<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-10</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-290, privilege-escalation, cwe-862, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8905/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T19:01:33+03:00</news:publication_date>
      <news:title>ShinyHunters Ransomware Disrupts Instructure Canvas, Forces Payout</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2022-50944/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:32+03:00</news:publication_date>
      <news:title>Aero CMS 0.0.1 Vulnerability Allows Authenticated PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47949/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:31+03:00</news:publication_date>
      <news:title>CyberPanel 2.1 RCE via Symlink Attack (CVE-2021-47949)</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47943/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>TextPattern CMS RCE (CVE-2021-47943) Allows Authenticated Attackers to Execute Commands</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47941/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>WordPress Plugin Survey &amp; Poll SQLi Puts Data at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>WordPress Plugin Download From Files: Critical Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, arbitrary-file-access, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47939/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>Evolution CMS RCE (CVE-2021-47939) Allows Authenticated Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47938/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>ImpressCMS 1.4.2 RCE: Authenticated Attackers Can Execute Arbitrary Code</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47937/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>e107 CMS RCE (CVE-2021-47937) Allows Authenticated Theme Uploads to Drop Web Shells</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47936/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>OpenCATS 0.9.4 Critical RCE via Malicious Resume Uploads</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47935/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>Sentry 8.2.0 RCE: Authenticated Superusers Can Execute Arbitrary Code</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47933/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>WordPress MStore API Critical RCE: Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47932/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>WordPress TheCartPress Unauthenticated Admin Creation (CVE-2021-47932)</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>CVE-2021-47930: Unauthenticated SQLi in Balbooa Joomla Forms Builder</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47928/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:28+03:00</news:publication_date>
      <news:title>Opencart TMD Vendor System Blind SQLi Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47923/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:28+03:00</news:publication_date>
      <news:title>OpenCart 3.0.3.8 Session Fixation Vulnerability (CVE-2021-47923) Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8904/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T15:39:32+03:00</news:publication_date>
      <news:title>IDF Certificate Generator Exposes Rank and Unit Creation</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T13:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-8244 — Industrial Application Software IAS Canias ERP Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8243/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8243 — An Unknown Function Of The Component JNLP Deployment Endpoin Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-320, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T12:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-8241 — Industrial Application Software IAS Canias ERP Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8235/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T10:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8235 — 8421bit MiniClaw 0.8.0/0.9.0 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T10:16:08+03:00</news:publication_date>
      <news:title>EFM ipTIME A8004T Vulnerability: Remote Stack-Based Buffer Overflow Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8233 — Improper Access Control</news:title><news:keywords>vulnerability, cve, medium-severity, improper-access-control, cwe-266, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8231/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8231 — CodeAstro Online Catering Ordering System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:30:48+03:00</news:publication_date>
      <news:title>Europol Under Fire for Shadow IT System Exposing Sensitive Data</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8230/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8230 — Wavlink NU516U1 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8229 — Wavlink NU516U1 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8228 — Wavlink NU516U1 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8227/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8227 — The Function WzdapMesh Of The File /Cgi-Bin/Adm.Cgi Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8226/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8226 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8225 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T06:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-8224 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T06:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8223 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T06:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8222 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8217/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T05:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8217 — Industrial Application Software IAS Canias ERP Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8216/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T04:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8216: Canias ERP Remote Authentication Bypass Exposes Critical Systems</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T04:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8215 — The Function IasRequestFileEvent Of The Component RMI Interf Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T04:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-8214 — Industrial Application Software IAS Canias ERP Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8213 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8212 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8211 — Codelibs Fess Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45184/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-45184 — Kdenlive before 26.04.1 allows dangerous proxy parameters</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45181/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T01:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-45181 — Hex-Rays IDA Pro 9.2 and 9.3 before 9.3sp2 does not block</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T00:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-8210 — Aandrew-Me Tgpt Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8195/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8195 — JeecgBoot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8194/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8194 — OsTicket Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42606/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>AzuraCast CVE-2026-42606: Unauthenticated Account Takeover Via X-Forwarded-Host Poisoning</news:title><news:keywords>vulnerability, cve, high-severity, cwe-640</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42605/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>AzuraCast RCE via Path Traversal (CVE-2026-42605)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42576/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42576 — Any Workflow That Initializes The APK Database And Fetches R Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-704</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42575: apko Container Builder Silently Accepts Malicious Packages</news:title><news:keywords>vulnerability, cve, high-severity, cwe-345, cwe-494</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42574/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42574: apko Symlink Traversal Allows Host Path Writes</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42569/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>phpVMS Critical Vulnerability (CVE-2026-42569) Allows Unauthenticated Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-284, cwe-306, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42562/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:28+03:00</news:publication_date>
      <news:title>Plainpad CVE-2026-42562 Allows Low-Privilege Admin Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-09</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-347, privilege-escalation, cwe-284, cwe-639, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/jdownloader-site-hacked-to-replace-installers-with-python-ra-mdbd4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:27:58+03:00</news:publication_date>
      <news:title>JDownloader Site Compromised, Distributes Python RAT Malware</news:title><news:keywords>threat-intel, data-breach, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-8193 — Some Unknown Processing Of The File Config/Dompdf.Php Of The Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8192/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-8192 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8191/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-8191 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8190/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T21:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-8190 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8189/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T20:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8189 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8188/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T19:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8188 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8198/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T16:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-8198 — Authentication Bypass</news:title><news:keywords>vulnerability, cve, medium-severity, authentication-bypass, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8186/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T15:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8186 — Open5GS Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-119, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8187/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T14:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-8187 — Open5GS Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T14:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-8185 — UGREEN CM933 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3828/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:09+03:00</news:publication_date>
      <news:title>Hikvision Switches: Authenticated RCE in Discontinued Products</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-32683 — Some EZVIZ products utilize older versions of cloud feature</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1749/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-1749 — Some HikCentral Professional Versions. This Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cpanel-whm-release-fixes-for-three-new-vulnerabilities-pa-2ycdm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T10:16:00+03:00</news:publication_date>
      <news:title>cPanel, WHM Patch Three New Vulnerabilities: Privilege Escalation, RCE Risks</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42560/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T09:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-42560: Critical Patreon OAuth Flaw Merges User Identities</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42301/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42301: Malicious Code Execution Via pyp2spec RPM Generation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42296/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42296: Argo Workflows Bypass Grants Host Network Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41311/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:21+03:00</news:publication_date>
      <news:title>LiquidJS CVE-2026-41311: DoS Vulnerability in Template Engine</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7652/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T06:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-7652 — The LatePoint plugin for WordPress is vulnerable to Account</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-640</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6667/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6666/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-6666 — A possible null pointer reference in PgBouncer before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6665/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:09+03:00</news:publication_date>
      <news:title>PgBouncer SCRAM Vulnerability (CVE-2026-6665) Allows Stack Overflow</news:title><news:keywords>vulnerability, cve, high-severity, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6664/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:08+03:00</news:publication_date>
      <news:title>PgBouncer Integer Overflow (CVE-2026-6664) Leads to Remote Crash</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41705/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-41705: Spring AI MilvusVectorStore Vulnerable to Filter Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-917</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44313/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T03:16:29+03:00</news:publication_date>
      <news:title>Linkwarden SSRF Vulnerability (CVE-2026-44313) Allows Internal Network Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45130/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-45130 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-122, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42556/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-42556: Postiz AI Tool Vulnerability Allows Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42454/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:39+03:00</news:publication_date>
      <news:title>Termix RCE via Container ID Injection (CVE-2026-42454)</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42452/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>Termix CVE-2026-42452 Bypasses 2FA with Temporary JWT</news:title><news:keywords>vulnerability, cve, high-severity, cwe-304</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42354/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>Sentry SAML SSO Critical Vulnerability Allows Account Takeover (CVE-2026-42354)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42352/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>pygeoapi RCE: OGC API Vulnerability Exposes Internal Services</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42351/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-42351: pygeoapi Path Traversal Exposes Directories</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42346/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-42346 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:37+03:00</news:publication_date>
      <news:title>FastGPT Vulnerability: Cloud Metadata Bypass via URL Encoding (CVE-2026-42345)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42302/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-42302: FastGPT Agent Sandbox RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42298/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-42298: Critical RCE in Postiz AI Scheduling Tool</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42291/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-42291 — SysReptor is a fully customizable pentest reporting</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-42224: ipl/web XSS Vulnerability Impacts Icinga Web</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41520/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41520: Cilium Bugtool Leaks Sensitive WireGuard Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-312</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41432/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41432: LLM Gateway Stripe Webhook Flaw Allows Quota Forgery</news:title><news:keywords>vulnerability, cve, high-severity, cwe-345, cwe-863, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42209/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-42209 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-369</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42205: Avo Framework Privilege Escalation in Ruby on Rails Admin Panels</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-284, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42202/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42202 — nova-toggle-5 enables fliping booleans in the index. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42199/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42199 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42193: Plunk Email Platform Critical Unauthenticated Webhook Forgery</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42192/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42192 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44400/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T00:16:28+03:00</news:publication_date>
      <news:title>MailEnable WebAdmin Vulnerability Bypasses Authentication (CVE-2026-44400)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7807/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:32+03:00</news:publication_date>
      <news:title>SmarterTools SmarterMail CVE-2026-7807: Local File Inclusion Exposes Passwords</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42282/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42282 — n8n-MCP is an MCP server that provides AI assistants access</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42190/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42190 — RedwoodSDK is a server-first React framework. From version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42189/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42189: Russh SSH Library DoS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42185 — People is an application to handle users and teams, and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42181/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42181 — Lemmy is a link aggregator and forum for the fediverse.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42180/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42180 — Lemmy is a link aggregator and forum for the fediverse.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42176/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42176 — Scoold is a Q&amp;A and a knowledge sharing platform for teams.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41495/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-41495 — n8n-MCP is an MCP server that provides AI assistants access</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-532</news:keywords>
    </news:news>
  </url></urlset>
