<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/more-than-10-million-stolen-from-crypto-platform-thorchain-cuypo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:31:00+03:00</news:publication_date>
      <news:title>THORChain Suffers $10.7M Crypto Heist from Vault Compromise</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/funnel-builder-wordpress-plugin-bug-exploited-to-steal-credi-uvfof/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:30:33+03:00</news:publication_date>
      <news:title>Funnel Builder WordPress Plugin Exploited to Steal Credit Cards</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8686/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:05+03:00</news:publication_date>
      <news:title>coreMQTT CVE-2026-8686: DoS via Crafted MQTT v5.0 Packet</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:04+03:00</news:publication_date>
      <news:title>Vvveb CMS Vulnerability (CVE-2026-46408) Allows Cart Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:04+03:00</news:publication_date>
      <news:title>Vvveb CMS API Token Disclosure (CVE-2026-46407) High Severity</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46367/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:04+03:00</news:publication_date>
      <news:title>phpMyFAQ Stored XSS: Authenticated Users Can Steal Admin Sessions</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46366/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>phpMyFAQ Information Disclosure (CVE-2026-46366) Exposes Restricted Content</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46364/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46364: Critical SQL Injection in phpMyFAQ Unauthenticated API Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46361/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46361 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46359/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46359: phpMyFAQ SQL Injection via OAuth Token Claims</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45010/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:01+03:00</news:publication_date>
      <news:title>CVE-2026-45010: phpMyFAQ 2FA Bypass Grants Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44826/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:00+03:00</news:publication_date>
      <news:title>Vvveb CMS CVE-2026-44826 Allows Negative Order Totals, Exposing Merchants to Financial Fraud</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:56+03:00</news:publication_date>
      <news:title>CVE-2021-47966: PHP Timeclock SQLi Exposes Employee Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47965/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:56+03:00</news:publication_date>
      <news:title>WordPress Plugin WP Super Edit RCE via Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47964/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:56+03:00</news:publication_date>
      <news:title>Schlix CMS RCE (CVE-2021-47964) Exposes Servers to Authenticated Attackers</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47963/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:55+03:00</news:publication_date>
      <news:title>Anote 1.0 RCE via Persistent XSS (CVE-2021-47963)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47959/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:55+03:00</news:publication_date>
      <news:title>WordPress WPGraphQL DoS: Unauthenticated Attackers Can Crash Servers</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8695/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-8695: radare2 Use-After-Free Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-46383 — Microsoft APM is an open-source, community-driven</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45539/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>Microsoft APM Vulnerability CVE-2026-45539 Exposes AI Agent Files</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45037/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>Tabby Terminal Vulnerability CVE-2026-45037 Allows OS Protocol Handler Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45036/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45036: Tabby Terminal ZMODEM Flaw Enables Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44717/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44717: Critical RCE in MCP Calculate Server Due to `eval()`</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44714/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44714: bitcoinj Library Flaw Allows Arbitrary P2PKH/P2WPKH Spends</news:title><news:keywords>vulnerability, cve, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44641/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44641: Microsoft APM Plugin Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44310/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44310 — Gitsign is a keyless Sigstore to signing tool for Git</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-129, cwe-390</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44309 — Gitsign is a keyless Sigstore to signing tool for Git</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42207/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-42207 — Magento Long Term Support (LTS) is an unofficial,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41258/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:46+03:00</news:publication_date>
      <news:title>OpenMRS RCE: Critical Vulnerability Allows Unrestricted Java Reflection</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23695/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-23695 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/popular-node-ipc-npm-package-compromised-to-steal-credential-x3md6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:10:42+03:00</news:publication_date>
      <news:title>node-ipc npm Package Compromised to Steal Credentials</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-pers-tljha/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:10:25+03:00</news:publication_date>
      <news:title>Turla Transforms Kazuar Backdoor into Modular P2P Botnet</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45736/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T18:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-45736 — ws is an open source WebSocket client and server for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-908</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-big-tech-vs-canada-encryption-bill-cisco-s-f-iomva/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T17:52:16+03:00</news:publication_date>
      <news:title>Nvidia, Android, Audi, Canvas: Security Week Highlights Key Flaws</news:title><news:keywords>threat-intel, vulnerability, data-breach, cloud, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/four-openclaw-flaws-enable-data-theft-privilege-escalation-a7v6t/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T16:35:04+03:00</news:publication_date>
      <news:title>OpenClaw Flaws Chained for Data Theft, Persistence</news:title><news:keywords>threat-intel, vulnerability, malware, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-all-federal-agencies-to-patch-exploited-bug-in-c-dxy9y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T16:16:00+03:00</news:publication_date>
      <news:title>CISA Mandates Cisco SD-WAN Patch for Federal Agencies</news:title><news:keywords>threat-intel, data-breach, government, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/attackers-replaced-jdownloader-installer-downloads-with-malw-ne7yp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T15:45:47+03:00</news:publication_date>
      <news:title>JDownloader Installer Compromised, Delivering Python RAT via Unpatched CMS</news:title><news:keywords>malware, threat-intel, ransomware, vulnerability, data-breach, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8931/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T15:03:45+03:00</news:publication_date>
      <news:title>Robotic Lawn Mower Vulnerability: Remote Control Exposes Physical Risk</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/american-lending-center-data-breach-affects-123-000-individu-m967u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T14:06:55+03:00</news:publication_date>
      <news:title>American Lending Center Data Breach Exposes 123,000 Individuals</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/what-45-days-of-watching-your-own-tools-will-tell-you-about-5do30/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T14:00:00+03:00</news:publication_date>
      <news:title>Trusted Tools: The Silent Threat in Your Attack Surface</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41971/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41971 — Permission control vulnerability in the security control</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41970/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41970 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41969/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41969 — Permission control vulnerability in the projection module.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-275</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41968/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41968 — Permission control vulnerability in the manufacturability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41967/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41967 — Permission control vulnerability in the manufacturability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41966 — Permission control vulnerability in the smart sensing</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41965/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41965 — Use-After-Free</news:title><news:keywords>vulnerability, cve, medium-severity, use-after-free, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41964/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41964: High-Severity Web Permission Control Vulnerability Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, cwe-362</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41961/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-41961 — Permission control vulnerability in contacts. Impact:</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-41960 — Permission control vulnerability in calls. Impact:</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/gremlin-stealer-s-evolved-tactics-hiding-in-plain-sight-wit-271z9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:00:52+03:00</news:publication_date>
      <news:title>Gremlin Stealer Evolves with Advanced Obfuscation, Crypto Clipping</news:title><news:keywords>threat-intel, apt, malware, research, unit-42</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/teampcp-ups-the-game-releases-shai-hulud-worm-s-source-code-cpe3q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:47:09+03:00</news:publication_date>
      <news:title>TeamPCP Releases Shai-Hulud Worm Source Code, Incentivizes Supply Chain Attacks</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attac-obplf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:40:42+03:00</news:publication_date>
      <news:title>Microsoft Exchange Zero-Day Exploited via XSS in Outlook on the web</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8425/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-8425 — The Notify Odoo plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8398/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-8398: DAEMON Tools Lite Supply Chain Compromise</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-506</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7563/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7563 — The Classified Listing – AI-Powered Classified ads &amp;</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7046/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7046 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6415 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6403/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>WordPress Quick Playground Plugin Path Traversal (CVE-2026-6403)</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6228: WordPress Frontend Admin Plugin Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>WordPress Form Notify Plugin: Critical Authentication Bypass (CVE-2026-5229)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-4683 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4588/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:05:28+03:00</news:publication_date>
      <news:title>Google Pixel Contextual Suggestions Raise Privacy Concerns</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/chrome-148-update-patches-critical-vulnerabilities-yx1wy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:25:15+03:00</news:publication_date>
      <news:title>Chrome 148 Update Patches Critical Vulnerabilities</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6646/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-6646 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4094/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-4094: WooCommerce Currency Switcher Plugin Vulnerable to Data Loss</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41702/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:16:18+03:00</news:publication_date>
      <news:title>VMware Fusion TOCTOU Flaw Grants Root Privileges</news:title><news:keywords>vulnerability, cve, high-severity, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28761/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T09:16:20+03:00</news:publication_date>
      <news:title>Musetheque V4 CSRF Vulnerability (CVE-2026-28761) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24662/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T09:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-24662 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2652/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T06:16:23+03:00</news:publication_date>
      <news:title>mlflow Unauthenticated Access: FastAPI Routes Exposed in Versions &lt; 3.10.0</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/teampcp-hackers-advertise-mistral-ai-code-repos-for-sale-weqm4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:50:36+03:00</news:publication_date>
      <news:title>Mistral AI Source Code Advertised for Sale by TeamPCP</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6811/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-6811 — Stack exhaustion vulnerability in the MongoDB PHP driver</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-45248 — The GET /Api/V1/Demo/Registered-Users Endpoint That Authentication Bypass</news:title><news:keywords>vulnerability, cve, medium-severity, authentication-bypass, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44671/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:16:44+03:00</news:publication_date>
      <news:title>ZITADEL LDAP Filter Injection Exposes Usernames, Attributes</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-90</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45370/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45370: python-utcp Exposes Process Secrets via Environment Variables</news:title><news:keywords>vulnerability, cve, high-severity, cwe-526</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45369/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45369: Python-UTCP RCE via Unsanitized Shell Commands</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44673/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44673: libyang Integer Overflow Leads to Heap Corruption</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44661 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:46+03:00</news:publication_date>
      <news:title>PrestaShop XSS: Critical Back-Office Takeover via Customer Service View</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8634/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:21+03:00</news:publication_date>
      <news:title>CVE-2026-8634: Crabbox Environment Variable Exposure Critical Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8629/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:21+03:00</news:publication_date>
      <news:title>CVE-2026-8629: Crabbox Privilege Escalation Puts Shared Environments at Risk</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8597/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:21+03:00</news:publication_date>
      <news:title>Amazon SageMaker Python SDK: RCE via Missing Integrity Verification (CVE-2026-8597)</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-354</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8596/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:21+03:00</news:publication_date>
      <news:title>Amazon SageMaker Python SDK: CVE-2026-8596 Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-312</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44637/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:08+03:00</news:publication_date>
      <news:title>libsixel Signed Integer Overflow (CVE-2026-44637) Leads to Heap Write</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-190, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44636/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:08+03:00</news:publication_date>
      <news:title>CVE-2026-44636: libsixel Integer Overflow Leads to Heap Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43996/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:07+03:00</news:publication_date>
      <news:title>CVE-2026-43996 — OpenImageIO is a toolset for reading, writing, and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43909/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:07+03:00</news:publication_date>
      <news:title>CVE-2026-43909: OpenImageIO Vulnerability Exposes Apps to OOB Read/Write</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125, cwe-190, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43908/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:06+03:00</news:publication_date>
      <news:title>OpenImageIO CVE-2026-43908: High-Severity Integer Overflow Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-190, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43907/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:17:06+03:00</news:publication_date>
      <news:title>OpenImageIO CVE-2026-43907: Heap Overflow in DPX Processing</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-190, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-14</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-287, cwe-326, cwe-1391, cwe-89, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8621/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-8621: Crabbox Authentication Bypass Allows Impersonation</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45375/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-45375: Critical XSS in SiYuan Knowledge Management System</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-79, cwe-116</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45148/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-45148 — SiYuan is an open-source personal knowledge management</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45147/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-45147 — SiYuan is an open-source personal knowledge management</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44633/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:16:38+03:00</news:publication_date>
      <news:title>Live Helper Chat REST API Vulnerability Allows Unauthorized Chat Tampering</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44592/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:16:38+03:00</news:publication_date>
      <news:title>Gradient CI/CD System Critical Vulnerability Allows Unauthenticated Worker Registration</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306, cwe-345, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44586/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-44586: SiYuan Stored XSS Leads to RCE in Desktop App</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/openai-confirms-security-breach-in-tanstack-supply-chain-att-s9ovc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T22:07:24+03:00</news:publication_date>
      <news:title>OpenAI Confirms Breach in TanStack Supply Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-11-and-microsoft-edge-hacked-at-pwn2own-berlin-2026-xvl8t/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:53:50+03:00</news:publication_date>
      <news:title>Windows 11, Microsoft Edge Hacked at Pwn2Own Berlin</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/odni-taps-officials-to-coordinate-response-to-foreign-electi-92x49/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:21:00+03:00</news:publication_date>
      <news:title>ODNI Appoints Officials to Counter Foreign Election Threats for 2026</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-46470 — GStreamer Gst-Plugins-Good Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-369</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46469/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-46469 — GStreamer Gst-Plugins-Good Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-369</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44542/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-44542: Critical Path Traversal in FileBrowser Quantum</news:title><news:keywords>vulnerability, cve, critical, high-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44520/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-44520 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-601, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42897/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:49+03:00</news:publication_date>
      <news:title>Microsoft Exchange Server XSS Allows Network Spoofing (CVE-2026-42897)</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42572/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-42572 — Hatchet is a platform for orchestrating background tasks,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42334/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:47+03:00</news:publication_date>
      <news:title>Mongoose Query Sanitization Bypass Via $nor Operator (CVE-2026-42334)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41615/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:47+03:00</news:publication_date>
      <news:title>Microsoft Authenticator Critical Info Disclosure (CVE-2026-41615)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15024/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:35+03:00</news:publication_date>
      <news:title>CVE-2025-15024: Yordam Library Automation System Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15023/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T21:16:34+03:00</news:publication_date>
      <news:title>CVE-2025-15023: Yordam Library System Authorization Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/stealer-backdoor-found-in-3-node-ipc-versions-targeting-deve-h82s7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:22:43+03:00</news:publication_date>
      <news:title>Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44827/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:23+03:00</news:publication_date>
      <news:title>Diffusers RCE: Hugging Face Pipeline Loading Bypasses `trust_remote_code`</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44516/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-44516: Valtimo Logs Sensitive Data Regardless of Debug Settings</news:title><news:keywords>vulnerability, cve, high-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44514/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-44514 — Both The Desktop Deployment (Default Http://Localhost:7500)  Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1385</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44513/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-44513: Diffusers RCE Bypasses trust_remote_code Flag</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44511/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-44511: Katalyst Koi Admin Sessions Persist After Logout</news:title><news:keywords>vulnerability, cve, high-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44312/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-44312 — css_parser is a Ruby CSS parser. Prior to 2.1.0 and 1.22.0,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42555/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-42555: Valtimo RCE Via Spring Expression Language</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:20+03:00</news:publication_date>
      <news:title>Cisco Catalyst SD-WAN Manager XXE Flaw Allows Arbitrary File Read</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20210 — The Web UI Of Cisco Catalyst SD-WAN Manager, Formerly SD-WAN Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-779</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20209/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-20209 — The Web UI Of Cisco Catalyst SD-WAN Manager, Formerly SD-WAN Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-779</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20182/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-20182: Critical Authentication Bypass in Cisco SD-WAN Leads to Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62313/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:18+03:00</news:publication_date>
      <news:title>CVE-2025-62313 — HCL AION is affected by a vulnerability where adequate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62310/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:18+03:00</news:publication_date>
      <news:title>CVE-2025-62310 — HCL AION is affected by a vulnerability where encryption is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-319</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62308/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:17+03:00</news:publication_date>
      <news:title>CVE-2025-62308 — HCL AION is affected by a vulnerability where sensitive</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T20:16:16+03:00</news:publication_date>
      <news:title>CVE-2025-62305 — HCL AION is affected by a vulnerability where certain</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42589/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T19:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-42589: Gotenberg RCE via ExifTool Argument Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42283/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T19:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-42283: DevSpace UI WebSocket Exposes Developer Endpoints</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T19:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-40893: Gotenberg Allows Arbitrary File Manipulation</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-73, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-pan-os-rce-mythos-curl-bug-ai-tokeniz-9p27f/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T19:07:46+03:00</news:publication_date>
      <news:title>PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks Highlight Week&apos;s Exploits</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/18-year-old-nginx-vulnerability-allows-dos-potential-rce-pxead/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:43:41+03:00</news:publication_date>
      <news:title>NGINX Vulnerability: 18-Year-Old Flaw Allows DoS, Potential RCE</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44482/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44482: SoundCloud Client RCE via Malicious Track Metadata</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-79, cwe-94, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44375/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:48+03:00</news:publication_date>
      <news:title>Nerdbank.MessagePack Stack Overflow Vulnerability (CVE-2026-44375) Patched</news:title><news:keywords>vulnerability, cve, high-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44374/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44374 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42559/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-42559: RMCP Rust SDK Vulnerable to DNS Rebinding</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346, cwe-350</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42457/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:46+03:00</news:publication_date>
      <news:title>vCluster Platform Critical XSS (CVE-2026-42457) Bypasses Admin Restrictions</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41937/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-41937: Vvveb Unrestricted File Upload Enables RCE for Admins</news:title><news:keywords>vulnerability, cve, high-severity, cwe-61, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41935/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:46+03:00</news:publication_date>
      <news:title>Vvveb Prior to 1.0.8.3 Vulnerable to DoS via Uncontrolled Recursion</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-209, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41933/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-41933 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-548</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41932/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T18:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-41932 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6637/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-6637: PostgreSQL &apos;refint&apos; Module Allows RCE, SQLi</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-6575 — Buffer over-read in PostgreSQL function</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-126</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6479/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:25+03:00</news:publication_date>
      <news:title>PostgreSQL Denial-of-Service Vulnerability: CVE-2026-6479 Impacts Older Versions</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6478/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-6478 — Scram-Sha-256 Passwords, The Default In All Supported Releas Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-385</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6477/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-6477: PostgreSQL libpq Vulnerability Allows Superuser Client Stack Overwrite</news:title><news:keywords>vulnerability, cve, high-severity, cwe-242</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6476/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:25+03:00</news:publication_date>
      <news:title>PostgreSQL CVE-2026-6476: SQL Injection Grants Superuser Access</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6475/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-6475: PostgreSQL Symlink Vulnerability Allows Superuser Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-61</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6474/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-6474 — Externally-controlled format string in PostgreSQL</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-134</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6473/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:24+03:00</news:publication_date>
      <news:title>PostgreSQL Vulnerability CVE-2026-6473 Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6472/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-6472 — Missing authorization in PostgreSQL CREATE TYPE allows an</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15025/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:16:15+03:00</news:publication_date>
      <news:title>CVE-2025-15025: Yordam Library System Authorization Bypass Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ghostwriter-targets-ukrainian-government-with-geofenced-pdf-5vqzd/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:00:37+03:00</news:publication_date>
      <news:title>Ghostwriter Targets Ukrainian Government with Geofenced PDF Phishing</news:title><news:keywords>threat-intel, vulnerability, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6008/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-6008 — Im Park Information Technology, Electronics, Press, Publishi Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4031/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:16:20+03:00</news:publication_date>
      <news:title>Database Backup for WordPress Plugin Vulnerable to Auth Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4030/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-4030: WordPress Plugin Exposes Multisite Files to Unauthenticated Attackers</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4029/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-4029: WordPress Multisite Plugin Exposes Database</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43644/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-43644 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-12008/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:16:16+03:00</news:publication_date>
      <news:title>CVE-2025-12008: Yaay Social Media App Authorization Bypass Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mythos-proves-potent-in-vulnerability-discovery-less-convin-yv0gg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:00:00+03:00</news:publication_date>
      <news:title>Mythos Tool Excels at Code Audits, Falls Short on Exploit Validation, Benchmarking Shows</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/how-ai-hallucinations-are-creating-real-security-risks-yly1v/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T14:30:00+03:00</news:publication_date>
      <news:title>AI Hallucinations Pose Critical Infrastructure Security Risk</news:title><news:keywords>threat-intel, vulnerability, ai-security, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2347/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T13:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-2347: Critical Authorization Bypass in Akilli E-Commerce Website</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-11024/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T13:16:17+03:00</news:publication_date>
      <news:title>CVE-2025-11024: Akilli E-Commerce Blind SQLi Critical Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-zero-days-expose-bitlocker-bypasses-and-ctfmon-privi-uqpat/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T12:25:50+03:00</news:publication_date>
      <news:title>Windows Zero-Days Expose BitLocker Bypass, CTFMON Privilege Escalation</news:title><news:keywords>threat-intel, vulnerability, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6514/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T12:16:28+03:00</news:publication_date>
      <news:title>WordPress InfusedWoo Pro Plugin Vulnerable to Arbitrary File Read (CVE-2026-6514)</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6512/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6512: Critical Authorization Bypass in InfusedWoo Pro WordPress Plugin</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6504/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6504 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6206 — The MW WP Form plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6174/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6174 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6145/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-6145 — The User Registration &amp; Membership plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/high-severity-vulnerability-patched-in-vmware-fusion-ifs4o/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T11:42:25+03:00</news:publication_date>
      <news:title>VMware Fusion High-Severity Vulnerability Patched</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges-jfar5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:34:19+03:00</news:publication_date>
      <news:title>Fragnesia Linux Flaw (CVE-2026-46300) Grants Root Privileges</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/researcher-drops-yellowkey-greenplasma-windows-zero-days-zgj79/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:27:42+03:00</news:publication_date>
      <news:title>Windows YellowKey &amp; GreenPlasma Zero-Days Released</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6670/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-6670 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6510/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-6510: Critical Privilege Escalation in InfusedWoo Pro WordPress Plugin</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6506/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:20+03:00</news:publication_date>
      <news:title>InfusedWoo Pro Plugin Privilege Escalation (CVE-2026-6506)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6271/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-6271: WordPress Career Section Plugin RCE via File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6252/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-6252 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-6225 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5395/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:20+03:00</news:publication_date>
      <news:title>WordPress Fluent Forms IDOR Exposes Sensitive Data, Bypasses Access Controls</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5365/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-5365 — The LatePoint plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-5193 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3892/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:19+03:00</news:publication_date>
      <news:title>WordPress Motors Plugin: Authenticated File Deletion Vulnerability (CVE-2026-3892)</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3718/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:19+03:00</news:publication_date>
      <news:title>ManageWP Worker Plugin Vulnerable to Unauthenticated XSS (CVE-2026-3718)</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3694/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T10:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-3694 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8280/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-8280 — GitLab CE/EE Affecting All Versions From 8.3 Before 18.9.7,  Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8181/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-8181: WordPress Burst Statistics Plugin Critical Auth Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7481/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:25+03:00</news:publication_date>
      <news:title>GitLab CVE-2026-7481: Developer XSS Vulnerability Patched</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:25+03:00</news:publication_date>
      <news:title>GitLab EE XSS (CVE-2026-7377) Allows JavaScript Execution in Dashboards</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6073/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:24+03:00</news:publication_date>
      <news:title>GitLab XSS Vulnerability (CVE-2026-6073) Puts User Sessions at Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5396/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:24+03:00</news:publication_date>
      <news:title>Fluent Forms CVE-2026-5396: Authorization Bypass Threatens WordPress Submissions</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5243/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-5243 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4527/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-4527 — GitLab CE/EE Affecting All Versions From 11.10 Before 18.9.7 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4524/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-4524 — GitLab CE/EE Affecting All Versions From 18.9.1 Before 18.9. Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1659/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:21+03:00</news:publication_date>
      <news:title>GitLab CVE-2026-1659: Unauthenticated DoS Risk Patched</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1322/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-1322 — GitLab CE/EE Affecting All Versions From 16.0 Before 18.9.7, Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1184/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-1184 — GitLab EE Affecting All Versions From 11.9 Before 18.9.7, 18 Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:21+03:00</news:publication_date>
      <news:title>CVE-2025-15345 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-80</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14870/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:20+03:00</news:publication_date>
      <news:title>GitLab CVE-2025-14870: Unauthenticated DoS Risk in CE/EE</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14869/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:16:20+03:00</news:publication_date>
      <news:title>GitLab DoS Vulnerability (CVE-2025-14869) Impacts Unauthenticated Users</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8925/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:01:49+03:00</news:publication_date>
      <news:title>File Converter Sites: A Growing Vector for Data Theft and Malware</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/18-year-old-nginx-rewrite-module-flaw-enables-unauthenticate-mglgg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T09:00:09+03:00</news:publication_date>
      <news:title>NGINX Rewrite Module Flaw (CVE-2026-42945) Enables Unauthenticated RCE</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7648/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T08:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-7648 — The LearnPress – WordPress LMS Plugin for Create and Sell</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7525/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T08:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-7525 — The My Calendar – Accessible Event Manager plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5361/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T08:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-5361 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T07:47:57+03:00</news:publication_date>
      <news:title>Dream Market Admin &apos;Speedstepper&apos; Arrested for Crypto and Gold Laundering</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5486/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T07:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-5486 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46446/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T07:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46446: SOGo SQL Injection Exposes Cleartext Passwords</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46445/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T07:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46445: High-Severity SQL Injection Impacts SOGo with PostgreSQL</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4585/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T07:04:38+03:00</news:publication_date>
      <news:title>Debian Bolsters Supply Chain Security with Reproducible Builds Mandate</news:title><news:keywords>tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/abrigo-711-099-breached-accounts-9ug3b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T06:37:50+03:00</news:publication_date>
      <news:title>Abrigo Data Breach: ShinyHunters Extortion Exposes 700K Contacts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46419/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T05:17:21+03:00</news:publication_date>
      <news:title>Yubico webauthn-server-core Vulnerability Leads to Impersonation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-253</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44919/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T05:17:21+03:00</news:publication_date>
      <news:title>CVE-2026-44919 — In OpenStack Ironic through 35.x before a3f6d73, during</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-696</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41281/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T03:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41281 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-319</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32991/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T02:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-32991: Team Member Privilege Escalation to Owner Account</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T02:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-29206: SQL Injection in sqloptimizer via Slow Query Logs</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45158/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:46+03:00</news:publication_date>
      <news:title>OPNsense RCE: Critical Flaw Allows Root Access via DHCP Input</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44478/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:46+03:00</news:publication_date>
      <news:title>Hoppscotch CVE-2026-44478: Unauthenticated Infrastructure Secret Leak</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44471/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-44471: gitoxide Symlink Vulnerability Exposes Filesystem to Attack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44447/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>ERPNext SQL Injection (CVE-2026-44447) Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44446/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-44446: ERPNext SQL Injection Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44442/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>ERPNext Critical Authorization Bypass (CVE-2026-44442)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44440/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-44440 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-44426 — ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44424/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-44424 — ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44423/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-44423 — ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44194/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>OPNsense RCE: Critical Flaw Allows Root Access Via Malformed Email Address</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>OPNsense RCE Vulnerability (CVE-2026-44193) Exposes Firewalls</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-32993: Unauthenticated HTTP Header Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-32992: DNS Cluster SSL Verification Disabled, High-Severity MiTM Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T01:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-29205: Arbitrary File Read via cpdavd Endpoints</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/iranian-hackers-targeted-major-south-korean-electronics-make-wxxy8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:59:33+03:00</news:publication_date>
      <news:title>MuddyWater Targets South Korean Electronics Giant in Espionage Campaign</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45714/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:50+03:00</news:publication_date>
      <news:title>CubeCart CVE-2026-45714: Authenticated RCE Via Template Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45708/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CubeCart RCE (CVE-2026-45708) Allows Unauthenticated Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>Quark Drive Mass Assignment Flaw Grants Admin Takeover</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45228 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45055/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45055: CubeCart Password Reset Flaw Leads to Account Takeover</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-345, cwe-601, cwe-784</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45054/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45054 — CubeCart is an ecommerce software solution. Prior to 6.7.0,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45053/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:49+03:00</news:publication_date>
      <news:title>CubeCart RCE: Critical Flaw Exposes E-commerce Stores to Webshells</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44377: Critical RCE in CubeCart eCommerce Platform</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44376 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44373/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44373 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42602/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-42602: Azure Authenticator Extension Authentication Bypass</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-208, cwe-287, cwe-290, cwe-294, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42561/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-42561: Python-Multipart DoS Vulnerability Patched</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-42304: Twisted DNS DoS Freezes Servers with Chained Pointers</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-407</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39358/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:46+03:00</news:publication_date>
      <news:title>CubeCart SQLi Vulnerability (CVE-2026-39358) Exposes E-commerce Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21821/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T00:16:41+03:00</news:publication_date>
      <news:title>HCL BigFix SCM Reporting Site Vulnerable to XSS via Outdated jQuery</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-1104</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44351/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-44351: Critical fast-jwt Auth Bypass via Empty Key</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287, cwe-326, cwe-1391</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42552/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-42552: Flight PHP Framework Leaks Critical Server Info</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-209</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42551/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>Flight PHP Framework CVE-2026-42551: CSRF &amp; Cache Poisoning Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42550/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-42550: Flight PHP Framework SQL Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42549/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-42549 — Flight is an extensible micro-framework for PHP. Prior to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33381/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33381 — When a user&apos;s access to mint tokens for a service account</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33380/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33380 — SQL Expressions Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33378 — Using the $__timeGroup macro, one can achieve an OOM by</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33377: Dashboard Privilege Escalation Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-33376: IPv6 Auth Proxy Bypass Risk</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-28383 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28380/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-28380 — Any Editor could delete any snapshot, even if they have no</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28379/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-28379 — Race Condition</news:title><news:keywords>vulnerability, cve, medium-severity, race-condition</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-28376 — The Grafana Live push endpoint can be exploited to cause</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28374/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-28374 — Editors could delete any annotation, even those they do not</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-13</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-328, cwe-648, remote-code-execution, cwe-502, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/alleged-dream-market-admin-arrested-in-germany-after-us-indi-6dx3x/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T22:54:00+03:00</news:publication_date>
      <news:title>Dream Market Admin Arrested in Germany After US Indictment</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url></urlset>
