<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41355/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:42+03:00</news:publication_date>
      <news:title>OpenShell Mirror Mode Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41353/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:42+03:00</news:publication_date>
      <news:title>OpenClaw: High-Severity Access Control Bypass Looms</news:title><news:keywords>vulnerability, cve, high-severity, cwe-472</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41352/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:42+03:00</news:publication_date>
      <news:title>OpenClaw RCE: Paired Nodes Bypass Auth, Allow Arbitrary Commands</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:41+03:00</news:publication_date>
      <news:title>OpenClaw LLM Agent Bypass: Silent Execution Approval Disabled</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41347/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:41+03:00</news:publication_date>
      <news:title>OpenClaw CSRF Vulnerability: High-Severity Risk in Trusted-Proxy Deployments</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41342/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:40+03:00</news:publication_date>
      <news:title>OpenClaw Authentication Bypass Poses Remote Onboarding Risk</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41336/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:39+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability: Arbitrary Code Execution via .env File Override</news:title><news:keywords>vulnerability, cve, high-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:38+03:00</news:publication_date>
      <news:title>Critical SSRF in Microsoft Entra ID Entitlement Management</news:title><news:keywords>vulnerability, cve, critical, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33819/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:37+03:00</news:publication_date>
      <news:title>Critical Deserialization RCE in Microsoft Bing (CVE-2026-33819)</news:title><news:keywords>vulnerability, cve, critical, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33102/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:37+03:00</news:publication_date>
      <news:title>M365 Copilot Critical Open Redirect Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, critical, high-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:35+03:00</news:publication_date>
      <news:title>Critical SSRF in Microsoft Dynamics 365 Poses Spoofing Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32172/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:33+03:00</news:publication_date>
      <news:title>Microsoft Power Apps Vulnerability Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:26+03:00</news:publication_date>
      <news:title>Critical KTransformers Unsafe Deserialization Vulnerability (CVE-2026-26210)</news:title><news:keywords>vulnerability, cve, critical, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26150/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:23+03:00</news:publication_date>
      <news:title>Microsoft Purview SSRF: Privilege Escalation Risk</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24303/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:22+03:00</news:publication_date>
      <news:title>Critical Privilege Escalation in Microsoft Partner Center</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-pl-htqmk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:33:45+03:00</news:publication_date>
      <news:title>Breeze Cache Plugin Exploit: Unauthenticated File Upload Hits WordPress</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6942/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:06+03:00</news:publication_date>
      <news:title>Critical RCE Flaw in radare2-mcp: Command Injection via JSON-RPC</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6941/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-6941 — Its Project Notes Handling That Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:06+03:00</news:publication_date>
      <news:title>Radare2 Path Traversal Flaw: Local Attackers Can Delete Arbitrary Directories</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28525/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-28525 — The Multipart Upload Parser In Mongoose_multipart.C That Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-125, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/frontier-ai-and-the-future-of-defense-your-top-questions-an-1z8qk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:45:50+03:00</news:publication_date>
      <news:title>Frontier AI: CISO Questions and Defensive Realities</news:title><news:keywords>threat-intel, apt, malware, research</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41272/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise SSRF Bypass: DNS Rebinding Opens LLM Flows to Attackers</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41271/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise SSRF Vulnerability Exposes Internal Systems</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41270/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise SSRF Bypass: Internal Network at Risk</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-284, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41269/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise RCE via Malicious JavaScript Uploads</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41268/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise RCE: Unauthenticated Command Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41267/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise Cloud Vulnerability Exposes Multi-Tenant Environments</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41138/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:14+03:00</news:publication_date>
      <news:title>Flowise RCE: Unchecked Input Leads to Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/us-sanctions-cambodian-senator-for-millions-earned-through-s-h3to2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:07:00+03:00</news:publication_date>
      <news:title>US Sanctions Cambodian Senator for Massive Scam Compound Operations</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-23</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-20, cwe-190, cwe-345, cwe-1284, cwe-617</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>Contour Kubernetes Ingress: Lua Code Injection Leads to Envoy RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>Pretalx XSS: Organizer Search Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>CVE-2026-41213 — @node-oauth/oauth2-server is a module for implementing an</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307, cwe-1289</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41173/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>CVE-2026-41173 — The AWS X-Ray Remote Sampler package provides a sampler</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41078/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:28+03:00</news:publication_date>
      <news:title>CVE-2026-41078 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40894/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:28+03:00</news:publication_date>
      <news:title>CVE-2026-40894 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40886/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:28+03:00</news:publication_date>
      <news:title>Argo Workflows Crash Loop: Malformed Annotation Halts Processing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-129</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31173/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:25+03:00</news:publication_date>
      <news:title>CVE-2026-31173 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31169/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:25+03:00</news:publication_date>
      <news:title>CVE-2026-31169 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31168/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31168 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31167 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31163/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31163 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31162/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31162 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-us-agency-breached-through-cisco-vulnerability-firest-imlfx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:03:00+03:00</news:publication_date>
      <news:title>CISA Breach: Cisco Vulnerability Led to Persistent Backdoor</news:title><news:keywords>threat-intel, data-breach, government, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4535/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:01:18+03:00</news:publication_date>
      <news:title>Firefox and Tor Browser Uniquely Vulnerable to Stable Identifier Leak</news:title><news:keywords>identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-s-g4igl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:59:39+03:00</news:publication_date>
      <news:title>Trigona Ransomware Leverages Custom Data Exfiltration Tool</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/surveillance-companies-exploiting-telecom-system-to-spy-on-t-69gpn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:43:00+03:00</news:publication_date>
      <news:title>Surveillance Firms Weaponize Telecom Flaws for Location Tracking</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6921/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-6921 — Race in GPU in Google Chrome on Windows prior to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-362, cwe-362</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6920/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:30+03:00</news:publication_date>
      <news:title>Chrome on Android GPU Vulnerability Allows Sandbox Escape</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41909/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41909 — Paired-Device Pairing Management That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41908/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41908 — The Assistant-Media Route That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40891/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-40891 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40182/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-40182 — OpenTelemetry dotnet is a dotnet telemetry framework. From</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31179/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-31179 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31176/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-31176 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31159/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-31159 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-depl-khwgm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:00+03:00</news:publication_date>
      <news:title>UNC6692 Impersonates IT Helpdesk via Microsoft Teams with SNOW Malware</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8813/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:31:51+03:00</news:publication_date>
      <news:title>Bitwarden CLI npm Package Briefly Compromised in Supply Chain Attack</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41239 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79, cwe-1289</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41238/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41238 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40472/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:25+03:00</news:publication_date>
      <news:title>Critical XSS in hackage-server via Malicious .cabal Metadata</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40471/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:25+03:00</news:publication_date>
      <news:title>Critical CSRF Flaw in hackage-server Poses Supply Chain Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:25+03:00</news:publication_date>
      <news:title>Critical XSS in Hackage Server Exposes User Sessions</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34003/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>X.Org X Server Flaw: Local Attackers Exploit OOB Memory Access</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>X.Org Server Flaw: Use-After-Free Threatens Linux Desktops</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-825</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33999/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>X.Org Server Underflow: Local RCE and DoS Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23751/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>Critical Kofax Capture RCE Vulnerability: Unauthenticated Access to Files and NTLMv2 Coercion</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306, cwe-441</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62373/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>Critical RCE in Pipecat Python Framework: CVE-2025-62373</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool-g75f0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:05:12+03:00</news:publication_date>
      <news:title>Checkmarx KICS Supply Chain Compromise Exposes Developer Data</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-linked-hackers-targeted-mongolian-government-using-sla-5p8mn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:03:00+03:00</news:publication_date>
      <news:title>China-Linked GopherWhisper APT Targets Mongolian Government via Slack, Discord</news:title><news:keywords>threat-intel, data-breach, government, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-9hrc5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:42:00+03:00</news:publication_date>
      <news:title>Bitwarden CLI Compromised in Checkmarx Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/house-republicans-unveil-data-privacy-law-that-would-overrid-6hpr2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:30:00+03:00</news:publication_date>
      <news:title>House Republicans Unveil Federal Data Privacy Bill, Threatening State Laws</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-prox-82xp3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:17:00+03:00</news:publication_date>
      <news:title>Supply Chain Exploits &amp; DeFi Hacks: Old Bugs, New Targets</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39440/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:16:11+03:00</news:publication_date>
      <news:title>Critical Code Injection Flaw in FunnelFormsPro Exposes Remote Execution Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-66286/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:16:11+03:00</news:publication_date>
      <news:title>CVE-2025-66286 — An API design flaw in WebKitGTK and WPE WebKit allows</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13763/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:16:09+03:00</news:publication_date>
      <news:title>CVE-2025-13763 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/medical-data-of-500-000-britons-put-up-for-sale-on-chinese-w-y9bmc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T16:02:00+03:00</news:publication_date>
      <news:title>UK Biobank Data Leaked, Found on Chinese E-commerce Site</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28040/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:17:01+03:00</news:publication_date>
      <news:title>CVE-2026-28040 — Magepeople Inc. Taxi Booking Manager For WooCommerce Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62110/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:17:01+03:00</news:publication_date>
      <news:title>CVE-2025-62110 — Rescue Themes Rescue Shortcodes Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62104/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:17:01+03:00</news:publication_date>
      <news:title>CVE-2025-62104 — Navneil Naicker ACF Galerie Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8808/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:16:58+03:00</news:publication_date>
      <news:title>Cyera Acquires Ryft for Over $100M in Israeli Cybersecurity Exit</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-mythos-reality-check-beating-automated-exploitati-bewj5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:03:00+03:00</news:publication_date>
      <news:title>AI Accelerates Exploitation: The Collapsing Exploit Window</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1991/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:00:00+03:00</news:publication_date>
      <news:title>Supply Chain Attack Targets Checkmarx Software Packages</news:title><news:keywords>incd, israel, advisory, alert</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/project-glasswing-proved-ai-can-find-the-bugs-who-s-going-t-2j29a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:30:00+03:00</news:publication_date>
      <news:title>AI Finds Bugs Fast: Anthropic&apos;s Project Glasswing Fuels Pre-Emptive Patching</news:title><news:keywords>threat-intel, vulnerability, microsoft, ai-security, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-feds-to-patch-bluehammer-flaw-exploited-as-zero-1vinf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:05:57+03:00</news:publication_date>
      <news:title>CISA Mandates Patching of Zero-Day Microsoft Defender Flaw</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/luxury-cosmetics-giant-rituals-discloses-data-breach-62bg3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:04:51+03:00</news:publication_date>
      <news:title>Luxury Cosmetics Giant Rituals Discloses Data Breach</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6903/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:16:18+03:00</news:publication_date>
      <news:title>LabOne Web Server Suffers Arbitrary File Read Flaw</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-22, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6887/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:16:18+03:00</news:publication_date>
      <news:title>Critical SQL Injection in End-of-Life Borg SPM 2007</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6886/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:16:18+03:00</news:publication_date>
      <news:title>Critical Authentication Bypass in End-of-Life Borg SPM 2007</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-1390</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6885/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:16:18+03:00</news:publication_date>
      <news:title>Critical Borg SPM 2007 Vulnerability Allows Unauthenticated Remote Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5464/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:16:18+03:00</news:publication_date>
      <news:title>WordPress Plugin Flaw Allows Arbitrary Plugin Installation and RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-3960 — Remote Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/can-ai-attack-the-cloud-lessons-from-building-an-autonomous-hzp2r/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:00:31+03:00</news:publication_date>
      <news:title>AI Unleashed: Autonomous Cloud Attacks Now a Reality, Unit 42 Warns</news:title><news:keywords>threat-intel, apt, malware, research, cloud, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/zealot-shows-what-ai-s-capable-of-in-staged-cloud-attack-9bg9b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:00:00+03:00</news:publication_date>
      <news:title>Zealot AI: Cloud Attacks Outpace Human Defenders</news:title><news:keywords>threat-intel, tools, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-linked-gopherwhisper-infects-12-mongolian-government-s-comgi/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:04:00+03:00</news:publication_date>
      <news:title>GopherWhisper APT Targets Mongolian Government with Go Backdoors</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vercel-finds-more-compromised-accounts-in-context-ai-linked-y5lpa/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:40:00+03:00</news:publication_date>
      <news:title>Vercel Confirms Additional Customer Accounts Compromised in Context.ai Breach</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/recent-microsoft-defender-vulnerability-exploited-as-zero-da-dn3vq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:00:36+03:00</news:publication_date>
      <news:title>Zero-Day Flaw in Microsoft Defender Leveraged by Attackers</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41040/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:16:41+03:00</news:publication_date>
      <news:title>GROWI ReDoS Vulnerability (CVE-2026-41040) Poses High DoS Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-1333</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34488/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:16:40+03:00</news:publication_date>
      <news:title>IP Setting Software Vulnerability Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41990/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-41990 — Libgcrypt before 1.12.2 mishandles Dilithium signing.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41989/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-41989 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-41233 — Froxlor is open source server administration software.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41232/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-41232 — Froxlor is open source server administration software.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40529/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-40529 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8806/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:10:46+03:00</news:publication_date>
      <news:title>Physical Manipulation Spoofs Data for $34,000 Payout</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4531/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:00:35+03:00</news:publication_date>
      <news:title>Iran Claims US Exploited Network Gear Backdoors</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41231/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:16:19+03:00</news:publication_date>
      <news:title>Froxlor Vulnerability Grants Root Ownership of Arbitrary Directories</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41230/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:16:19+03:00</news:publication_date>
      <news:title>Froxlor Critical Flaw Allows Arbitrary DNS Record Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:16:19+03:00</news:publication_date>
      <news:title>Froxlor Critical RCE: Unsanitized Admin Input Leads to Persistent Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:16:19+03:00</news:publication_date>
      <news:title>Critical Froxlor Bug: Authenticated Code Execution via Language File Path Traversal</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-98</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3361/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-3361 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3007/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-3007 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2286/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T06:56:37+03:00</news:publication_date>
      <news:title>Apple Patches Critical Notification Data Leak Vulnerability</news:title><news:keywords>israel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3844/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T06:16:17+03:00</news:publication_date>
      <news:title>Critical RCE Flaw in Breeze Cache WordPress Plugin</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T06:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-2951 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41679/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T05:16:19+03:00</news:publication_date>
      <news:title>Critical RCE in Paperclip AI Orchestration Platform (CVE-2026-41679)</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-287, cwe-862, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41208/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T05:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-41208: Paperclip AI Agent Privilege Escalation to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41182/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T05:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-41182 — LangSmith Client SDKs provide SDK&apos;s for interacting with</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-359, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41180/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T05:16:15+03:00</news:publication_date>
      <news:title>PsiTransfer RCE: Unauthenticated Code Execution via Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1923/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T05:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-1923 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6878/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-6878 — ByteDance Verl Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-264, cwe-265</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6874/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-6874 — A vulnerability was determined in ericc-ch copilot-api up</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-350</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5935/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:46+03:00</news:publication_date>
      <news:title>IBM Storage Console Flaw: Unauthenticated RCE Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5926/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-5926 — IBM Verify Identity Access Container 11.0 through 11.0.2</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4919/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-4919 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4918/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-4918 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4917/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-4917 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40062/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:45+03:00</news:publication_date>
      <news:title>Ziostation2 Path Traversal Exposes Sensitive OS Info</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3621/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:45+03:00</news:publication_date>
      <news:title>IBM WebSphere Liberty Identity Spoofing: High-Severity Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32679/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-32679: DLL Hijacking in LiveOn Meet and Canon Camera Installers</news:title><news:keywords>vulnerability, cve, high-severity, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1352/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-1352 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1274/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-1274 — IBM Guardium Data Protection 12.0, 12.1, and 12.2 is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-36074/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:16:43+03:00</news:publication_date>
      <news:title>CVE-2025-36074 — IBM Security Verify Directory (Container) 10.0.0 through</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41455/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T01:16:32+03:00</news:publication_date>
      <news:title>WeKan SSRF Vulnerability: Internal Network Exposure Risk</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41454/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T01:16:32+03:00</news:publication_date>
      <news:title>Wekan API Flaw Grants Board Members Admin Powers</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41177/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-41177 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-73, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41175/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T01:16:31+03:00</news:publication_date>
      <news:title>Statamic CMS Vulnerability Allows Data Deletion via API Manipulation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-470</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40517/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T01:16:31+03:00</news:publication_date>
      <news:title>Radare2 Command Injection: Malicious PDB Files Execute OS Commands</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:17:09+03:00</news:publication_date>
      <news:title>Jellystat SQLi to RCE Critical Vulnerability (CVE-2026-41167)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41166/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:17:09+03:00</news:publication_date>
      <news:title>OpenRemote Privilege Escalation: Master Realm at Risk</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40937/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:17:08+03:00</news:publication_date>
      <news:title>RustFS Flaw: Non-Admin Takeover of Notification Targets</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:17:08+03:00</news:publication_date>
      <news:title>OpenRemote XXE Flaw Exposes IoT Platforms to File Disclosure</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-611</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34068/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:17:08+03:00</news:publication_date>
      <news:title>CVE-2026-34068 — nimiq-transaction provides the transaction primitive to be</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33733/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:17:05+03:00</news:publication_date>
      <news:title>EspoCRM Path Traversal: Admin Creds Lead to Arbitrary File Access</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33656/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:17:05+03:00</news:publication_date>
      <news:title>EspoCRM Critical Path Traversal: Admin Access Leads to Server Compromise</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/apple-fixes-ios-bug-that-retained-deleted-notification-data-r98js/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:58:58+03:00</news:publication_date>
      <news:title>Apple Patches iOS Notification Data Retention Flaw</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-korean-hackers-siphon-more-than-12-million-from-crypt-v0brf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:48:00+03:00</news:publication_date>
      <news:title>North Korean Hackers Net Over $12M in Q1 2026 Crypto Scams</news:title><news:keywords>threat-intel, data-breach, government, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-director-pick-sean-plankey-withdraws-his-nomination-ltvbs/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:29:41+03:00</news:publication_date>
      <news:title>CISA Director Nominee Sean Plankey Withdraws, Agency Faces Leadership Void</news:title><news:keywords>threat-intel, policy, government, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34066/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-34066 — nimiq-blockchain provides persistent block storage for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-20, cwe-617, cwe-754</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34065/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:16:41+03:00</news:publication_date>
      <news:title>Nimiq Primitives Node Panic via Malformed BLS Key</news:title><news:keywords>vulnerability, cve, high-severity, cwe-252, cwe-755</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34064/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-34064 — nimiq-account contains account primitives to be used in</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34063/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:16:40+03:00</news:publication_date>
      <news:title>Nimiq network-libp2p Crash Vulnerability: CVE-2026-34063</news:title><news:keywords>vulnerability, cve, high-severity, cwe-617</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34062/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-34062 — nimiq-libp2p is a Nimiq network implementation based on</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33471/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:16:40+03:00</news:publication_date>
      <news:title>Critical Nimiq Block Vulnerability: SkipBlockProof Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-190, cwe-345, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-mirai-campaign-exploits-rce-flaw-in-eol-d-link-routers-9l6w1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:04:46+03:00</news:publication_date>
      <news:title>Mirai Botnet Exploits End-of-Life D-Link Routers via RCE</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-22</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, remote-code-execution, cwe-502, cwe-400, critical, cwe-862, code-execution</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41469/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:17:09+03:00</news:publication_date>
      <news:title>CVE-2026-41469 — Beghelli Sicuro24 SicuroWeb does not enforce a Content</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41468/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:17:08+03:00</news:publication_date>
      <news:title>Beghelli SicuroWeb: EOL AngularJS Exposes Operators to Session Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1104</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41459/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:17:08+03:00</news:publication_date>
      <news:title>CVE-2026-41459 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:17:04+03:00</news:publication_date>
      <news:title>Critical RCE in Xerte Online Toolkits: Incomplete Input Validation Opens Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34414/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:17:04+03:00</news:publication_date>
      <news:title>Xerte Online Toolkits Vulnerability: Path Traversal Risks Exposed</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34413/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:17:02+03:00</news:publication_date>
      <news:title>Xerte Online Toolkits RCE: Unauthenticated File Operations</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26354/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:17:00+03:00</news:publication_date>
      <news:title>Dell PowerProtect DD OS Vulnerability Exposes Data to Remote Command Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8803/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:57:53+03:00</news:publication_date>
      <news:title>Volo Protocol Loses $3.5 Million in Digital Assets</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/malicious-kics-docker-images-and-vs-code-extensions-hit-chec-9wfha/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:55:00+03:00</news:publication_date>
      <news:title>Malicious KICS Docker Images and VS Code Extensions Hijack Checkmarx Supply Chain</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2285/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:28:36+03:00</news:publication_date>
      <news:title>Anthropic Claude Desktop Implants Browser Bridge, Bypassing Sandboxes</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5816/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:44+03:00</news:publication_date>
      <news:title>GitLab XSS Flaw: Unauthenticated JavaScript Execution Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-41</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5262/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:44+03:00</news:publication_date>
      <news:title>GitLab Vulnerability Exposes Sensitive Tokens in Storybook</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4922/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:44+03:00</news:publication_date>
      <news:title>GitLab CSRF Flaw Exposes Authenticated Users to Unauthenticated Attacks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35368/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:40+03:00</news:publication_date>
      <news:title>Chroot Vulnerability Allows Root Privileges via Malicious NSS Modules</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-426</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35365/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-35365 — The mv utility in uutils coreutils improperly handles</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35352/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:37+03:00</news:publication_date>
      <news:title>TOCTOU Flaw in coreutils mkfifo: Local Privilege Escalation Risk</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35350/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-35350 — The cp utility in uutils coreutils fails to properly handle</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-281</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-35349 — The Rm Utility Of Uutils Coreutils Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35341/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:36+03:00</news:publication_date>
      <news:title>uutils mkfifo Flaw Exposes Sensitive Files to Permission Changes</news:title><news:keywords>vulnerability, cve, high-severity, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35338/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:35+03:00</news:publication_date>
      <news:title>chmod Bypass Threatens System Integrity: CVE-2026-35338 Detailed</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32885/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-32885 — DDEV is an open-source tool for running local web</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1660/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-1660 — GitLab CE/EE Affecting All Versions From 12.3 Before 18.9.6, Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-6016/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:33+03:00</news:publication_date>
      <news:title>CVE-2025-6016 — GitLab CE/EE Affecting All Versions From 9.2 Before 18.9.6,  Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-3922/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:33+03:00</news:publication_date>
      <news:title>CVE-2025-3922 — GitLab CE/EE Affecting All Versions From 12.4 Before 18.9.6, Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-0186/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:16:32+03:00</news:publication_date>
      <news:title>CVE-2025-0186 — GitLab CE/EE Affecting All Versions From 10.6 Before 18.9.6, Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30139/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-30139 — The AdvancedSearch Functionality Of Silverpeas Core Before V Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-58922/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:51+03:00</news:publication_date>
      <news:title>CVE-2025-58922 — ThemeFusion Avada Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-58344/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:48+03:00</news:publication_date>
      <news:title>CVE-2024-58344 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25272/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:48+03:00</news:publication_date>
      <news:title>ELBA5 RCE Flaw Grants SYSTEM Access Via Database</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-326</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25271/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:47+03:00</news:publication_date>
      <news:title>CVE-2018-25271 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25270/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:47+03:00</news:publication_date>
      <news:title>ThinkPHP RCE Bug: Unauthenticated Attackers Exploit Critical Flaw</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25269/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:47+03:00</news:publication_date>
      <news:title>CVE-2018-25269 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25268/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:47+03:00</news:publication_date>
      <news:title>LanSpy 2.0.1.159 Vulnerability: Local Buffer Overflow Leads to Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25267/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:47+03:00</news:publication_date>
      <news:title>CVE-2018-25267 — The Output FileName Field Of The Make CD/DVD Image Dialog Th Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25266/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:47+03:00</news:publication_date>
      <news:title>CVE-2018-25266 — The Preferences Dialog That Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25265/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:46+03:00</news:publication_date>
      <news:title>LanSpy 2.0.1.159 Vulnerability: Local Buffer Overflow Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25262/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:46+03:00</news:publication_date>
      <news:title>CVE-2018-25262 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25261/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:46+03:00</news:publication_date>
      <news:title>Iperius Backup Local Overflow: Code Execution via Malicious File Path</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:46+03:00</news:publication_date>
      <news:title>MAGIX Music Editor Exploit: Local Code Execution via Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25259/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:16:45+03:00</news:publication_date>
      <news:title>Old Vulnerability, New Headache: TSM 3.1 Buffer Overflow (CVE-2018-25259)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/french-police-arrest-suspected-hacker-behind-dozens-of-data-ajdvj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:30:00+03:00</news:publication_date>
      <news:title>French Authorities Arrest Hacker Behind Dozens of Breaches</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-m-ho50d/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:28:00+03:00</news:publication_date>
      <news:title>Harvester&apos;s GoGra Backdoor Exploits Microsoft Graph API for Linux Targets</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/dprk-fake-job-scams-self-propagate-in-contagious-interview-mqv6m/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:48:05+03:00</news:publication_date>
      <news:title>North Korea&apos;s &apos;Contagious Interview&apos; Malware Spreads Via Compromised Dev Repos</news:title><news:keywords>threat-intel, tools, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6862/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:17:08+03:00</news:publication_date>
      <news:title>CVE-2026-6862 — Libefiboot, A Component Of Efivar Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6861/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:17:07+03:00</news:publication_date>
      <news:title>CVE-2026-6861 — GNU Emacs Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-193</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6859/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:17:07+03:00</news:publication_date>
      <news:title>InstructLab Vulnerability: Remote Code Execution via Malicious HuggingFace Models</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41651/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:17:04+03:00</news:publication_date>
      <news:title>PackageKit Vulnerability Allows Local Privilege Escalation via TOCTOU Exploit</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33611/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-33611 — An operator allowed to use the REST API can cause the</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33610/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-33610 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33609/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-33609 — Incomplete escaping of LDAP queries when running with</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33608/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:54+03:00</news:publication_date>
      <news:title>NVD Flags High-Severity Vulnerability: Bind Backend Configuration Exploit</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33602/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-33602 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33598/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-33598 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33595/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-33595 — A client can trigger excessive memory allocation by</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33594/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-33594 — A client can trigger excessive memory allocation by</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33593/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:53+03:00</news:publication_date>
      <news:title>DNSCrypt Vulnerability Allows Remote Crash via Crafted Queries</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33254/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-33254 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-s-cyber-capabilities-now-equal-to-the-us-warns-dutch-uqdiq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:33:00+03:00</news:publication_date>
      <news:title>Dutch Intel: China&apos;s Cyber Might Now Rivals the US</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6857/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:16:22+03:00</news:publication_date>
      <news:title>Critical Deserialization Flaw in camel-infinispan Allows RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6855/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:16:22+03:00</news:publication_date>
      <news:title>InstructLab Path Traversal Flaw Exposes Local File System</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8802/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:10:12+03:00</news:publication_date>
      <news:title>Python Library xinference Compromised, TeamPCP Denies Involvement</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-npm-supply-chain-attack-self-spreads-to-steal-auth-token-51ws9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:57:42+03:00</news:publication_date>
      <news:title>New npm Supply Chain Attack Steals Developer Auth Tokens</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-cyber-agency-handling-four-major-incidents-a-week-as-nati-w12lq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:45:00+03:00</news:publication_date>
      <news:title>UK Faces Barrage: Four Major Cyber Incidents Weekly, State Actors Lead Charge</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-defense-department-cyber-strategy-imminent-official-say-4g7g6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:30:00+03:00</news:publication_date>
      <news:title>US DoD Cyber Strategy Shifts to Aggressive Posture</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-teams-to-get-efficiency-mode-on-pcs-with-limited-r-g6ldy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:24:38+03:00</news:publication_date>
      <news:title>Microsoft Teams Gets Efficiency Mode for Resource-Constrained Devices</news:title><news:keywords>threat-intel, data-breach, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-33825/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2026-33825 — Microsoft Defender: Microsoft Defender Insufficient Granularity of Access Control Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/are-sboms-failing-supply-chain-attacks-rise-as-security-tea-fdvhh/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:30:00+03:00</news:publication_date>
      <news:title>SBOMs Under Scrutiny Amidst Rising Supply Chain Attacks</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/lotus-wiper-malware-targets-venezuelan-energy-systems-in-des-44k4o/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:55:00+03:00</news:publication_date>
      <news:title>Lotus Wiper Targets Venezuelan Energy Sector</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/toxic-combinations-when-cross-app-permissions-stack-into-ri-f4vnz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:41:36+03:00</news:publication_date>
      <news:title>Moltbook Breach Exposes AI Agent API Tokens and OpenAI Keys</news:title><news:keywords>threat-intel, vulnerability, identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6848/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-6848 — Red Hat Quay Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33601/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-33601 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33600/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-33600 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33262/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-33262 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33261/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-33261 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-33260 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33259/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-33259 — Use-After-Free</news:title><news:keywords>vulnerability, cve, medium-severity, use-after-free</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33258/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-33258 — By publishing and querying a crafted zone an attacker can</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33257/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-33257 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33256/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-33256 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-1930 — The Emailchef plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1913/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-1913 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1395/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-1395 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/when-wi-fi-encryption-fails-protecting-your-enterprise-from-8aiyy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:00:22+03:00</news:publication_date>
      <news:title>AirSnitch: New Attack Bypasses WPA2/3 Wi-Fi Encryption</news:title><news:keywords>threat-intel, apt, malware, research</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-antigravity-in-crosshairs-of-security-researchers-cy-2g4r8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:53:05+03:00</news:publication_date>
      <news:title>Google Antigravity Vulnerability Exploited for Malware Distribution</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6846/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:27+03:00</news:publication_date>
      <news:title>Binutils Heap Overflow: Local Attackers Gain Code Execution via XCOFF Files</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6235/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:26+03:00</news:publication_date>
      <news:title>WordPress Plugin Flaw Lets Attackers Hijack Site Emails</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5748/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-5748 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4353/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-4353 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4280/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-4280 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4279/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-4279 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4132/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:24+03:00</news:publication_date>
      <news:title>WordPress HTTP Headers Plugin Flaw Opens Door to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4125/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-4125 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4119/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:23+03:00</news:publication_date>
      <news:title>WordPress Plugin Vulnerability Lets Subscribers Wreck Databases</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4089/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-4089 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4088/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-4088 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4085/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-4085 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4082/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-4082 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4076/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-4076 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4074/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-4074 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2284/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:04:43+03:00</news:publication_date>
      <news:title>AI Unearths Hundreds of Firefox Vulnerabilities, Prompting Critical Patch</news:title><news:keywords>israel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/oracle-patches-450-vulnerabilities-with-april-2026-cpu-v4uyp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:41:10+03:00</news:publication_date>
      <news:title>Oracle&apos;s April CPU: 450 Patches, Over 300 Remote, Unauthenticated Flaws</news:title><news:keywords>threat-intel, vulnerability, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6023/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:16:13+03:00</news:publication_date>
      <news:title>Telerik UI for AJAX RadFilter Vulnerable to RCE via Deserialization</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6022/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:16:12+03:00</news:publication_date>
      <news:title>Telerik UI Vulnerability Allows Disk Space Exhaustion Attacks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-releases-emergency-patches-for-critical-asp-net-fl-jee71/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:08:16+03:00</news:publication_date>
      <news:title>Microsoft Rushes Patches for Critical ASP.NET Core Privilege Escalation Flaw</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mustang-panda-s-new-lotuslite-variant-targets-india-banks-s-yax05/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:58:00+03:00</news:publication_date>
      <news:title>Mustang Panda&apos;s LOTUSLITE Variant Targets India Banks</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8799/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:41:33+03:00</news:publication_date>
      <news:title>Tax Authority Phishing Campaign Targets Israelis with Fake Grants</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6840/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-6840 — Missing bounds validation for operator could  allow out of</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-129</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6839/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:14+03:00</news:publication_date>
      <news:title>CVE-2026-6839 — Improper validation of STRING tensor offsets could allows</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41667/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-41667 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41666/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-41666 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41665/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-41665 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41664/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-41664 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40450/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-40450 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40449/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-40449 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40448/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40448 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/over-1-300-microsoft-sharepoint-servers-vulnerable-to-spoofi-l6882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:53:02+03:00</news:publication_date>
      <news:title>Unpatched SharePoint Servers Remain Ripe for Spoofing Attacks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22754/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:16:04+03:00</news:publication_date>
      <news:title>Spring Security Authorization Bypass: High Severity Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22753/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:16:04+03:00</news:publication_date>
      <news:title>Spring Security Flaw Bypasses Auth, Authorization</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22748/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-22748 — Spring Security: From Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22747/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-22747 — Spring Security: From Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40451/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-40451 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6835/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-6835 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-6834 — The a+HRD developed by aEnrich has a Missing Authorization</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6833/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-6833 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41127/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T03:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41127 — BigBlueButton is an open-source virtual classroom. Versions</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41126/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T03:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41126 — Open Redirect</news:title><news:keywords>vulnerability, cve, medium-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41064/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T03:16:28+03:00</news:publication_date>
      <news:title>Critical RCE in WWBN AVideo: Incomplete Patch Leaves Open Source Platform Exposed</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41059/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T03:16:27+03:00</news:publication_date>
      <news:title>OAuth2 Proxy Bypass: Fragment Handling Exposes Protected Resources</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T03:16:27+03:00</news:publication_date>
      <news:title>Critical OAuth2 Proxy Auth Bypass: CVE-2026-40575</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url></urlset>
