 — In mlflow/mlflow versions up to 3.9.0, the</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1543/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-1543 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/dragonica-lunaris-126-293-breached-accounts-lzbup/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T07:41:32+03:00</news:publication_date>
      <news:title>Dragonica Lunaris Breach Exposes 126K Player Accounts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4811/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T07:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-4811 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows93-myspace93-46-105-breached-accounts-nasew/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T06:45:15+03:00</news:publication_date>
      <news:title>Windows93 / Myspace93 Breach Exposes 46K Accounts in Plaintext</news:title><news:keywords>data-breach, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/highly-critical-drupal-core-flaw-exposes-postgresql-sites-to-j9qzr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T06:44:11+03:00</news:publication_date>
      <news:title>Drupal Core RCE Flaw (CVE-2026-9082) Impacts PostgreSQL Sites</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1881/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T05:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-1881 — The Broadstreet plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9149/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T03:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-9149 — Libsolv Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40165/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T03:16:28+03:00</news:publication_date>
      <news:title>authentik Authentication Bypass: SAML NameID XML Comment Injection (CVE-2026-40165)</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-91, cwe-287, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9150/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-9150 — Libsolv Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/xi-and-putin-pledge-closer-cooperation-on-ai-cyberspace-and-43246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T02:00:00+03:00</news:publication_date>
      <news:title>China and Russia Forge Deeper Cyber, AI, and Satellite Cooperation</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40102/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-40102 — Plane is an open-source project management tool. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-943</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40094/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T01:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-40094 — nimiq-blockchain provides persistent block storage for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-754</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40092/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T01:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-40092: Nimiq Blockchain Node Crash Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-252</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T01:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-39960 — Any User Viewing The Bug Edit Form, Including Administrators Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukraine-identifies-infostealer-operator-tied-to-28-000-stole-9zp2a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T00:36:24+03:00</news:publication_date>
      <news:title>Ukraine Identifies Infostealer Operator Tied to 28,000 Stolen Accounts</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-bypass-sonicwall-vpn-mfa-due-to-incomplete-patching-ka5eo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T00:19:17+03:00</news:publication_date>
      <news:title>SonicWall VPN MFA Bypass Due to Incomplete Patching</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9141/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-9141: Taiko AG1000-01A SMS Gateway Critical Auth Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9139/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:46+03:00</news:publication_date>
      <news:title>Taiko AG1000-01A SMS Gateway Critical Hard-Coded Credential Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9126/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:45+03:00</news:publication_date>
      <news:title>Google Chrome Use-After-Free (CVE-2026-9126) Allows RCE</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9121/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:44+03:00</news:publication_date>
      <news:title>Google Chrome GPU Out-of-Bounds Read: High-Severity Exploit Vector</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9120/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:43+03:00</news:publication_date>
      <news:title>Google Chrome WebRTC Use-After-Free: Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9119/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:43+03:00</news:publication_date>
      <news:title>Google Chrome WebRTC Heap Overflow Allows Sandbox Escape</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:43+03:00</news:publication_date>
      <news:title>Google Chrome Use-After-Free (CVE-2026-9118) Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9114/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:42+03:00</news:publication_date>
      <news:title>Google Chrome: High-Severity QUIC Vulnerability Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9112/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:42+03:00</news:publication_date>
      <news:title>Google Chrome GPU Use-After-Free: Remote Code Execution via Crafted HTML</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9111/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:41+03:00</news:publication_date>
      <news:title>Google Chrome WebRTC Use-After-Free: Critical RCE Threat on Linux</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45444/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-45444: Critical File Upload Flaw in Gift Cards For WooCommerce Pro</news:title><news:keywords>vulnerability, cve, critical, high-severity, unrestricted-file-upload, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39310/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:39+03:00</news:publication_date>
      <news:title>Trilium Notes Authentication Bypass (CVE-2026-39310) Exposes Data</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-284, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24218/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:36+03:00</news:publication_date>
      <news:title>NVIDIA DGX OS: Critical SSH Key Vulnerability Exposes Systems</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24217/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:36+03:00</news:publication_date>
      <news:title>NVIDIA BioNeMo Core Path Traversal Leads to Code Execution (CVE-2026-24217)</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-29</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24188/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:16:36+03:00</news:publication_date>
      <news:title>NVIDIA TensorRT Out-of-Bounds Write (CVE-2026-24188) Poses Data Tampering Risk</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-20</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434, privilege-escalation, cwe-269, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8957/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:55:27+03:00</news:publication_date>
      <news:title>Dozens of Israeli Business Sites Defaced by Iranian Actors</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20240/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-20240 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:16:26+03:00</news:publication_date>
      <news:title>Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20238/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4602/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:02:25+03:00</news:publication_date>
      <news:title>LΣҒΔ𝕽ΩLL 🇮🇱 Exposes Sophisticated Social Engineering Tactics</news:title><news:keywords>telegram</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ftc-warns-12-major-tech-firms-of-violating-take-it-down-act-gm2ex/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:29:00+03:00</news:publication_date>
      <news:title>FTC Warns 12 Major Tech Firms Over Take It Down Act Violations</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9101/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-9101 — Prototype pollution in csv parsing logic during import can</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9100/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-9100 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-1285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9087/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-9087 — Keycloak Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7613/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:29+03:00</news:publication_date>
      <news:title>PixelYourSite WordPress Plugin Vulnerable to Stored XSS (CVE-2026-7613)</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:20+03:00</news:publication_date>
      <news:title>Cisco Secure Workload Critical RCE: Unauthenticated Site Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20206 — The BrowserBot Component Of Cisco ThousandEyes Enterprise Ag Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20199/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20199 — The SSL Certificate Handling Of Cisco ThousandEyes Virtual A Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20171/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-20171 — The Border Gateway Protocol (BGP)&amp;Nbsp;Enforce-First-As Feat Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-670</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agen-alb2u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:06:54+03:00</news:publication_date>
      <news:title>Microsoft Open-Sources RAMPART and Clarity for AI Agent Security</news:title><news:keywords>threat-intel, vulnerability, microsoft, ai-security, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukraine-probes-teen-suspect-in-cyber-theft-scheme-targeting-vda36/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:33:00+03:00</news:publication_date>
      <news:title>Ukraine Probes Teen Suspect in US E-commerce Cyber Theft</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/discord-migrates-all-users-to-end-to-end-encryption-by-defau-qoz09/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:29:00+03:00</news:publication_date>
      <news:title>Discord Enables End-to-End Encryption by Default</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8598/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>ZKTeco CCTV Cameras: Unauthenticated Port Exposes Critical Data (CVE-2026-8598)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8488/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8488 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8487/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8487 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-276</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8486/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8486 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5783/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:26+03:00</news:publication_date>
      <news:title>Beyaz CityPLus Reflective XSS (CVE-2026-5783) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4293/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-4293 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-32750/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:24+03:00</news:publication_date>
      <news:title>Dell PowerFlex Manager: Directory Listing Vulnerability Exposes Information</news:title><news:keywords>vulnerability, cve, high-severity, cwe-548</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-7346/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:23+03:00</news:publication_date>
      <news:title>CVE-2023-7346 — Ledger Bitcoin app versions 2.1.0 and 2.1.1 contain an</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-682</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/grafana-breach-caused-by-missed-token-rotation-after-tanstac-ijv20/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T18:46:37+03:00</news:publication_date>
      <news:title>Grafana Breach: Missed Token Rotation After TanStack Supply Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-powered-app-attacks-are-faster-more-frequent-and-harder-q8cvf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:37:36+03:00</news:publication_date>
      <news:title>AI-Powered Attacks Accelerate Mobile App Exploitation</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-takes-down-malware-signing-service-behind-ransomwa-ywtug/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:36:44+03:00</news:publication_date>
      <news:title>Microsoft Disrupts Fox Tempest Malware-Signing-as-a-Service</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8485/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:17:04+03:00</news:publication_date>
      <news:title>CVE-2026-8485 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24425/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:16:38+03:00</news:publication_date>
      <news:title>Twig Sandbox Bypass (CVE-2026-24425) Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22554/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-22554: MediaInfoLib Heap-Based Buffer Overflow Risks High Impact</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21836/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-21836 — The HCL DominoIQ RAG feature is affected by a Broken Access</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/identity-alone-isn-t-enough-why-device-security-has-to-shar-grj7u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:02:12+03:00</news:publication_date>
      <news:title>Identity Alone Isn&apos;t Enough: Device Security Must Share the Load</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-5950 — BIND 9 Versions Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-606</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5947/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:40+03:00</news:publication_date>
      <news:title>BIND DNS Vulnerability CVE-2026-5947: Race Condition Leads to Use-After-Free</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-362, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5946/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:40+03:00</news:publication_date>
      <news:title>BIND 9 Assertion Failure: CVE-2026-5946 Impacts DNS Handling</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-125, cwe-617, cwe-754, cwe-843</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45584/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:37+03:00</news:publication_date>
      <news:title>Microsoft Defender Heap Buffer Overflow Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45443/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-45443 — ADD-ONS.ORG PDF For Elementor Forms + Drag And Drop Template Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:34+03:00</news:publication_date>
      <news:title>Azure Portal Windows Admin Center Link Following Vulnerability (CVE-2026-42834)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:32+03:00</news:publication_date>
      <news:title>YITH WooCommerce Product Add-Ons Blind SQLi (CVE-2026-42383)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41091/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:29+03:00</news:publication_date>
      <news:title>Microsoft Defender Vulnerability CVE-2026-41091: Local Privilege Escalation via Improper Link Handling</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3593/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-3593: BIND 9 DNS-over-HTTPS Use-After-Free Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3592/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-3592 — BIND 9 Versions Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-408</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3039/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-3039: BIND Servers Face High-Severity Memory Exhaustion Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-771</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29518/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:17+03:00</news:publication_date>
      <news:title>Rsync CVE-2026-29518: TOCTOU Flaw Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27405/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-27405 — Magepeople Inc. WpBookingly Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24573/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-24573 — Themeisle Visualizer Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-11954/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:14+03:00</news:publication_date>
      <news:title>WISECP CSRF Vulnerability (CVE-2025-11954) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/texas-florida-top-list-of-states-reporting-millions-of-doll-qcrtp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:04:00+03:00</news:publication_date>
      <news:title>Crypto ATM Scams Cost Millions in Texas, Florida</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/anthropic-silently-patches-claude-code-sandbox-bypass-371rj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:00:00+03:00</news:publication_date>
      <news:title>Anthropic Patches Claude Code Sandbox Bypass with Prompt Injection Risk</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/drupal-critical-update-to-fix-bug-with-high-exploitation-ris-df3hc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:52:29+03:00</news:publication_date>
      <news:title>Drupal Critical Update: Exploitation Risk Hours After Disclosure</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webworm-deploys-echocreep-and-graphworm-backdoors-using-disc-n177a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:51:43+03:00</news:publication_date>
      <news:title>Webworm Leverages Discord and MS Graph API for C2</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:48:28+03:00</news:publication_date>
      <news:title>Cyera Acquires 5-Month-Old Cybersecurity Startup for $50 Million</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-confirms-being-hacked-by-teampcp-says-customer-data-mrls1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:21:00+03:00</news:publication_date>
      <news:title>GitHub Confirms Breach by TeamPCP, Customer Data Unaffected</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31973/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:16:20+03:00</news:publication_date>
      <news:title>CVE-2025-31973 — HCL BigFix Service Management (SM) is susceptible to  a</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/senator-presses-cisa-for-answers-about-alleged-github-reposi-wtzos/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:11:00+03:00</news:publication_date>
      <news:title>CISA Pressed on Nightwing GitHub Leak by Senator Hassan</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-45498/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2026-45498 — Microsoft Defender: Microsoft Defender Denial of Service Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2010-0806/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2010-0806 — Microsoft Internet Explorer: Microsoft Internet Explorer Use-After-Free Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2010-0249/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2010-0249 — Microsoft Internet Explorer: Microsoft Internet Explorer Use-After-Free Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2009-3459/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2009-3459 — Adobe Acrobat and Reader: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2009-1537/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2009-1537 — Microsoft DirectX: Microsoft DirectX NULL Byte Overwrite Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2008-4250/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2008-4250 — Microsoft Windows: Microsoft Windows Buffer Overflow Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/agent-ai-is-coming-are-you-ready-f9lb9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T14:58:00+03:00</news:publication_date>
      <news:title>Agent AI Era Exposes Massive Identity Gaps, Orchid Security Warns</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/over-320-npm-packages-hit-by-fresh-mini-shai-hulud-supply-ch-xgvox/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T14:06:49+03:00</news:publication_date>
      <news:title>Mini Shai-Hulud: 320+ NPM Packages Hit by Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/caught-off-guard-securing-ai-after-it-hits-production-lyk30/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T14:00:00+03:00</news:publication_date>
      <news:title>Enterprises Rushing AI to Production, Security Left Behind</news:title><news:keywords>threat-intel, vulnerability, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/typosquatting-is-no-longer-a-user-problem-it-s-a-supply-cha-c1lap/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:30:00+03:00</news:publication_date>
      <news:title>Typosquatting Evolves: AI-Generated Lookalikes Target Supply Chains</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9064/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-9064: 389-ds-base Denial-of-Service Vulnerability Exposes LDAP Servers</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-6728 — The Slider Revolution plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44933/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-44933: Plugin Script Vulnerability Allows Host Binary Execution with Root Privileges</news:title><news:keywords>vulnerability, cve, high-severity, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41054/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41054: Local Privilege Escalation in haveged</news:title><news:keywords>vulnerability, cve, high-severity, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35070/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-35070 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tracking-tamperedchef-clusters-via-certificate-and-code-reus-bqfd9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:00:46+03:00</news:publication_date>
      <news:title>TamperedChef Malware Uses Trojanized Apps and Malvertising for Stealthy Delivery</news:title><news:keywords>threat-intel, apt, malware, research, unit-42</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6405/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T11:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-6405 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5200/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T11:16:22+03:00</news:publication_date>
      <news:title>AcyMailing WordPress Plugin Vulnerable to Admin Takeover (CVE-2026-5200)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-confirms-breach-of-3-800-repos-via-malicious-vscode-e-17vmp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T11:14:08+03:00</news:publication_date>
      <news:title>GitHub Confirms 3,800 Repos Breached via Malicious VSCode Extension</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-shares-mitigation-for-yellowkey-windows-zero-day-dda5p/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:31:15+03:00</news:publication_date>
      <news:title>Microsoft Issues YellowKey Mitigation for BitLocker Zero-Day</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6566/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6566 — The Photo Gallery, Sliders, Proofing and Themes – NextGEN</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47784/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-47784: Memcached Timing Side Channel Exposes Passwords</news:title><news:keywords>vulnerability, cve, high-severity, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47783/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:15+03:00</news:publication_date>
      <news:title>memcached Timing Side Channel (CVE-2026-47783) Allows SASL Credential Guessing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44392/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-44392 — Missing authorization vulnerability exists in Movable Type.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2955/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-2955 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8954/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:03:54+03:00</news:publication_date>
      <news:title>Holidays and Long Weekends: Prime Time for Cyber Attacks</news:title><news:keywords>israel, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9057/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:23+03:00</news:publication_date>
      <news:title>Talend Administration Center: Broken Access Control Allows URL Modification</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9056/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-9056 — The Talend Administration Center Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7522/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7522: WordPress Advanced Database Cleaner Plugin Vulnerable to LFI</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-98</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5075/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-5075 — The All in One SEO plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:33:40+03:00</news:publication_date>
      <news:title>GitHub Investigates Source Code Theft Claims by TeamPCP</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2326/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:20:14+03:00</news:publication_date>
      <news:title>Crypto ATM Scams Surge: Over $388M Lost in US</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9010/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:59+03:00</news:publication_date>
      <news:title>Boost WordPress Plugin: Unauthenticated SQLi Exposes Data via current_url, user_name</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9003/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:59+03:00</news:publication_date>
      <news:title>TONNET E-LAN Hybrid Recording System SQLi (CVE-2026-9003)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7637/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:56+03:00</news:publication_date>
      <news:title>Boost WordPress Plugin Vulnerable to PHP Object Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-24215 — The DALI Backend, Where An Attacker Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:47+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Integer Overflow Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:46+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Out-of-Bounds Read Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:46+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server DoS Vulnerability: CVE-2026-24210</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24209/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:46+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Path Traversal Exposes DoS Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24207/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Critical Authentication Bypass (CVE-2026-24207)</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Critical Auth Bypass Puts AI Workloads at Risk</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24163/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>NVIDIA TRT-LLM Vulnerability: Unsafe Deserialization Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24160/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-24160 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-690</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24142/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-24142 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-33255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:43+03:00</news:publication_date>
      <news:title>NVIDIA TRT-LLM Vulnerability Exposes AI Workloads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15369/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:42+03:00</news:publication_date>
      <news:title>CVE-2025-15369 — The Xpro Addons — 140+ Widgets for Elementor plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2325/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:02:04+03:00</news:publication_date>
      <news:title>Huawei Zero-Day Downs Luxembourg&apos;s Critical Infrastructure</news:title><news:keywords>israel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-investigating-teampcp-claimed-breach-of-4-000-intern-pen7g/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:01:15+03:00</news:publication_date>
      <news:title>GitHub Investigates TeamPCP Claimed Breach of 4,000 Internal Repositories</news:title><news:keywords>threat-intel, vulnerability, data-breach, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8685/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-8685 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8038/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-8038 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:39+03:00</news:publication_date>
      <news:title>WordPress Read More &amp; Accordion Plugin: Privilege Escalation (CVE-2026-7467)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7284/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-7284: Critical WordPress Elementor Plugin Privilege Escalation</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6555/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-6555: ProSolution WP Client Arbitrary File Upload Critical RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6549/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-6549 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6456/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:38+03:00</news:publication_date>
      <news:title>WordPress Account Switcher Plugin: Critical Privilege Escalation (CVE-2026-6456)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6397/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6397 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6391/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6391 — The Sentence To SEO (keywords, description and tags) plugin</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6072/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6072 — The Oliver POS – A WooCommerce Point of Sale (POS) plugin</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5293/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5293 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43620/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-43620 — Recv_files() In Receiver.C That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43619/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-43619 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-59, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43618/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:36+03:00</news:publication_date>
      <news:title>Rsync CVE-2026-43618: Integer Overflow Exposes Memory, Bypasses ASLR</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow, cwe-125, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3985/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:35+03:00</news:publication_date>
      <news:title>Creative Mail WordPress Plugin SQLi Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45585/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-45585 — Microsoft is aware of a security feature bypass</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-39309 — Trilium Notes is a cross-platform, hierarchical note taking</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-290, cwe-451</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35593/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-35593 — Remote Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, remote-code-execution, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34754/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-34754 — Mantis Bug Tracker (MantisBT) is an open source issue</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/verizon-dbir-2026-vulnerability-exploitation-overtakes-cred-cou7n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:04:48+03:00</news:publication_date>
      <news:title>Verizon DBIR 2026: Vulnerability Exploitation Surpasses Credential Theft</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, data-breach, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34600/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T02:16:57+03:00</news:publication_date>
      <news:title>CVE-2026-34600 — Joplin is an open source note-taking and to-do application</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-281, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34358/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CtrlPanel Privilege Escalation (CVE-2026-34358) Allows Full Admin Takeover</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-284, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-34246 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-80, cwe-116</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-34241: CtrlPanel XSS Allows Admin Session Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CtrlPanel RCE: Critical Flaw in Hosting Billing Software Actively Exploited</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15645/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:36+03:00</news:publication_date>
      <news:title>CVE-2025-15645 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-7345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:35+03:00</news:publication_date>
      <news:title>CVE-2023-7345 — Ledger Live with vulnerable versions of ledgerhq/hw-app-eth</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-704</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-34233 — CtrlPanel is open-source billing software for hosting</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34216/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-34216 — Remote Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, remote-code-execution, cwe-470</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>Libheif Heap Buffer Over-Read Vulnerability (CVE-2026-32882) Exposes Data, Causes DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32814/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-32814 — libheif is a HEIF and AVIF file format decoder and encoder.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-908</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>libheif Heap Overflow (CVE-2026-32741) Risks HEIF/AVIF Decoders</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-57798/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:40+03:00</news:publication_date>
      <news:title>CVE-2025-57798 — The Title Input Functionality Due To A Lack Of Proper Length Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32740/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T23:16:18+03:00</news:publication_date>
      <news:title>libheif Heap-Buffer-Overflow (CVE-2026-32740) Exposes Image Processing Stacks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32739/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T23:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-32739 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-19</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-1392, remote-code-execution, cwe-917, cwe-94, code-execution</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fbi-americans-lost-over-388-million-to-scams-using-crypto-fi3g7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:45:39+03:00</news:publication_date>
      <news:title>FBI: Crypto ATM Scams Cost Americans $388M in 2025</news:title><news:keywords>threat-intel, data-breach, malware, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/huawei-zero-day-attack-behind-last-year-s-crash-of-luxembour-m1qhg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:18:00+03:00</news:publication_date>
      <news:title>Huawei Zero-Day Caused Luxembourg&apos;s Telecom Outage</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8096/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-8096 — The Kirki – Freeform Page Builder, Website Builder &amp;</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8073/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:51+03:00</news:publication_date>
      <news:title>WordPress Kirki Plugin Vulnerable to Arbitrary File Deletion</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-41470 — RTSP Session Command Handling That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-33741 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33642/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:49+03:00</news:publication_date>
      <news:title>Kitty Terminal Heap Over-Read/Write Vulnerability (CVE-2026-33642) Critical Severity</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-125, cwe-190, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32738/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-32738 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-125, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47107/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T21:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-47107: Windmill Sandbox Vulnerability Exposes Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-276</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33633/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T21:16:21+03:00</news:publication_date>
      <news:title>Kitty Terminal Heap Buffer Overflow (CVE-2026-33633) — DoS, RCE Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32134/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T21:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-32134 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url></urlset>
