<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7446/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T03:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7446: VetCoders mcp-server-semgrep OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7445/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T03:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7445 — ZachHandley ZMCPTools Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7443/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7443: BurtTheCoder mcp-dnstwist OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7420/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7420: UTT HiPER 1250GW Buffer Overflow Exploitable Remotely</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7419/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>UTT HiPER 1250GW CVE-2026-7419: Remote Buffer Overflow Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/official-sap-npm-packages-compromised-to-steal-credentials-uiepq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:43:44+03:00</news:publication_date>
      <news:title>SAP npm Packages Compromised in Supply-Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/house-approves-spy-program-on-second-attempt-senate-fate-mu-3dg2q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:41:00+03:00</news:publication_date>
      <news:title>House Renews Section 702 FISA, Senate Fate Uncertain</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7418/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>UTT HiPER 1250GW: High-Severity Buffer Overflow (CVE-2026-7418)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7417/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>Algovate xhs-mcp SSRF Vulnerability (CVE-2026-7417) Publicly Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7416/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>PolarVista xcode-mcp-server Suffers High-Severity OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7410/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7410 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7409 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7408 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7407 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7404/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7404: mcpo-simple-server Vulnerability Exposes Data via Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7403/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7403 — Geldata Gel-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1858/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-1858 — wget2 accepts a server certificate with incorrect Key Usage</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/researchers-built-a-chatbot-that-only-knows-the-world-before-cchcy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:58:30+03:00</news:publication_date>
      <news:title>Researchers Build LLM Limited to Pre-1931 Knowledge for Bias Study</news:title><news:keywords>malware, threat-intel, ransomware, data-breach, cloud, identity, ai-security, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/us-china-partner-on-scam-center-takedown-in-dubai-17mq8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:51:00+03:00</news:publication_date>
      <news:title>US, China Partner on Dubai Scam Center Takedown</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-exploit-rce-flaws-in-qinglong-task-scheduler-for-cry-1kr1n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:50:35+03:00</news:publication_date>
      <news:title>Qinglong Task Scheduler Exploited for Cryptomining via RCE Flaws</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, cloud, identity, tools, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7426: FreeRTOS-Plus-TCP IPv6 RA Heap Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34965/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-34965: Cockpit CMS RCE via PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25318: Tenda Router Vulnerability Allows DNS Hijacking</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>Tenda Routers: CVE-2018-25317 Allows Unauthenticated DNS Hijacking</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25316: Tenda Router Flaw Exposes DNS Hijacking Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25315: Alloksoft Video Joiner Buffer Overflow Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25314: Alloksoft WMV Converter Buffer Overflow Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25308/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:26+03:00</news:publication_date>
      <news:title>BuddyPress RCE: Authenticated Users Can Delete Arbitrary Files</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25307/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:26+03:00</news:publication_date>
      <news:title>SysGauge Pro 4.6.12 Vulnerability Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>Free Download Manager CVE-2018-25304: Local Buffer Overflow Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25303/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25303: Allok Video to DVD Burner Stack Overflow</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25302/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25302: Allok AVI to DVD Converter Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25301/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25301: Easy MPEG to DVD Burner Local Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25300/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25300: XATABoost CMS SQL Injection Allows Unauthenticated Data Extraction</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25299/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25299: Prime95 Local Buffer Overflow Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/reverse-engineering-with-ai-unearths-high-severity-github-bu-htoqy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:08:17+03:00</news:publication_date>
      <news:title>AI Reverse Engineering Unearths High-Severity GitHub Bug</news:title><news:keywords>threat-intel, tools, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-29</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-862, improper-access-control, cwe-266, cwe-269, cwe-284, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-finds-38-security-flaws-in-electronic-health-record-platf-g54ev/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:32:42+03:00</news:publication_date>
      <news:title>AI Spots 38 Critical Flaws in OpenEMR Healthcare Platform</news:title><news:keywords>threat-intel, tools, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7466/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:27+03:00</news:publication_date>
      <news:title>AgentFlow RCE Vulnerability (CVE-2026-7466) Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7439/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7439 — AgentFlow&apos;s local web API accepts non-JSON content types on</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7424/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7424: FreeRTOS-Plus-TCP DHCPv6 Vulnerability Leads to DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7423/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7423 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7422 — Insufficient packet validation in FreeRTOS-Plus-TCP before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7398/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7398: Path Traversal in BioinfoMCP Upload Endpoint</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7397/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7397 — NousResearch Hermes-Agent Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-59, cwe-61</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41499/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-41499 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-124, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>Wazuh CVE-2026-30893: Critical Path Traversal to RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-28221 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27105/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-27105 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-26206 — Wazuh is a free and open source platform used for threat</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307, cwe-362, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7396/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7396 — NousResearch Hermes-Agent Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7394/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7394 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5712/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>IdentityIQ CVE-2026-5712: Authenticated Users Can Edit Roles</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-26204 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-124, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7393 — SourceCodester Pizzafy Ecommerce System Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7392/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7392 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7391/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7391 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6915/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-6915 — An authorization flaw in the user management command could</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-6914 — Computing the MD5 checksum of a malformed BSON object under</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-0206 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-0205 — SonicOS Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>SonicOS Access Control Bypass (CVE-2026-0204) Rated High Severity</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306, cwe-1390</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sap-npm-packages-compromised-by-mini-shai-hulud-credential-4sc03/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:26:00+03:00</news:publication_date>
      <news:title>SAP npm Packages Compromised by &quot;Mini Shai-Hulud&quot; Credential Stealing Malware</news:title><news:keywords>threat-intel, vulnerability, malware, cloud, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7389/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7389: EyouCMS SQL Injection Vulnerability Exposed</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7388/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7388 — A weakness has been identified in EyouCMS up to 1.7.9.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7386/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7386: fatbobman mail-mcp-bridge Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6849/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:28+03:00</news:publication_date>
      <news:title>Pardus OS My Computer Vulnerability Allows OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5166/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-5166: Critical Path Traversal in TUBITAK Pardus Software Center</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42198/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:25+03:00</news:publication_date>
      <news:title>pgjdbc Client-Side DoS: Malicious Servers Can Exhaust CPU via SCRAM-SHA-256</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:25+03:00</news:publication_date>
      <news:title>cPanel &amp; WHM Critical Authentication Bypass (CVE-2026-41940)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cpanel-whm-emergency-update-fixes-critical-auth-bypass-bug-hr31j/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:51:44+03:00</news:publication_date>
      <news:title>cPanel, WHM Emergency Patch Fixes Critical Auth Bypass</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/european-commission-accuses-meta-of-breaching-child-safety-r-ozmby/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:47:00+03:00</news:publication_date>
      <news:title>European Commission Accuses Meta of Child Safety Breaches Under DSA</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vect-2-0-ransomware-acts-as-wiper-thanks-to-design-error-oj9u5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:23:53+03:00</news:publication_date>
      <news:title>Vect 2.0 Ransomware Acts as Wiper Due to Design Error</news:title><news:keywords>threat-intel, tools, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-7384 — Ezequiroga Mcp-Bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea3 Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5161/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-5161: Pardus About Suffers High-Severity Symlink Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5141/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-5141: Pardus Software Center Vulnerability Allows Privileged Process Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-266, cwe-269, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:06+03:00</news:publication_date>
      <news:title>Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-123</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41220/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:05+03:00</news:publication_date>
      <news:title>Acronis DLP, Cyber Protect Agent Vulnerable to Local Privilege Escalation (CVE-2026-41220)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25852/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-25852 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-ian3i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:43:00+03:00</news:publication_date>
      <news:title>DPRK Uses AI-Inserted npm Malware, Targeting Developers</news:title><news:keywords>threat-intel, vulnerability, malware, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/swiss-police-arrest-10-suspected-members-of-nigeria-linked-c-2qt9f/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:15:00+03:00</news:publication_date>
      <news:title>Black Axe: Swiss Police Arrest 10 Suspected Members</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/learning-from-the-vercel-breach-shadow-ai-oauth-sprawl-3uywm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T16:05:14+03:00</news:publication_date>
      <news:title>Vercel Breach Highlights OAuth App Risks and Shadow AI Threats</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/lotus-wiper-attack-targeted-venezuelan-energy-firms-utiliti-hhfv0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T16:00:00+03:00</news:publication_date>
      <news:title>Lotus Wiper Targets Venezuelan Energy, Utilities with Sophisticated LotL</news:title><news:keywords>threat-intel, tools, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-fixes-rce-flaw-that-gave-access-to-millions-of-privat-xvj23/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:41:17+03:00</news:publication_date>
      <news:title>GitHub RCE Flaw Could Have Exposed Millions of Private Repositories</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-how-to-automate-exposure-validation-to-match-the-sp-ynxh4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:02:00+03:00</news:publication_date>
      <news:title>AI Automates Attacks: Autonomous Agents Target Active Directory in Minutes</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:00:00+03:00</news:publication_date>
      <news:title>Unidentified RMM Tool Exploited in Active Attacks Against Israeli Organizations</news:title><news:keywords>incd, israel, advisory, alert</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/what-to-look-for-in-an-exposure-management-platform-and-wha-zhxzs/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T14:30:00+03:00</news:publication_date>
      <news:title>Exposure Management Platforms Fall Short: Context is Key, Not Just Counts</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day-47f0x/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T13:29:31+03:00</news:publication_date>
      <news:title>CISA Mandates Urgent Patching for Windows Zero-Day Exploited in Attacks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-authentication-vulnerability-identified-up-10tps/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:37:00+03:00</news:publication_date>
      <news:title>Critical cPanel Authentication Flaw Exposes Servers</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4019/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-4019 — The Complianz – GDPR/CCPA Cookie Consent plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-42412 — WeDevs WP User Frontend Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-10503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:23+03:00</news:publication_date>
      <news:title>CVE-2025-10503 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T11:16:18+03:00</news:publication_date>
      <news:title>SureForms Pro Vulnerability CVE-2026-42377 Exposes Access Control Flaws</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8849/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T10:02:16+03:00</news:publication_date>
      <news:title>Cyber News - Erez Dasa: Unattributed Foreign Login Triggered Investigation</news:title><news:keywords>israel, cybersafe</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8847/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T09:02:28+03:00</news:publication_date>
      <news:title>Vect Ransomware: Bug Turns Encryption into Irreversible Data Wiper</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35155/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T08:16:04+03:00</news:publication_date>
      <news:title>Dell iDRAC10 Vulnerability: Low-Privilege Race Condition Grants High Access</news:title><news:keywords>vulnerability, cve, high-severity, race-condition, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42615/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:41+03:00</news:publication_date>
      <news:title>GCHQ CyberChef XSS Vulnerability (CVE-2026-42615) Identified</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23773/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-23773 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-42167: ProFTPD mod_sql RCE Via Log Expansion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7319/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-7319: Path Traversal in elinsky execution-system-mcp Poses Remote Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7318 — Elie Mcp-Project Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7317 — Grav CMS Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7316: Aider-mcp Command Injection Exposes AI Dev Workflows</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7315: eiceblue spire-pdf-mcp-server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7314: eiceblue spire-doc-mcp-server Path Traversal Publicly Exploited</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7306/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7306 — Xuxueli Xxl-Job Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-320, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-7305 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:49+03:00</news:publication_date>
      <news:title>Outline Insecure Direct Object Reference (CVE-2026-41649) Exposes Documents</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-33467 — Improper Verification of Cryptographic Signature (CWE-347)</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/spy-agency-officials-say-job-loss-anxiety-moving-fast-safe-x3o7u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T00:43:20+03:00</news:publication_date>
      <news:title>NGA Grapples with AI Workforce Overhaul and Job Anxiety</news:title><news:keywords>threat-intel, policy, government, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw-kdccf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T00:07:23+03:00</news:publication_date>
      <news:title>LiteLLM Pre-Auth SQLi Actively Exploited: CVE-2026-42208</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nsa-chief-during-snowden-affair-shares-regrets-reflections-pagdy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T23:38:59+03:00</news:publication_date>
      <news:title>NSA Chief Reflects on Snowden Leaks: Lessons for CISOs</news:title><news:keywords>threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-28</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:47+03:00</news:publication_date>
      <news:title>CVE-2026-42431: OpenClaw Vulnerability Allows Persistent Browser Profile Mutation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:46+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42426: Improper Authorization Allows Node Pairing Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:45+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42422: Role Bypass Allows Unapproved Token Minting</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:45+03:00</news:publication_date>
      <news:title>OpenClaw QQ Bot SSRF Vulnerability Bypasses Protections (CVE-2026-41914)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41404/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:43+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation via Incomplete Scope Clearing (CVE-2026-41404)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41394/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:42+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-41394: Authentication Bypass Grants Operator Write Scopes</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41387/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw Incomplete Host Environment Sanitization Allows Package Overrides</news:title><news:keywords>vulnerability, cve, high-severity, cwe-183</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41386/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation: Critical Flaw in Device Pairing</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-648</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw CLI Vulnerability Allows Code Execution via Environment Variable Injection</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-15</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>CVE-2026-41383: OpenClaw Arbitrary Directory Deletion Flaw Exposes Remote Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:40+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation (CVE-2026-41378) Allows RCE via Paired Nodes</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:39+03:00</news:publication_date>
      <news:title>CVE-2026-3893: Carlson VASCO-B GNSS Receiver Lacks Authentication</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA NeMoClaw Vulnerability Exposes Host Environment Variables</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24186/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA FLARE SDK Vulnerability: Untrusted Deserialization Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24178/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA NVFlare Dashboard: Critical Auth Bypass Puts Systems at Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vidar-rises-to-top-of-chaotic-infostealer-market-emmj1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:07:16+03:00</news:publication_date>
      <news:title>Vidar Infostealer Dominates Post-Takedown Market Vacuum</news:title><news:keywords>threat-intel, tools, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4548/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:03:18+03:00</news:publication_date>
      <news:title>XChat Lacks True E2E, Metadata Exposure Persists</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8844/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:53:48+03:00</news:publication_date>
      <news:title>GitHub RCE Vulnerability Exposes Millions of Repositories</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8843/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:42:07+03:00</news:publication_date>
      <news:title>Ynet, Population Authority Project Pulled Over Data Exposure Flaw</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/brazilian-lofygang-resurfaces-after-three-years-with-minecra-g3nbk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:39:00+03:00</news:publication_date>
      <news:title>LofyGang Resurfaces, Targets Minecraft Players with LofyStealer Malware</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cyber-command-nsa-chief-warns-foreign-adversaries-likely-to-2x8o0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:26:00+03:00</news:publication_date>
      <news:title>Cyber Command Warns Foreign Adversaries Targeting Midterm Elections</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/video-site-vimeo-blames-security-incident-on-anodot-breach-jrutw/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T19:21:00+03:00</news:publication_date>
      <news:title>Vimeo Blames Anodot Breach for User Data Theft by ShinyHunters</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-60887/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T19:16:05+03:00</news:publication_date>
      <news:title>CVE-2025-60887 — Cista Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7321/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:37+03:00</news:publication_date>
      <news:title>Firefox ESR Sandbox Escape: Critical CVE-2026-7321 Demands Immediate Attention</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7289/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:37+03:00</news:publication_date>
      <news:title>D-Link DIR-825M Buffer Overflow (CVE-2026-7289) Exposes Routers</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7288/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:37+03:00</news:publication_date>
      <news:title>D-Link DIR-825M Buffer Overflow (CVE-2026-7288) Publicly Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7283/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-7283 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7282/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-7282 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40968/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-40968 — When an authenticated user is denied access to a gRPC</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-653</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27760/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T18:16:26+03:00</news:publication_date>
      <news:title>OpenCATS Installer Vulnerability Allows Unauthenticated PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukrainian-police-detain-hackers-suspected-of-stealing-thousa-qj6eq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:57:00+03:00</news:publication_date>
      <news:title>Ukraine Police Arrest Hackers Targeting Thousands of Roblox Accounts</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7272/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:16:14+03:00</news:publication_date>
      <news:title>CVE-2026-7272: WilliamCloudQi matlab-mcp-server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5944/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-5944: Cisco Intersight Connector Exposes Nutanix Prism Central API</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-306, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-o-v382i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T17:01:00+03:00</news:publication_date>
      <news:title>VECT 2.0 Ransomware: Wiper-Like Flaw Irreversibly Destroys Files</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T16:19:24+03:00</news:publication_date>
      <news:title>CVE-2026-7309 — The OpenShift Container Platform Build System Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-426</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7271/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T16:19:24+03:00</news:publication_date>
      <news:title>CVE-2026-7271 — DV0x Creative-Ad-Agent Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7268/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7268 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7267/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7267 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7266/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7266 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-1708/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-1708 — ConnectWise ScreenConnect: ConnectWise ScreenConnect Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-rls1b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T14:58:00+03:00</news:publication_date>
      <news:title>Secure Data Movement is Zero Trust&apos;s Unseen Bottleneck</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8842/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T14:56:31+03:00</news:publication_date>
      <news:title>AI Agents Claude, Cursor, Codex Weaponize Text Files</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-84lys/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T14:18:00+03:00</news:publication_date>
      <news:title>Hugging Face LeRobot RCE: Unauthenticated Deserialization Flaw</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/after-mythos-new-playbooks-for-a-zero-window-era-tyb2q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:30:00+03:00</news:publication_date>
      <news:title>AI Accelerates Exploit Windows, Demanding Faster Defense</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7280/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7280 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-428</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7279/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:16:04+03:00</news:publication_date>
      <news:title>AVACAST DLL Hijacking (CVE-2026-7279) Allows System Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7264/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T13:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7264 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:18+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Critical Buffer Overflow Vulnerability (CVE-2026-7248)</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7247/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:18+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Buffer Overflow: CVE-2026-7247 Exposes Remote Exploitation Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7244: Critical Command Injection Flaw in Totolink Router</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7243/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>Totolink RCE: CVE-2026-7243 Exposes Routers to Critical Command Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7242/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7242: Critical Command Injection in Totolink A8000RU</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:17+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7241)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40980/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-40980 — In Spring AI, a malicious PDF file can be crafted that</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40979/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-40979 — In Spring AI, having access to a shared environment can</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-377</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:16:16+03:00</news:publication_date>
      <news:title>Spring AI CosmosDBVectorStore Vulnerable to SQL Injection (CVE-2026-40978)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8841/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T12:15:54+03:00</news:publication_date>
      <news:title>Robinhood Registration Form Abused for Official-Looking Phishing</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-asks-iphone-users-to-reauthenticate-after-outlook-1skep/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:37:12+03:00</news:publication_date>
      <news:title>Microsoft Outlook Outage Forces iPhone Users to Re-Authenticate</news:title><news:keywords>threat-intel, data-breach, malware, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7240/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7240)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7238/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7238 — Code-Projects Online Music Site Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7237/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7237: AgiFlow Path Traversal Puts Files at Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7235/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7235 — ErlichLiu Claude-Agent-Sdk-Master Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-4911 — The Booking Package plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-472</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4805/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-4805 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41526/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-41526 — In KDE KCoreAddons before 6.25, KShell::quoteArgs is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-150</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41525/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-41525 — KDE Dolphin before 25.12.3 allows applications in a Flatpak</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-669</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-40966 — In Spring AI, an attacker can bypass conversation isolation</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7234: Path Traversal Flaw in BrowserOperator Core Exposes Users</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7230/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7230 — SourceCodester Safety Anger Pad Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7229 — Code-Projects Coaching Management System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40967/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>Spring AI Vulnerability (CVE-2026-40967) Allows Query Alteration</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40356/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T10:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-40356 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2297/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:59:34+03:00</news:publication_date>
      <news:title>Google Reports 32% Surge in Prompt Injection Attacks</news:title><news:keywords>israel, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-patches-entra-id-role-flaw-that-enabled-service-pr-5lakt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:37:00+03:00</news:publication_date>
      <news:title>Microsoft Entra ID Agent Role Flaw Enabled Service Principal Takeover</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/medtronic-hack-confirmed-after-shinyhunters-threatens-data-l-gtyoc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:35:19+03:00</news:publication_date>
      <news:title>Medtronic Confirms Breach After ShinyHunters Data Leak Threat</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7228: SourceCodester Pizzafy SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7227/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7227: SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7226/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7226: SQL Injection in SourceCodester Pizzafy Ecommerce System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7225: SourceCodester Pizzafy SQL Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7224: SQL Injection in SourceCodester Pizzafy Ecommerce System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6809/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6809 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6725/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6725 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6551/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6551 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42510/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-42510 — OpenStack Ironic through 25.0.0 allows ipmitool execution</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40355/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T09:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-40355 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-confirms-active-exploitation-of-windows-shell-cve-14h3k/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T08:50:00+03:00</news:publication_date>
      <news:title>Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8839/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T08:02:10+03:00</news:publication_date>
      <news:title>ShinyHunters Claims Vimeo Breach, Citing Anodot Compromise</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8838/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:55:28+03:00</news:publication_date>
      <news:title>RansomHouse Claims CyberSecurity Vendor with Billions in Revenue</news:title><news:keywords>israel, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2296/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:41:31+03:00</news:publication_date>
      <news:title>HAFNIUM Hacker Extradited to US for Microsoft Exchange Attacks, COVID-19 Espionage</news:title><news:keywords>israel, microsoft, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7223: BigSweetPotatoStudio HyperChat SSRF Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:26+03:00</news:publication_date>
      <news:title>TencentCloudBase CloudBase-MCP SSRF Vulnerability (CVE-2026-7221)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7220/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7220: FastlyMCP Command Injection Exposes Infrastructure</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7219/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T07:16:23+03:00</news:publication_date>
      <news:title>Totolink N300RT: High-Severity Buffer Overflow Vulnerability (CVE-2026-7219)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7218/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7218: Totolink N300RT Buffer Overflow Exploited Remotely</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7217/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7217 — Deepractice PromptX Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22, cwe-36</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7216/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7216: donchelo processing-claude-mcp-bridge Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:04+03:00</news:publication_date>
      <news:title>egtai gmx-vmd-mcp Vulnerability: Remote Command Injection (CVE-2026-7215)</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1460/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-1460: Zyxel Routers Vulnerable to Admin Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0711/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T06:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-0711 — The EasyMesh-Related APIs Of Zyxel DX3300-T0 Firmware Versio Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T05:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-7214: eghuzefa engineer-your-data Path Traversal Vulnerability (High Severity)</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T05:16:08+03:00</news:publication_date>
      <news:title>ef10007 MLOps_MCP Path Traversal (CVE-2026-7213) Publicly Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T05:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-7212: edvardlindelof notes-mcp Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7211: dvladimirov MCP Command Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7206: sqlite-mcp SQL Injection Vulnerability Exposed</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7205: High-Severity Path Traversal in duartium papers-mcp-server</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical Command Injection (CVE-2026-7204)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7203/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7203)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7202/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:01+03:00</news:publication_date>
      <news:title>Totolink A8000RU Critical OS Command Injection (CVE-2026-7202)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-32649 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32644/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:00+03:00</news:publication_date>
      <news:title>Milesight AIOT Cameras Critical Vulnerability: Default SSL Keys Exposed</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20766/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T04:16:00+03:00</news:publication_date>
      <news:title>Milesight AIOT Cameras Vulnerable to Out-of-Bounds Memory Access (CVE-2026-20766)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-122</news:keywords>
    </news:news>
  </url></urlset>
