<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45158/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:46+03:00</news:publication_date>
      <news:title>OPNsense RCE: Critical Flaw Allows Root Access via DHCP Input</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44478/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:46+03:00</news:publication_date>
      <news:title>Hoppscotch CVE-2026-44478: Unauthenticated Infrastructure Secret Leak</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44471/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-44471: gitoxide Symlink Vulnerability Exposes Filesystem to Attack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44447/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>ERPNext SQL Injection (CVE-2026-44447) Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44446/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-44446: ERPNext SQL Injection Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44442/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>ERPNext Critical Authorization Bypass (CVE-2026-44442)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44440/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-44440 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-44426 — ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44424/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-44424 — ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44423/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-44423 — ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44194/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>OPNsense RCE: Critical Flaw Allows Root Access Via Malformed Email Address</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>OPNsense RCE Vulnerability (CVE-2026-44193) Exposes Firewalls</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-32993: Unauthenticated HTTP Header Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-32992: DNS Cluster SSL Verification Disabled, High-Severity MiTM Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-29205: Arbitrary File Read via cpdavd Endpoints</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/iranian-hackers-targeted-major-south-korean-electronics-make-wxxy8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:59:33+03:00</news:publication_date>
      <news:title>MuddyWater Targets South Korean Electronics Giant in Espionage Campaign</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45714/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:50+03:00</news:publication_date>
      <news:title>CubeCart CVE-2026-45714: Authenticated RCE Via Template Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45708/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CubeCart RCE (CVE-2026-45708) Allows Unauthenticated Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>Quark Drive Mass Assignment Flaw Grants Admin Takeover</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45228 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45055/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45055: CubeCart Password Reset Flaw Leads to Account Takeover</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-345, cwe-601, cwe-784</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45054/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45054 — CubeCart is an ecommerce software solution. Prior to 6.7.0,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45053/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CubeCart RCE: Critical Flaw Exposes E-commerce Stores to Webshells</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44377: Critical RCE in CubeCart eCommerce Platform</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44376 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44373/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44373 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42602/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-42602: Azure Authenticator Extension Authentication Bypass</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-208, cwe-287, cwe-290, cwe-294, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42561/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-42561: Python-Multipart DoS Vulnerability Patched</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-42304: Twisted DNS DoS Freezes Servers with Chained Pointers</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-407</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39358/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:46+03:00</news:publication_date>
      <news:title>CubeCart SQLi Vulnerability (CVE-2026-39358) Exposes E-commerce Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21821/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:41+03:00</news:publication_date>
      <news:title>HCL BigFix SCM Reporting Site Vulnerable to XSS via Outdated jQuery</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-1104</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44351/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-44351: Critical fast-jwt Auth Bypass via Empty Key</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287, cwe-326, cwe-1391</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42552/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-42552: Flight PHP Framework Leaks Critical Server Info</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-209</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42551/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>Flight PHP Framework CVE-2026-42551: CSRF &amp; Cache Poisoning Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42550/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-42550: Flight PHP Framework SQL Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42549/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-42549 — Flight is an extensible micro-framework for PHP. Prior to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33381/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33381 — When a user&apos;s access to mint tokens for a service account</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33380/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33380 — SQL Expressions Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33378 — Using the $__timeGroup macro, one can achieve an OOM by</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33377: Dashboard Privilege Escalation Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33376: IPv6 Auth Proxy Bypass Risk</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-28383 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28380/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-28380 — Any Editor could delete any snapshot, even if they have no</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28379/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-28379 — Race Condition</news:title><news:keywords>vulnerability, cve, medium-severity, race-condition</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-28376 — The Grafana Live push endpoint can be exploited to cause</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28374/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-28374 — Editors could delete any annotation, even those they do not</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-13</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-328, cwe-648, remote-code-execution, cwe-502, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/alleged-dream-market-admin-arrested-in-germany-after-us-indi-6dx3x/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:54:00+03:00</news:publication_date>
      <news:title>Dream Market Admin Arrested in Germany After US Indictment</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8496/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:30+03:00</news:publication_date>
      <news:title>CVE-2026-8496 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42587/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:24+03:00</news:publication_date>
      <news:title>Netty DoS Vulnerability (CVE-2026-42587) Bypasses Decompression Limits</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42586/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-42586 — Netty is an asynchronous, event-driven network application</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42585/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-42585 — Netty is an asynchronous, event-driven network application</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-444</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42584/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-42584: Netty HTTP/2 Handling Vulnerability Exposes Data Corruption</news:title><news:keywords>vulnerability, cve, high-severity, cwe-444</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42583/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:23+03:00</news:publication_date>
      <news:title>CVE-2026-42583: Netty Lz4FrameDecoder Vulnerability Exposes Apps to DoS</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42582/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:23+03:00</news:publication_date>
      <news:title>CVE-2026-42582: Netty QpackDecoder Vulnerability Exposes Apps to DoS</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42580/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:23+03:00</news:publication_date>
      <news:title>CVE-2026-42580 — Netty is an asynchronous, event-driven network application</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-190, cwe-444</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42579/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:23+03:00</news:publication_date>
      <news:title>Netty DNS Codec Vulnerability (CVE-2026-42579) Exposes Systems to High-Severity Attacks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-400, cwe-626</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42577/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:23+03:00</news:publication_date>
      <news:title>Netty CVE-2026-42577: Stale Connections Lead to 100% CPU Busy-Loops</news:title><news:keywords>vulnerability, cve, high-severity, cwe-772</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:22+03:00</news:publication_date>
      <news:title>CVE-2026-41255 — CKAN is an open-source DMS (data management system) for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33583/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:06+03:00</news:publication_date>
      <news:title>Arqit Symmetric Key Agreement Platform Exposes Critical Keys via HTTP GET</news:title><news:keywords>vulnerability, cve, high-severity, cwe-749</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30906/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:05+03:00</news:publication_date>
      <news:title>Zoom Rooms Installer: High-Severity Privilege Escalation via Untrusted Path</news:title><news:keywords>vulnerability, cve, high-severity, cwe-426</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30905/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:05+03:00</news:publication_date>
      <news:title>Zoom Workplace VDI Plugin Vulnerability Allows Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22677/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:17:04+03:00</news:publication_date>
      <news:title>CVE-2026-22677 — The Session Import Endpoint That Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:19+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape (CVE-2026-45411) Poses Critical RCE Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-668</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45109/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:19+03:00</news:publication_date>
      <news:title>Next.js CVE-2026-45109: Middleware Bypass Via Turbopack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44579/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:18+03:00</news:publication_date>
      <news:title>Next.js Partial Prerendering Vulnerability: DoS via Connection Exhaustion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44578/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:17+03:00</news:publication_date>
      <news:title>Next.js SSRF via Crafted WebSocket Requests (CVE-2026-44578)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44009/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-44009: Critical vm2 Sandbox Escape Threatens Node.js Apps</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-668</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44008/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-44008: Critical vm2 Sandbox Escape in Node.js</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-668</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44007/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:17+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape (CVE-2026-44007) Allows Arbitrary OS Commands</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44006/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:17+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape (CVE-2026-44006) Poses Critical Threat to Node.js</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44005/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-44005: Critical vm2 Sandbox Escape Threatens Node.js Applications</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44004/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-44004: vm2 Sandbox Vulnerability Leads to Host Memory Exhaustion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:16+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape (CVE-2026-44001) Allows Host Node.js Process Crash</news:title><news:keywords>vulnerability, cve, high-severity, cwe-248</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44000/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-44000 — vm2 is an open source vm/sandbox for Node.js. Prior to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43999/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-43999: Critical vm2 Sandbox Bypass Leads to RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43998/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-43998: vm2 Sandbox Bypass Leads to RCE in Node.js</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43997/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:16:16+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape (CVE-2026-43997) Exposes Node.js Hosts</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4584/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T21:01:10+03:00</news:publication_date>
      <news:title>Google Documents First AI-Assisted 0-Day Exploit in the Wild</news:title><news:keywords>vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/european-commission-head-pushes-creation-of-new-law-delaying-tx0e1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T20:38:00+03:00</news:publication_date>
      <news:title>European Commission Pushes New Law to Delay Teen Social Media Access</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44577/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-44577 — Next.js is a React framework for building full-stack web</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44576/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-44576 — Next.js is a React framework for building full-stack web</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T20:16:22+03:00</news:publication_date>
      <news:title>Next.js App Router Flaw Bypasses Middleware Authorization</news:title><news:keywords>vulnerability, cve, high-severity, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44574/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T20:16:22+03:00</news:publication_date>
      <news:title>Next.js Middleware Bypass (CVE-2026-44574) Exposes Dynamic Routes</news:title><news:keywords>vulnerability, cve, high-severity, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44573/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T20:16:22+03:00</news:publication_date>
      <news:title>Next.js Vulnerability Exposes Protected Data via Pages Router</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2695/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T20:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-2695 — A command injection vulnerability was discovered in</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-bitlocker-zero-day-gives-access-to-protected-drives-ee66q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:37:49+03:00</news:publication_date>
      <news:title>Microsoft BitLocker Zero-Day Exposes Protected Drives</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6281/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:17:01+03:00</news:publication_date>
      <news:title>Lenovo Personal Cloud Storage RCE Vulnerability (CVE-2026-6281)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:49+03:00</news:publication_date>
      <news:title>BIG-IP Appliance Mode Bypass Vulnerability (CVE-2026-42930)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42924/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-42924: F5 iControl SOAP Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42406/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:47+03:00</news:publication_date>
      <news:title>F5 BIG-IP, BIG-IQ CVE-2026-42406: Critical RCE for Privileged Attackers</news:title><news:keywords>vulnerability, cve, high-severity, cwe-267</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42266/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:47+03:00</news:publication_date>
      <news:title>JupyterLab CVE-2026-42266: PyPI Extension Manager Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-88, cwe-602</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41957/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:45+03:00</news:publication_date>
      <news:title>BIG-IP, BIG-IQ Configuration Utility RCE via Authenticated Access</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41953/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:45+03:00</news:publication_date>
      <news:title>BIG-IP Privilege Escalation: CVE-2026-41953 Allows Resource Admin to Root</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-41225: Critical iControl REST Vulnerability Allows Arbitrary Command Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-648</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40698/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:43+03:00</news:publication_date>
      <news:title>F5 BIG-IP, BIG-IQ Privilege Escalation: CVE-2026-40698</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40631/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-40631: F5 iControl SOAP Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-552</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40061/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:42+03:00</news:publication_date>
      <news:title>F5 BIG-IP DNS Vulnerability Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34176/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-34176: High-Severity Command Injection in iControl REST Endpoint</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32673/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:39+03:00</news:publication_date>
      <news:title>F5 BIG-IP Scripted Monitors Allow High-Privilege Command Execution (CVE-2026-32673)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32643/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:39+03:00</news:publication_date>
      <news:title>F5 BIG-IP/BIG-IQ CVE-2026-32643: High-Privilege RCE</news:title><news:keywords>vulnerability, cve, high-severity, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37168/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T19:16:31+03:00</news:publication_date>
      <news:title>Ecommerce Systempay 1.0 Critical Weak Crypto Vulnerability (CVE-2020-37168)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-328</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4583/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T18:45:43+03:00</news:publication_date>
      <news:title>Microsoft BitLocker Bypass, Privilege Escalation Exploits Released on Patch Tuesday</news:title><news:keywords>malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5030/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T18:15:19+03:00</news:publication_date>
      <news:title>The Gentleman Leads Ransomware Surge: 46 Attacks in 24 Hours</news:title><news:keywords>darkweb, threat-intel, ransomware, malware, data-breach, darkfeed</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-fixes-windows-autopatch-bug-installing-restricted-jcyhx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T17:36:09+03:00</news:publication_date>
      <news:title>Microsoft Autopatch Bug Deployed Restricted Drivers in EU</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8924/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T16:47:08+03:00</news:publication_date>
      <news:title>Israeli Cybersecurity Startups Dominate Global &apos;Rising In Cyber 2026&apos; List</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-s-mdash-ai-system-finds-16-windows-flaws-fixed-in-xcu3c/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T16:46:02+03:00</news:publication_date>
      <news:title>Microsoft MDASH AI System Discovers 16 Windows Vulnerabilities</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/azerbaijani-energy-firm-hit-by-repeated-microsoft-exchange-e-ljhot/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T16:00:00+03:00</news:publication_date>
      <news:title>FamousSparrow Expands Targeting, Hits Azerbaijani Energy Firm via Exchange</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-moves-to-shield-security-researchers-in-cybercrime-law-ov-1nr9d/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:58:00+03:00</news:publication_date>
      <news:title>UK Reforms Cybercrime Law, Shields Security Researchers</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-on-pace-to-break-annual-vulnerability-record-as-ai-d0h2b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:54:00+03:00</news:publication_date>
      <news:title>Microsoft on Pace to Break Annual Vulnerability Record</news:title><news:keywords>threat-intel, data-breach, government, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/government-to-scrutinize-instructure-over-canvas-disruption-q0yi6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:13:14+03:00</news:publication_date>
      <news:title>Instructure Canvas Disruption Under Government Scrutiny</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4582/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:21+03:00</news:publication_date>
      <news:title>AI Code Analysis Tools: Reality Check on Mythos vs. Curl</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8923/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T14:54:00+03:00</news:publication_date>
      <news:title>West Pharmaceutical Services Hit by Ransomware, Data Stolen</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-why-your-appsec-tools-miss-the-lethal-path-and-xizh2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T14:52:43+03:00</news:publication_date>
      <news:title>AppSec Tools Miss &apos;Lethal Paths&apos; to Data, Say Wiz and Okta/GitLab</news:title><news:keywords>threat-intel, vulnerability, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/most-remediation-programs-never-confirm-the-fix-actually-wor-1f9t0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T14:30:00+03:00</news:publication_date>
      <news:title>Remediation Failure: Most Fixes Unconfirmed, Attackers Win</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/716-000-impacted-by-openloop-health-data-breach-bf2jz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T14:18:03+03:00</news:publication_date>
      <news:title>OpenLoop Health Data Breach Impacts 716,000 Patients</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-patches-critical-zero-click-outlook-vulnerability-6u49r/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T13:33:46+03:00</news:publication_date>
      <news:title>Microsoft Outlook Zero-Click Vulnerability: A Critical Enterprise Threat</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8921/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T13:04:41+03:00</news:publication_date>
      <news:title>Password Insecurity: Israelis Mirror Global Trends, Neglecting Basic Hygiene</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8920/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T12:05:23+03:00</news:publication_date>
      <news:title>Pro-Iranian Group Claims eBay, Spotify Attacks, Citing Major Disruptions</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/gemstuffer-abuses-150-rubygems-to-exfiltrate-scraped-u-k-c-ayhpb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T11:08:54+03:00</news:publication_date>
      <news:title>GemStuffer Abuses RubyGems for Covert UK Council Data Exfiltration</news:title><news:keywords>threat-intel, vulnerability, malware, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hundreds-of-malicious-packages-force-rubygems-to-suspend-reg-8k148/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T10:30:36+03:00</news:publication_date>
      <news:title>RubyGems Suspends Registrations After Malicious Package Flood</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8919/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T10:02:10+03:00</news:publication_date>
      <news:title>Unusual Admin Logins, Data Exfiltration: The 2 AM SOC Gap</news:title><news:keywords>israel, cybersafe</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/android-adds-intrusion-logging-for-sophisticated-spyware-for-gchn1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T09:55:42+03:00</news:publication_date>
      <news:title>Android Adds Intrusion Logging for Spyware Forensics</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/canada-life-237-810-breached-accounts-hloh6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T09:51:17+03:00</news:publication_date>
      <news:title>Canada Life Hit by ShinyHunters &apos;Pay or Leak&apos; Extortion</news:title><news:keywords>data-breach, phishing, threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ics-patch-tuesday-new-security-advisories-from-siemens-sch-icslu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T09:50:51+03:00</news:publication_date>
      <news:title>ICS Patch Tuesday: Siemens, Schneider, CISA Release Advisories</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8916/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T08:10:35+03:00</news:publication_date>
      <news:title>Akamai Reportedly in Advanced Talks to Acquire Israeli Startup LayerX</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T07:47:25+03:00</news:publication_date>
      <news:title>Microsoft Warns of Russian Wiper Malware Targeting Israel, Iran</news:title><news:keywords>israel, data-breach, identity, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8912/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T07:43:08+03:00</news:publication_date>
      <news:title>Israel National Cyber Directorate Warns of Coordinated Psychological Operations</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8108/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:19+03:00</news:publication_date>
      <news:title>Fuji Tellus Driver Grants All Users Kernel R/W: CVE-2026-8108</news:title><news:keywords>vulnerability, cve, high-severity, cwe-749</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5371/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:18+03:00</news:publication_date>
      <news:title>MonsterInsights WordPress Plugin Exposes Google OAuth Tokens</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44548/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:18+03:00</news:publication_date>
      <news:title>ChurchCRM CVE-2026-44548: High-Severity CSRF Allows Silent Record Deletion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352, cwe-650</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44547/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-44547: ChurchCRM Critical Vulnerability Persists in 7.2.x Releases</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287, cwe-304</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44347/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-44347 — Warpgate is an open source SSH, HTTPS and MySQL bastion</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44341/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-44341 — GoJobs is a REST API for a Job Board platform. The</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44245/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-44245 — Kyverno is a policy engine designed for cloud native</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42289/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:17+03:00</news:publication_date>
      <news:title>ChurchCRM CVE-2026-42289: CSRF Allows Admin Account Creation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-269, cwe-306, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42288/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:17+03:00</news:publication_date>
      <news:title>ChurchCRM RCE: Unpatched Setup Wizard Leaves Systems Exposed</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41901/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-41901: Critical Server-Side Template Injection in Thymeleaf</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-917, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1250/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-1250: WordPress Court Booking Plugin SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15463/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:16:15+03:00</news:publication_date>
      <news:title>CVE-2025-15463 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8449/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-8449: Linux ksmbd Heap Corruption Allows Remote Kernel RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45227/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:38+03:00</news:publication_date>
      <news:title>Heym Sandbox Escape Vulnerability (CVE-2026-45227) Allows Arbitrary Host Commands</news:title><news:keywords>vulnerability, cve, high-severity, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:37+03:00</news:publication_date>
      <news:title>Heym Path Traversal (CVE-2026-45225) Allows Arbitrary File Writes</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-44304: Lemur LDAP Auth Flaw Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-90</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44262/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-44262: Critical RCE in Laravel Scramble API Docs</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-44260: efw4.X Readonly Flag Bypass Leads to File Modification</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:35+03:00</news:publication_date>
      <news:title>Micronaut Framework DoS Vulnerability (CVE-2026-44241) Risks Heap Exhaustion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44015/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-44015: Nginx UI SSRF Bypasses Network Segmentation</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43948/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-43948: wger Workout Manager Critical Account Takeover</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42855/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-42855: arduino-esp32 Digest Auth Bypass Threatens IoT Security</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42854/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-42854: Critical RCE in arduino-esp32 WebServer</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42544/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:34+03:00</news:publication_date>
      <news:title>Granian HTTP Server Vulnerability: Unauthenticated DoS via WebSocket Protocol Header</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-248, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40902/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-40902: PhpSpreadsheet DoS Vulnerability Exploited with Malicious XLSX</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40863/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-40863: PhpSpreadsheet DoS Vulnerability Hits High Severity</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26289/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-26289: PowerSYSTEM Center REST API Exposes Admin Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44403/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T00:16:16+03:00</news:publication_date>
      <news:title>Wing FTP Server RCE (CVE-2026-44403) Allows Admin Lua Injection</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T00:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-44246: nnU-Net Agentic Workflow Injection Puts GitHub Workflows at Risk</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44240/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T00:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-44240: basic-ftp Client-Side DoS Poses Risk to Node.js Applications</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35504/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T00:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-35504 — PowerSYSTEM Center email notification service is affected</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7474/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:46+03:00</news:publication_date>
      <news:title>HashiCorp Nomad Code Execution (CVE-2026-7474) via Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-44225: Pulpy Packager Allows Arbitrary File Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, arbitrary-file-access, cwe-22, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:43+03:00</news:publication_date>
      <news:title>ArcadeDB Critical Vulnerability Bypasses Authorization Across Databases</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42889/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-42889: Relay Obsidian Server Authentication Bypass Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-639, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34690/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:38+03:00</news:publication_date>
      <news:title>Adobe After Effects Stack-Based Buffer Overflow (CVE-2026-34690) Allows RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34686/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:38+03:00</news:publication_date>
      <news:title>Adobe Commerce Stored XSS Puts Low-Privilege Attackers in Control (CVE-2026-34686)</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34653/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:36+03:00</news:publication_date>
      <news:title>Adobe Commerce Path Traversal (CVE-2026-34653) Allows File System Read/Write</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:35+03:00</news:publication_date>
      <news:title>Adobe Commerce DoS Vulnerability (CVE-2026-34649) Puts E-commerce at Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34648/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:35+03:00</news:publication_date>
      <news:title>Adobe Commerce DoS Vulnerability: CVE-2026-34648 Puts E-Commerce at Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34646/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:35+03:00</news:publication_date>
      <news:title>Adobe Commerce Vulnerability Allows Unauthorized Write Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34645/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:35+03:00</news:publication_date>
      <news:title>Adobe Commerce CVE-2026-34645: Critical Auth Bypass Grants Write Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23827/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-23827: Unauthenticated RCE in AOS-8 and AOS-10 Network Management</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23826/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:31+03:00</news:publication_date>
      <news:title>AOS-8 Operating System Vulnerability Could Lead to DoS</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23825/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-23825: Unauthenticated DoS in AOS-8, AOS-10 Operating Systems</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23824/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-23824: AOS-8 and AOS-10 Protocol Vulnerabilities Lead to DoS</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-12</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-287, cwe-522, cwe-798, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/foxconn-confirms-cyberattack-impacting-north-american-factor-cn1ao/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:57:00+03:00</news:publication_date>
      <news:title>Foxconn Confirms Cyberattack on North American Factories</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/congressman-launches-inquiry-into-how-food-retailers-use-sur-ardp7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:47:00+03:00</news:publication_date>
      <news:title>Congress Probes Food Retailers Over Surveillance Pricing Practices</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:34+03:00</news:publication_date>
      <news:title>MongoDB Ops Manager RCE via Webhook Template Injection (CVE-2026-8431)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8430/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-8430: SPIP RCE Limited to Nginx Configurations</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8429/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:34+03:00</news:publication_date>
      <news:title>SPIP RCE Vulnerability (CVE-2026-8429) Bypasses Security Protections</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34684/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-34684 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-34683 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34682/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:31+03:00</news:publication_date>
      <news:title>Substance3D Designer Out-of-Bounds Write Allows RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34681/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:31+03:00</news:publication_date>
      <news:title>Substance3D Designer RCE: Malicious File Opens Door to Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34664/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-34664 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34660/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:30+03:00</news:publication_date>
      <news:title>Adobe Connect Critical RCE: Incorrect Authorization Leads to Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34659/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:30+03:00</news:publication_date>
      <news:title>Adobe Connect CVE-2026-34659: Critical RCE via Deserialization of Untrusted Data</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23823/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:29+03:00</news:publication_date>
      <news:title>AOS-10 AP Command Injection: CVE-2026-23823 Exposes Networks</news:title><news:keywords>vulnerability, cve, high-severity, command-injection</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23822/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-23822 — The XML Handling Component Of AOS-8 DHCP Services Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23821/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-23821: Aruba AOS-10 APs Vulnerable to RCE</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23820/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-23820: Aruba AOS-8/10 AP CLI Vulnerability Allows Arbitrary Command Execution</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23819/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:16:28+03:00</news:publication_date>
      <news:title>AOS-10/AOS-8 Instant AP Vulnerability Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/west-pharmaceutical-warns-of-ransomware-attack-impacting-bus-3kcdz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T22:00:00+03:00</news:publication_date>
      <news:title>West Pharmaceutical Hit by Ransomware, Data Stolen</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-releases-windows-10-kb5087544-extended-security-up-brfsz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:58:34+03:00</news:publication_date>
      <news:title>Microsoft Releases Windows 10 KB5087544 Extended Security Update</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4580/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:45:36+03:00</news:publication_date>
      <news:title>Free Online File Converters: A Malware and Data Theft Vector</news:title><news:keywords>malware, ransomware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fortinet-warns-of-critical-rce-flaws-in-fortisandbox-and-for-eqslh/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:23:09+03:00</news:publication_date>
      <news:title>Fortinet Warns of Critical RCE Flaws in FortiSandbox and FortiAuthenticator</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44277/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:30+03:00</news:publication_date>
      <news:title>Fortinet FortiAuthenticator Critical Improper Access Control Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44196/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:29+03:00</news:publication_date>
      <news:title>Pingvin Share X Critical 2FA Bypass (CVE-2026-44196)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-287, cwe-697</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44183/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:29+03:00</news:publication_date>
      <news:title>Cleanuparr CVE-2026-44183: Critical RCE via X-Forwarded-For Header Spoofing</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290, cwe-348</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42898/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:26+03:00</news:publication_date>
      <news:title>Microsoft Dynamics 365 On-Premises Critical Code Injection (CVE-2026-42898)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42833/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:25+03:00</news:publication_date>
      <news:title>Microsoft Dynamics 365 On-Premises Critical RCE via Unnecessary Privileges</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42823/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:25+03:00</news:publication_date>
      <news:title>CVE-2026-42823: Critical Privilege Escalation in Azure Logic Apps</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42048/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:23+03:00</news:publication_date>
      <news:title>CVE-2026-42048: Langflow Path Traversal Exposes Servers to Arbitrary Deletion</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41103/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:21+03:00</news:publication_date>
      <news:title>Microsoft SSO Plugin for Jira &amp; Confluence Critical Auth Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-303</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41096/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:21+03:00</news:publication_date>
      <news:title>Microsoft Windows DNS Heap Overflow (CVE-2026-41096) Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41089/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:20+03:00</news:publication_date>
      <news:title>CVE-2026-41089: Critical Netlogon RCE Threatens Windows Networks</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40402/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:18+03:00</news:publication_date>
      <news:title>Windows Hyper-V Critical Privilege Escalation via Use-After-Free</news:title><news:keywords>vulnerability, cve, critical, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40379/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:16+03:00</news:publication_date>
      <news:title>CVE-2026-40379: Critical Azure Entra ID Spoofing Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33117/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:17:04+03:00</news:publication_date>
      <news:title>Azure SDK Critical Vulnerability Allows Authentication Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-29204: Critical Client Area Vulnerability Exposes cPanel Accounts</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26083/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:16:39+03:00</news:publication_date>
      <news:title>Fortinet FortiSandbox Critical RCE: Unauthenticated Attackers Can Execute Commands</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-11-kb5089549-kb5087420-cumulative-updates-released-cpg9z/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:09:12+03:00</news:publication_date>
      <news:title>Microsoft Ships Windows 11 Cumulative Updates KB5089549 &amp; KB5087420</news:title><news:keywords>threat-intel, data-breach, malware, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-da-3a4wi/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:08:06+03:00</news:publication_date>
      <news:title>Microsoft May 2026 Patch Tuesday: 120 Flaws, Critical RCEs in Office</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, cloud, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-patches-137-vulnerabilities-pu5ap/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:07:39+03:00</news:publication_date>
      <news:title>Microsoft Patches 137 Vulnerabilities, Including Critical Azure, Windows Flaws</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/exaforce-raises-125-million-for-agentic-soc-platform-adf9e/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T20:23:00+03:00</news:publication_date>
      <news:title>Exaforce Raises $125 Million for Agentic SOC Platform</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-43993: JunoClaw AI Platform SSRF Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-43992: JunoClaw AI Exposes BIP-39 Seeds in Tool Calls</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200, cwe-312, cwe-522, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43991/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T20:16:21+03:00</news:publication_date>
      <news:title>JunoClaw Command Bypass Vulnerability CVE-2026-43991 Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43990/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-43990: JunoClaw Agentic AI Shell Injection Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43989/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-43989: JunoClaw Agentic AI Exposes Filesystem to Agents</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-22, cwe-59, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-25431 — WPMU DEV Hustle Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/european-countries-are-exporting-surveillance-tech-to-countr-pws9y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T19:49:00+03:00</news:publication_date>
      <news:title>EU Surveillance Tech Exports Undermine Human Rights, Report Finds</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/adobe-patches-52-vulnerabilities-in-10-products-ebs9h/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T19:47:21+03:00</news:publication_date>
      <news:title>Adobe Patches 52 Vulnerabilities Across 10 Products</news:title><news:keywords>threat-intel, vulnerability, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potenti-580ue/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T19:44:00+03:00</news:publication_date>
      <news:title>Exim BDAT Vulnerability (CVE-2026-45185) Exposes GnuTLS Builds to RCE</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8111/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:18+03:00</news:publication_date>
      <news:title>Ivanti Endpoint Manager RCE via SQL Injection (CVE-2026-8111)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8110/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:17+03:00</news:publication_date>
      <news:title>Ivanti Endpoint Manager Privilege Escalation (CVE-2026-8110)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8109/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-8109 — An exposed dangerous method on the Core Server of Ivanti</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-749</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8051/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:17+03:00</news:publication_date>
      <news:title>Ivanti Virtual Traffic Manager RCE via OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8043/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:17+03:00</news:publication_date>
      <news:title>Ivanti Xtraction Critical Vulnerability Allows Remote File Manipulation</news:title><news:keywords>vulnerability, cve, critical, high-severity, information-disclosure, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7432/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:17+03:00</news:publication_date>
      <news:title>Ivanti Secure Access Client: Local Privilege Escalation via Race Condition (CVE-2026-7432)</news:title><news:keywords>vulnerability, cve, high-severity, race-condition, cwe-362</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-7431 — An incorrect permission assignment for critical resource of</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5061/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-5061 — The consul-template library before version 0.42.0 is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43939/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-43939: YAF.NET Cross-Site Scripting Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79, cwe-80, cwe-116</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43938/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:15+03:00</news:publication_date>
      <news:title>YetAnotherForum.NET XSS via User-Agent Logging (CVE-2026-43938)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79, cwe-80, cwe-116</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43937/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:15+03:00</news:publication_date>
      <news:title>YetAnotherForum.NET Vulnerability Allows Arbitrary SQL Execution by Low-Privileged Users</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89, cwe-841</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T18:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-42260: Open-WebSearch SSRF Exposes Internal Networks</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/rubygems-suspends-new-signups-after-hundreds-of-malicious-pa-enjvb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:47:00+03:00</news:publication_date>
      <news:title>RubyGems Suspends Signups After Hundreds of Malicious Packages Uploaded</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45091/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:17:08+03:00</news:publication_date>
      <news:title>CVE-2026-45091: Critical Secret Exposure in sealed-env Library</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42006/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:17:04+03:00</news:publication_date>
      <news:title>CVE-2026-42006 — An attacker can cause uncontrolled memory usage with</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40638/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:17:04+03:00</news:publication_date>
      <news:title>CVE-2026-40638 — Dell PowerScale InsightIQ, versions 5.0.0 through 6.2.0,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40016/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-40016 — Attacker can upload a malicious Sieve script over</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35071/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:17:02+03:00</news:publication_date>
      <news:title>Dell PowerScale InsightIQ Vulnerability Allows OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33603/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:17:01+03:00</news:publication_date>
      <news:title>CVE-2026-33603 — Attacker can use a specially crafted base64 exchange</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-99</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27851/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-27851: Safe Filter Bug Enables SQL/LDAP Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-235</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4579/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:15:10+03:00</news:publication_date>
      <news:title>Mini Shai-Hulud Campaign Hits TanStack, UiPath, Mistral AI via npm/PyPI</news:title><news:keywords>tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/instructure-pays-ransom-after-canvas-incident-as-congress-an-2yd1e/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T16:01:00+03:00</news:publication_date>
      <news:title>Instructure Pays Ransom After Canvas Breach; Congress Investigates</news:title><news:keywords>threat-intel, data-breach, government, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/west-pharmaceutical-services-hit-by-disruptive-ransomware-at-p0rz4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:59:49+03:00</news:publication_date>
      <news:title>West Pharmaceutical Services Hit by Disruptive Ransomware Attack</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-2pj1a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:50:00+03:00</news:publication_date>
      <news:title>TrickMo Android Trojan Leverages TON for C2 and SOCKS5 Pivots</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-ho-x4eec/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:58:00+03:00</news:publication_date>
      <news:title>Unanswered SOC Alerts: WAF, DLP, OT/IoT Signals Left Uninvestigated</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/shai-hulud-attack-ships-signed-malicious-tanstack-mistral-n-iu4sj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:29:36+03:00</news:publication_date>
      <news:title>Shai Hulud Malware Compromises TanStack, Mistral npm Packages in Supply Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45218/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-45218: WP Travel Blind SQL Injection Puts User Data at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-45215 — Saad Iqbal WP EasyPay Wp-Easy-Pay Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>Xpro Elementor Addons SQL Injection (CVE-2026-45214) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>BEAR Woo-Bulk-Editor SQLi Puts WooCommerce Stores at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-45212 — Gabe Livan Asset CleanUp: Page Speed Booster Wp-Asset-Clean- Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>APIExperts Square for WooCommerce SQLi (CVE-2026-45211) Exposes E-commerce Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-45210 — Broadstreet Broadstreet Ads Broadstreet Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42742/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>Aman Views for WPForms Vulnerability Allows Blind SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>Ninja Forms Views Blind SQL Injection (CVE-2026-42741) — High Severity</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41713/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-41713: High-Severity AI Model Manipulation Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41712/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:19+03:00</news:publication_date>
      <news:title>Spring AI Chat Memory Vulnerability Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2465/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:19+03:00</news:publication_date>
      <news:title>Turboard FOR-S Privilege Escalation via Incorrect Authorization (CVE-2026-2465)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sap-fixes-critical-vulnerabilities-in-commerce-cloud-and-s-4-p44lq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:04:55+03:00</news:publication_date>
      <news:title>SAP Patches Critical Flaws in Commerce Cloud and S/4HANA</news:title><news:keywords>threat-intel, data-breach, malware, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/why-agentic-ai-is-security-s-next-blind-spot-5dlko/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:30:00+03:00</news:publication_date>
      <news:title>Agentic AI: Security&apos;s Next Blind Spot Already in Production</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-6001: ABIS BAPSİS Authorization Bypass Exposes Trusted Identifiers</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:46+03:00</news:publication_date>
      <news:title>Solid Edge SE2026 Vulnerability Allows Code Execution via PAR Files</news:title><news:keywords>vulnerability, cve, high-severity, stack-based-buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:46+03:00</news:publication_date>
      <news:title>Solid Edge SE2026 Vulnerability Allows Code Execution via PAR Files</news:title><news:keywords>vulnerability, cve, high-severity, cwe-824</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41551/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-41551: Critical Path Traversal in ROS# Exposes Arbitrary Files</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-33893: Siemens Teamcenter Hardcoded Key Exposes Unauthorized Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27662/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-27662: Control Panel Exposes Web Browser, High Severity</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25787/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-25787: Critical XSS in Motion Control Diagnostics</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25786/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-25786: Critical XSS in PLC/Station Name Field</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22925/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:44+03:00</news:publication_date>
      <news:title>SIMATIC CN 4100 DoS Vulnerability: CVE-2026-22925 Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22924/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>SIMATIC CN 4100 Critical Vulnerability: Unauthenticated Resource Exhaustion</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-6577/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>Akilli Commerce E-Commerce Website SQLi Vulnerability (CVE-2025-6577)</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40949/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>CVE-2025-40949: Critical RUGGEDCOM ROX Command Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40947/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>RUGGEDCOM ROX RCE via Feature Key Installation (CVE-2025-40947)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40946/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:42+03:00</news:publication_date>
      <news:title>CVE-2025-40946: KACO new energy Inverter Credential Derivation Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40833/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:41+03:00</news:publication_date>
      <news:title>CVE-2025-40833: IPv4 Null Pointer Dereference Triggers DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:58+03:00</news:publication_date>
      <news:title>CVE-2026-7661 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7659/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:57+03:00</news:publication_date>
      <news:title>CVE-2026-7659 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6913/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-6913 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6690/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>LifePress Plugin XSS: Unauthenticated Attackers Inject Malicious Scripts</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6256/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-6256 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6247/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-6247 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6237/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-6237 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5715/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-5715 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5340/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-5340 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5028/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-5028 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4920/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-4920 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4859/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-4859 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39432/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-39432: Timetics Plugin Missing Authorization Exposes Access Controls</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:40+03:00</news:publication_date>
      <news:title>WordPress AIWU Plugin SQLi: Unauthenticated Data Extraction</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2300/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-2300 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guard-k2810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T11:50:00+03:00</news:publication_date>
      <news:title>Mini Shai-Hulud Worm Hits TanStack, Mistral AI, Guardrails AI Packages</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/instructure-reaches-ransom-agreement-with-shinyhunters-to-st-xfe90/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:37:00+03:00</news:publication_date>
      <news:title>Instructure Reaches Ransom Agreement with ShinyHunters to Stop Canvas Leak</news:title><news:keywords>threat-intel, vulnerability, ransomware, data-breach, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1681/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-1681 — Issuing an ICMP ping via the `net ping` shell command to a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-1185 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0804/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-0804 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0802/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-0802 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-1287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0541/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-0541 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cushman-wakefield-310-431-breached-accounts-ak8xd/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:58:16+03:00</news:publication_date>
      <news:title>Cushman &amp; Wakefield Suffers ShinyHunters Data Extortion, 310K Accounts Breached</news:title><news:keywords>data-breach, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/openai-launches-daybreak-for-ai-powered-vulnerability-detect-sfxld/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:55:00+03:00</news:publication_date>
      <news:title>OpenAI Launches Daybreak for AI-Powered Vulnerability Detection</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41872/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41872: Kura Sushi App Vulnerable to MITM via Improper Certificate Validation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ios-26-5-brings-default-end-to-end-encrypted-rcs-messaging-b-69skb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T08:18:00+03:00</news:publication_date>
      <news:title>Apple iOS 26.5 Brings End-to-End Encrypted RCS Messaging</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T08:03:16+03:00</news:publication_date>
      <news:title>SMS-Based Disinformation Campaign Targets Mobile Users</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7287/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>Zyxel NWA1100-N Firmware DoS: CVE-2026-7287 Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7257/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7257 — The Configuration File Of Zyxel WRE6505 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-922</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7256/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>Zyxel WRE6505 v2: High-Severity Command Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7255 — The Web Management Interface Of Zyxel WRE6505 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45430/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-45430: Backdrop CMS Salesforce Module CSRF Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40137/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40137 — SAP TAF_APPLAUNCHER within Business Server Pages allows an</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40136/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40136 — SAP Financial Consolidation allows an authenticated</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40135/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40135 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40134/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40134 — Due to insufficient authorization checks in the SAP</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40133/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40133 — Due to missing authorization check in SAP S/4HANA Condition</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40132/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40132 — Due to missing authorization check in SAP Strategic</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40129/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-40129 — SAP Application Server ABAP For SAP NetWeaver And ABAP Platf Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34263/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>SAP Commerce Cloud: Critical RCE via Spring Security Misconfiguration</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-459</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>SAP S/4HANA SQLi: Critical Flaw Exposes Data, Risks Availability</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34259/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>SAP Forecasting &amp; Replenishment OS Command Execution (CVE-2026-34259)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34258/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34258 — SAPUI5 (Search UI) allows an unauthenticated attacker to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-451</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27682/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-27682 — SAP NetWeaver Application Server ABAP (Applications Based On Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0502/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-0502 — Due to insufficient CSRF protection in SAP BusinessObjects</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45321/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T04:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-45321: TanStack npm Packages Hit by Critical Supply Chain Attack</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-506</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T03:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-8349 — Omec-Project Amf Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-119</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8346/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T03:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-8346 — D-Link DIR-816 1.10CNB05_R1B011D88210 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:22+03:00</news:publication_date>
      <news:title>CVE-2026-8345 — D-Link DIR-816 1.10CNB05_R1B011D88210 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:22+03:00</news:publication_date>
      <news:title>Vaultwarden CVE-2026-43914: Brute-Force Bypass via 2FA Email</news:title><news:keywords>vulnerability, cve, high-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43913/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:22+03:00</news:publication_date>
      <news:title>Vaultwarden CVE-2026-43913: Unconfirmed Owners Can Purge Vaults</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43912/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>Vaultwarden CVE-2026-43912 Allows Org Data Access via Group Management Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43911 — Vaultwarden is a Bitwarden-compatible server written in</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43901/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43901 — Wireshark MCP is an MCP Server that turns tshark into a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43900/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43900: DeepChat XSS Bypass Threatens AI Implementations</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43899/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43899: DeepChat RCE Via Incomplete Patch for External Protocol Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34963/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:19:47+03:00</news:publication_date>
      <news:title>CVE-2026-34963: barebox EFI PE Loader Memory Safety Flaws</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34962/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:19:47+03:00</news:publication_date>
      <news:title>CVE-2026-34962 — barebox version prior to 2026.04.0 contains a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-835</news:keywords>
    </news:news>
  </url></urlset>
