<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day-47f0x/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T13:29:31+03:00</news:publication_date>
      <news:title>CISA Mandates Urgent Patching for Windows Zero-Day Exploited in Attacks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-authentication-vulnerability-identified-up-10tps/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:37:00+03:00</news:publication_date>
      <news:title>Critical cPanel Authentication Flaw Exposes Servers</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4019/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-4019 — The Complianz – GDPR/CCPA Cookie Consent plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-42412 — WeDevs WP User Frontend Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-10503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:23+03:00</news:publication_date>
      <news:title>CVE-2025-10503 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T11:16:18+03:00</news:publication_date>
      <news:title>SureForms Pro Vulnerability CVE-2026-42377 Exposes Access Control Flaws</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8849/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T10:02:16+03:00</news:publication_date>
      <news:title>Cyber News - Erez Dasa: Unattributed Foreign Login Triggered Investigation</news:title><news:keywords>israel, cybersafe</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8847/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T09:02:28+03:00</news:publication_date>
      <news:title>Vect Ransomware: Bug Turns Encryption into Irreversible Data Wiper</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35155/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T08:16:04+03:00</news:publication_date>
      <news:title>Dell iDRAC10 Vulnerability: Low-Privilege Race Condition Grants High Access</news:title><news:keywords>vulnerability, cve, high-severity, race-condition, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42615/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:41+03:00</news:publication_date>
      <news:title>GCHQ CyberChef XSS Vulnerability (CVE-2026-42615) Identified</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23773/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-23773 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-42167: ProFTPD mod_sql RCE Via Log Expansion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7319/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-7319: Path Traversal in elinsky execution-system-mcp Poses Remote Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7318 — Elie Mcp-Project Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7317 — Grav CMS Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7316: Aider-mcp Command Injection Exposes AI Dev Workflows</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7315: eiceblue spire-pdf-mcp-server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7314: eiceblue spire-doc-mcp-server Path Traversal Publicly Exploited</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7306/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7306 — Xuxueli Xxl-Job Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-320, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-7305 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:49+03:00</news:publication_date>
      <news:title>Outline Insecure Direct Object Reference (CVE-2026-41649) Exposes Documents</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-33467 — Improper Verification of Cryptographic Signature (CWE-347)</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/spy-agency-officials-say-job-loss-anxiety-moving-fast-safe-x3o7u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T00:43:20+03:00</news:publication_date>
      <news:title>NGA Grapples with AI Workforce Overhaul and Job Anxiety</news:title><news:keywords>threat-intel, policy, government, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw-kdccf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T00:07:23+03:00</news:publication_date>
      <news:title>LiteLLM Pre-Auth SQLi Actively Exploited: CVE-2026-42208</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nsa-chief-during-snowden-affair-shares-regrets-reflections-pagdy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T23:38:59+03:00</news:publication_date>
      <news:title>NSA Chief Reflects on Snowden Leaks: Lessons for CISOs</news:title><news:keywords>threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-28</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:47+03:00</news:publication_date>
      <news:title>CVE-2026-42431: OpenClaw Vulnerability Allows Persistent Browser Profile Mutation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:46+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42426: Improper Authorization Allows Node Pairing Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:45+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42422: Role Bypass Allows Unapproved Token Minting</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:45+03:00</news:publication_date>
      <news:title>OpenClaw QQ Bot SSRF Vulnerability Bypasses Protections (CVE-2026-41914)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41404/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:43+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation via Incomplete Scope Clearing (CVE-2026-41404)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41394/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:42+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-41394: Authentication Bypass Grants Operator Write Scopes</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41387/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw Incomplete Host Environment Sanitization Allows Package Overrides</news:title><news:keywords>vulnerability, cve, high-severity, cwe-183</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41386/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation: Critical Flaw in Device Pairing</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-648</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw CLI Vulnerability Allows Code Execution via Environment Variable Injection</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-15</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>CVE-2026-41383: OpenClaw Arbitrary Directory Deletion Flaw Exposes Remote Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:40+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation (CVE-2026-41378) Allows RCE via Paired Nodes</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:39+03:00</news:publication_date>
      <news:title>CVE-2026-3893: Carlson VASCO-B GNSS Receiver Lacks Authentication</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA NeMoClaw Vulnerability Exposes Host Environment Variables</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24186/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA FLARE SDK Vulnerability: Untrusted Deserialization Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24178/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA NVFlare Dashboard: Critical Auth Bypass Puts Systems at Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vidar-rises-to-top-of-chaotic-infostealer-market-emmj1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:07:16+03:00</news:publication_date>
      <news:title>Vidar Infostealer Dominates Post-Takedown Market Vacuum</news:title><news:keywords>threat-intel, tools, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4548/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:03:18+03:00</news:publication_date>
      <news:title>XChat Lacks True E2E, Metadata Exposure Persists</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8844/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:53:48+03:00</news:publication_date>
      <news:title>GitHub RCE Vulnerability Exposes Millions of Repositories</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8843/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:42:07+03:00</news:publication_date>
      <news:title>Ynet, Population Authority Project Pulled Over Data Exposure Flaw</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/brazilian-lofygang-resurfaces-after-three-years-with-minecra-g3nbk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:39:00+03:00</news:publication_date>
      <news:title>LofyGang Resurfaces, Targets Minecraft Players with LofyStealer Malware</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cyber-command-nsa-chief-warns-foreign-adversaries-likely-to-2x8o0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:26:00+03:00</news:publication_date>
      <news:title>Cyber Command Warns Foreign Adversaries Targeting Midterm Elections</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/video-site-vimeo-blames-security-incident-on-anodot-breach-jrutw/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T19:21:00+03:00</news:publication_date>
      <news:title>Vimeo Blames Anodot Breach for User Data Theft by ShinyHunters</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-60887/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T19:16:05+03:00</news:publication_date>
      <news:title>CVE-2025-60887 — Cista Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7321/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:37+03:00</news:publication_date>
      <news:title>Firefox ESR Sandbox Escape: Critical CVE-2026-7321 Demands Immediate Attention</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7289/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:37+03:00</news:publication_date>
      <news:title>D-Link DIR-825M Buffer Overflow (CVE-2026-7289) Exposes Routers</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7288/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:37+03:00</news:publication_date>
      <news:title>D-Link DIR-825M Buffer Overflow (CVE-2026-7288) Publicly Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7283/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-7283 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7282/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-7282 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40968/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-40968 — When an authenticated user is denied access to a gRPC</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-653</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27760/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:26+03:00</news:publication_date>
      <news:title>OpenCATS Installer Vulnerability Allows Unauthenticated PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukrainian-police-detain-hackers-suspected-of-stealing-thousa-qj6eq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:57:00+03:00</news:publication_date>
      <news:title>Ukraine Police Arrest Hackers Targeting Thousands of Roblox Accounts</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7272/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:16:14+03:00</news:publication_date>
      <news:title>CVE-2026-7272: WilliamCloudQi matlab-mcp-server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5944/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-5944: Cisco Intersight Connector Exposes Nutanix Prism Central API</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-306, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-o-v382i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:01:00+03:00</news:publication_date>
      <news:title>VECT 2.0 Ransomware: Wiper-Like Flaw Irreversibly Destroys Files</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T16:19:24+03:00</news:publication_date>
      <news:title>CVE-2026-7309 — The OpenShift Container Platform Build System Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-426</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7271/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T16:19:24+03:00</news:publication_date>
      <news:title>CVE-2026-7271 — DV0x Creative-Ad-Agent Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7268/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7268 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7267/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7267 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7266/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7266 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-1708/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-1708 — ConnectWise ScreenConnect: ConnectWise ScreenConnect Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-rls1b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T14:58:00+03:00</news:publication_date>
      <news:title>Secure Data Movement is Zero Trust&apos;s Unseen Bottleneck</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8842/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T14:56:31+03:00</news:publication_date>
      <news:title>AI Agents Claude, Cursor, Codex Weaponize Text Files</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-84lys/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T14:18:00+03:00</news:publication_date>
      <news:title>Hugging Face LeRobot RCE: Unauthenticated Deserialization Flaw</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/after-mythos-new-playbooks-for-a-zero-window-era-tyb2q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:30:00+03:00</news:publication_date>
      <news:title>AI Accelerates Exploit Windows, Demanding Faster Defense</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7280/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7280 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-428</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7279/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:16:04+03:00</news:publication_date>
      <news:title>AVACAST DLL Hijacking (CVE-2026-7279) Allows System Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7264/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7264 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:18+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Critical Buffer Overflow Vulnerability (CVE-2026-7248)</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7247/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:18+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Buffer Overflow: CVE-2026-7247 Exposes Remote Exploitation Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7244: Critical Command Injection Flaw in Totolink Router</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7243/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>Totolink RCE: CVE-2026-7243 Exposes Routers to Critical Command Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7242/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7242: Critical Command Injection in Totolink A8000RU</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7241)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40980/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-40980 — In Spring AI, a malicious PDF file can be crafted that</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40979/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-40979 — In Spring AI, having access to a shared environment can</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-377</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:16+03:00</news:publication_date>
      <news:title>Spring AI CosmosDBVectorStore Vulnerable to SQL Injection (CVE-2026-40978)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8841/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:15:54+03:00</news:publication_date>
      <news:title>Robinhood Registration Form Abused for Official-Looking Phishing</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-asks-iphone-users-to-reauthenticate-after-outlook-1skep/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:37:12+03:00</news:publication_date>
      <news:title>Microsoft Outlook Outage Forces iPhone Users to Re-Authenticate</news:title><news:keywords>threat-intel, data-breach, malware, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7240/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7240)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7238/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7238 — Code-Projects Online Music Site Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7237/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7237: AgiFlow Path Traversal Puts Files at Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7235/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7235 — ErlichLiu Claude-Agent-Sdk-Master Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-4911 — The Booking Package plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-472</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4805/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-4805 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41526/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-41526 — In KDE KCoreAddons before 6.25, KShell::quoteArgs is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-150</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41525/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-41525 — KDE Dolphin before 25.12.3 allows applications in a Flatpak</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-669</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-40966 — In Spring AI, an attacker can bypass conversation isolation</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7234: Path Traversal Flaw in BrowserOperator Core Exposes Users</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7230/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7230 — SourceCodester Safety Anger Pad Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7229 — Code-Projects Coaching Management System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40967/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>Spring AI Vulnerability (CVE-2026-40967) Allows Query Alteration</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40356/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-40356 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2297/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:59:34+03:00</news:publication_date>
      <news:title>Google Reports 32% Surge in Prompt Injection Attacks</news:title><news:keywords>israel, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-patches-entra-id-role-flaw-that-enabled-service-pr-5lakt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:37:00+03:00</news:publication_date>
      <news:title>Microsoft Entra ID Agent Role Flaw Enabled Service Principal Takeover</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/medtronic-hack-confirmed-after-shinyhunters-threatens-data-l-gtyoc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:35:19+03:00</news:publication_date>
      <news:title>Medtronic Confirms Breach After ShinyHunters Data Leak Threat</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7228: SourceCodester Pizzafy SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7227/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7227: SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7226/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7226: SQL Injection in SourceCodester Pizzafy Ecommerce System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7225: SourceCodester Pizzafy SQL Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7224: SQL Injection in SourceCodester Pizzafy Ecommerce System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6809/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6809 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6725/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6725 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6551/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6551 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42510/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-42510 — OpenStack Ironic through 25.0.0 allows ipmitool execution</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40355/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-40355 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-confirms-active-exploitation-of-windows-shell-cve-14h3k/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T08:50:00+03:00</news:publication_date>
      <news:title>Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8839/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T08:02:10+03:00</news:publication_date>
      <news:title>ShinyHunters Claims Vimeo Breach, Citing Anodot Compromise</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8838/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:55:28+03:00</news:publication_date>
      <news:title>RansomHouse Claims CyberSecurity Vendor with Billions in Revenue</news:title><news:keywords>israel, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2296/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:41:31+03:00</news:publication_date>
      <news:title>HAFNIUM Hacker Extradited to US for Microsoft Exchange Attacks, COVID-19 Espionage</news:title><news:keywords>israel, microsoft, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7223: BigSweetPotatoStudio HyperChat SSRF Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:26+03:00</news:publication_date>
      <news:title>TencentCloudBase CloudBase-MCP SSRF Vulnerability (CVE-2026-7221)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7220/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7220: FastlyMCP Command Injection Exposes Infrastructure</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7219/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:23+03:00</news:publication_date>
      <news:title>Totolink N300RT: High-Severity Buffer Overflow Vulnerability (CVE-2026-7219)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7218/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7218: Totolink N300RT Buffer Overflow Exploited Remotely</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7217/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7217 — Deepractice PromptX Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22, cwe-36</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7216/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7216: donchelo processing-claude-mcp-bridge Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>egtai gmx-vmd-mcp Vulnerability: Remote Command Injection (CVE-2026-7215)</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1460/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-1460: Zyxel Routers Vulnerable to Admin Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0711/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-0711 — The EasyMesh-Related APIs Of Zyxel DX3300-T0 Firmware Versio Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T05:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-7214: eghuzefa engineer-your-data Path Traversal Vulnerability (High Severity)</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T05:16:08+03:00</news:publication_date>
      <news:title>ef10007 MLOps_MCP Path Traversal (CVE-2026-7213) Publicly Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T05:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-7212: edvardlindelof notes-mcp Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7211: dvladimirov MCP Command Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7206: sqlite-mcp SQL Injection Vulnerability Exposed</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7205: High-Severity Path Traversal in duartium papers-mcp-server</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical Command Injection (CVE-2026-7204)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7203/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7203)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7202/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7202)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-32649 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32644/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:00+03:00</news:publication_date>
      <news:title>Milesight AIOT Cameras Critical Vulnerability: Default SSL Keys Exposed</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20766/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:00+03:00</news:publication_date>
      <news:title>Milesight AIOT Cameras Vulnerable to Out-of-Bounds Memory Access (CVE-2026-20766)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7199/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7199: SQL Injection in Pharmacy Sales and Inventory System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7196/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7196 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41372/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41372 — OpenClaw before 2026.4.2 fails to normalize trailing-dot</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41371/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:26+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation (CVE-2026-41371) Allows Session Reset</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41370/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41370 — ACP Dispatch That Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41369/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41369 — OpenClaw before 2026.3.31 contains insufficient environment</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-668</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41368/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41368 — OpenClaw before 2026.3.28 contains an environment variable</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-668</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41366/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41366 — AppendLocalMediaParentRoots That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41365/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41365 — OpenClaw before 2026.3.31 contains a sender allowlist</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-441</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41364/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41364: OpenClaw Symlink Vulnerability Allows Arbitrary File Write</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41363/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41363 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40976/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-40976: Spring Boot Default Security Bypass Exposes Endpoints</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40973/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:24+03:00</news:publication_date>
      <news:title>Spring Boot CVE-2026-40973: Local Attacker Can Hijack Sessions, Execute Code</news:title><news:keywords>vulnerability, cve, high-severity, cwe-377</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40972/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-40972: Spring Boot DevTools Timing Attack Exposes Secrets, RCE Risk</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27785/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T03:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-27785: Milesight AIOT Cameras Exposed by Hardcoded Credentials</news:title><news:keywords>vulnerability, cve, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7194/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T02:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7194: SourceCodester Pharmacy System SQL Injection Publicly Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7183/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T02:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7183 — Aligungr UERANSIM Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-248</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7179/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T02:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7179 — OSPG Binwalk Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40971/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T02:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-40971 — When configured to use an SSL bundle, Spring Boot&apos;s</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28747/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T02:16:02+03:00</news:publication_date>
      <news:title>Milesight AIOT Cameras Vulnerable to Authorization Bypass via Weak Key Generation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pitney-bowes-8-243-989-breached-accounts-qgk8g/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T01:52:07+03:00</news:publication_date>
      <news:title>Pitney Bowes Data Breach: ShinyHunters Leaks 8.2M Records</news:title><news:keywords>data-breach, threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7178/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T01:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-7178: ChatGPTNextWeb NextChat SSRF Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7177/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T01:16:18+03:00</news:publication_date>
      <news:title>ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7177) Exposed</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7160/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T01:16:18+03:00</news:publication_date>
      <news:title>Tenda HG3 Router Command Injection (CVE-2026-7160) Exposes Networks</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7159/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T01:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-7159: douinc mkdocs-mcp-plugin Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7191/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T00:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-7191: qnabot-on-aws Admin RCE via Prototype Manipulation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7158/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T00:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-7158: dmitryglhf mcp-url-downloader SSRF Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7157/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T00:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-7157: Aider-MCP-Server Command Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7156/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T00:16:44+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7156)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7155/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T00:16:43+03:00</news:publication_date>
      <news:title>Totolink A8000RU Faces Critical Remote Command Injection (CVE-2026-7155)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7154/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T00:16:43+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7154)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/supreme-court-signals-location-data-searches-should-require-5x48f/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T23:52:00+03:00</news:publication_date>
      <news:title>Supreme Court Signals Warrant Needed for Location Data Searches</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7153/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7153: Critical OS Command Injection in Totolink A8000RU Routers</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7152/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T23:16:29+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical Command Injection (CVE-2026-7152)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7151/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T23:16:28+03:00</news:publication_date>
      <news:title>Tenda HG3 2.0 Router Vulnerability: Remote Stack Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T23:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-6741: WordPress LatePoint Plugin Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tennessee-becomes-second-state-to-ban-cryptocurrency-atms-ov-rb07a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T23:06:00+03:00</news:publication_date>
      <news:title>Tennessee Bans Crypto ATMs Over Surging Scam Concerns</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-27</news:title><news:keywords>daily-digest, pypi, github, dyepack</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8837/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T22:32:41+03:00</news:publication_date>
      <news:title>elementary-data Python Library Compromised with Infostealer</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7150/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T22:17:00+03:00</news:publication_date>
      <news:title>CVE-2026-7150 — Dh1011 Auto-Favicon Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7149/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T22:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-7149: Dexhunter Kaggle-MCP Path Traversal Vulnerability Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7148/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T22:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-7148 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7147/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T22:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-7147: JoeCastrom mcp-chat-studio SSRF Vulnerability Publicly Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40970/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T22:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-40970 — When configured to use an SSL bundle, Spring Boot&apos;s</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32655/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T22:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-32655 — Dell Alienware Command Center (AWCC), versions prior to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-272</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/money-launderer-for-crypto-thieves-given-5-year-sentence-vcujg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T21:45:00+03:00</news:publication_date>
      <news:title>Crypto Launderer Sentenced Five Years for $260M Theft</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7146/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T21:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7146: AlejandroArciniegas mcp-data-vis Vulnerable to SSRF</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7145/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T21:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7145 — A weakness has been identified in mettle sendportal up to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7144/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T21:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7144 — 1000 Projects Portfolio Management System MCA Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7143/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T21:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7143 — 1000 Projects Portfolio Management System MCA SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25908/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T21:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-25908 — The AWCC. A Low Privileged Attacker With Local Access Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-69689/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T21:16:53+03:00</news:publication_date>
      <news:title>Fan Control App V251 Privilege Escalation (CVE-2025-69689)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7142/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T20:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-7142 — A vulnerability was determined in Wooey up to 0.13.2. The</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7141/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T20:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-7141 — Vllm Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-908</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7140/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T20:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-7140: Critical OS Command Injection in Totolink A8000RU Routers</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7139/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T20:16:45+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical Command Injection (CVE-2026-7139)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7138/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-7138: Critical Command Injection in Totolink Routers</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7137/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:47+03:00</news:publication_date>
      <news:title>Totolink Router RCE: CVE-2026-7137 Exposes Home and Small Business Networks</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7136/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:46+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical Command Injection Flaw (CVE-2026-7136)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7135/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-7135 — GPAC Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-119, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7134/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-7134 — Code-Projects Online Lot Reservation System Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-41467 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41466/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-41466 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41465/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-41465 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41464/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-41464 — The ObjectDetail.Php Endpoint That Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41463/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:45+03:00</news:publication_date>
      <news:title>ProjeQtor ZipSlip Flaw: Authenticated RCE via Plugin Upload</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41462/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:45+03:00</news:publication_date>
      <news:title>ProjeQtor Critical SQL Injection Flaw Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30352/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-30352: Critical RCE in leonvanzyl autocoder /devserver/start Endpoint</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30351/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T19:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-30351: Path Traversal Hits leonvanzyl autocoder</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8836/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:34:36+03:00</news:publication_date>
      <news:title>ClickUp API Key Exposed for Over a Year, Exposing Customer Data</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/unpatched-phantomrpc-flaw-in-windows-enables-privilege-esc-rvcnc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:31:41+03:00</news:publication_date>
      <news:title>Windows &apos;PhantomRPC&apos; Flaw Enables Privilege Escalation</news:title><news:keywords>threat-intel, tools, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/disinformation-campaign-targeted-tibetan-parliament-in-exile-trxv7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:28:00+03:00</news:publication_date>
      <news:title>Spamouflage Disinformation Campaign Targets Tibetan Parliament-in-Exile</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7133/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7133 — Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7132/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7132 — Code-Projects Online Lot Reservation System Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7131/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7131: SQL Injection in Online Lot Reservation System Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40514/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-40514 — SmarterTools SmarterMail builds prior to 9610 contain a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-338</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/italy-extradites-alleged-chinese-state-hacker-to-us-n4g4n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T18:15:00+03:00</news:publication_date>
      <news:title>Italy Extradites Alleged Chinese State Hacker for COVID-19 Vaccine Theft</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-spotting-cyberattacks-before-they-begin-ky4yv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T17:25:35+03:00</news:publication_date>
      <news:title>BleepingComputer Webinar: Proactive Threat Detection for Security Teams</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/checkmarx-confirms-github-repository-data-posted-on-dark-web-9h1h2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T17:19:00+03:00</news:publication_date>
      <news:title>Checkmarx GitHub Data Leaked Post Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7130/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T17:16:57+03:00</news:publication_date>
      <news:title>CVE-2026-7130: Critical SQL Injection Flaw in Pharmacy System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7129/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T17:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7129 — SourceCodester Pharmacy Sales And Inventory System Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7128/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T17:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7128: SQL Injection in SourceCodester Pharmacy System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7127/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T17:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7127: SQL Injection in Pharmacy System Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7126/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T17:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-7126: SQL Injection in Pharmacy Sales and Inventory System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/medtronic-confirms-breach-after-hackers-claim-9-million-reco-ya379/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:50:42+03:00</news:publication_date>
      <news:title>Medtronic Confirms Data Breach After Hackers Claim 9 Million Records Stolen</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/weekly-recap-fast16-malware-xchat-launch-federal-backdo-xhjm2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:30:00+03:00</news:publication_date>
      <news:title>Weekly Recap: Fast16 Malware, Supply Chain Attacks, and Federal Backdoors</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-impersonate-microsoft-teams-help-desk-to-breach-corp-j5ovv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:30:00+03:00</news:publication_date>
      <news:title>Microsoft Teams Impersonation Leads to Corporate Network Breaches</news:title><news:keywords>threat-intel, data-breach, government, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7125/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:16:05+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7125)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7124/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7124: Critical OS Command Injection in Totolink A8000RU Routers</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7123/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7123: Critical Command Injection in Totolink Routers Exposes Networks</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incomplete-windows-patch-opens-door-to-zero-click-attacks-s0ojb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:09:27+03:00</news:publication_date>
      <news:title>Microsoft Windows Patch Incomplete, APT28 Exploits Zero-Click Vulnerability</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2295/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T16:06:58+03:00</news:publication_date>
      <news:title>US ICE Deploys Israeli Graphite Zero-Click Spyware Against Fentanyl Traffickers</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7122/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:26+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical Command Injection (CVE-2026-7122)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7121/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:25+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical Command Injection (CVE-2026-7121) Exposed</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7119/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:25+03:00</news:publication_date>
      <news:title>Tenda HG3 Router OS Command Injection (CVE-2026-7119)</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-7118 — Code-Projects Employee Management System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7117/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-7117 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7116/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-7116 — Code-Projects Employee Management System Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5943/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-5943: High-Severity Memory Corruption Vulnerability Uncovered</news:title><news:keywords>vulnerability, cve, high-severity, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5942/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-5942 — Flaws in page lifecycle management allow document structure</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5941/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-5941: Parsing Flaws Lead to Memory Corruption</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-5940: UI Refresh Flaw Triggers Program Crashes</news:title><news:keywords>vulnerability, cve, high-severity, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5939/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-5939 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5938/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-5938 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-691</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5937/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-5937 — Insufficient parameter verification leads to the occurrence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-248</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42410/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-42410 — CodexThemes TheGem Theme Elements (For Elementor) Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8835/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:04:59+03:00</news:publication_date>
      <news:title>Mozilla Firefox Fixes 271 Vulnerabilities Using AI Model</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mythos-changed-the-math-on-vulnerability-discovery-most-tea-7jy3i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:58:00+03:00</news:publication_date>
      <news:title>Anthropic Claude Mythos: AI-Driven Vulnerability Discovery Changes Remediation Math</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russ-evfgj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:54:00+03:00</news:publication_date>
      <news:title>PhantomCore Exploits TrueConf Vulnerabilities in Russian Networks</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:31:58+03:00</news:publication_date>
      <news:title>Medtronic Reports Internal System Access by Unauthorized Parties</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/researchers-uncover-73-fake-vs-code-extensions-delivering-gl-2oz21/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:23:00+03:00</news:publication_date>
      <news:title>73 Malicious VS Code Extensions Push GlassWorm v2 Malware</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7115/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7115 — Code-Projects Employee Management System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7114/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7114 — An Unknown Part Of The File 370project/Edit.Php SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7113/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7113 — NousResearch Hermes-Agent Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22337/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:16:01+03:00</news:publication_date>
      <news:title>Directorist Social Login Flaw CVE-2026-22337 Exposes Critical Privilege Escalation</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-266</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22336/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:16:00+03:00</news:publication_date>
      <news:title>Directorist Booking SQL Injection Flaw Exposes Critical Data</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url></urlset>
