<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/shai-hulud-attack-ships-signed-malicious-tanstack-mistral-n-iu4sj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:29:36+03:00</news:publication_date>
      <news:title>Shai Hulud Malware Compromises TanStack, Mistral npm Packages in Supply Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45218/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-45218: WP Travel Blind SQL Injection Puts User Data at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-45215 — Saad Iqbal WP EasyPay Wp-Easy-Pay Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>Xpro Elementor Addons SQL Injection (CVE-2026-45214) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>BEAR Woo-Bulk-Editor SQLi Puts WooCommerce Stores at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-45212 — Gabe Livan Asset CleanUp: Page Speed Booster Wp-Asset-Clean- Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>APIExperts Square for WooCommerce SQLi (CVE-2026-45211) Exposes E-commerce Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-45210 — Broadstreet Broadstreet Ads Broadstreet Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42742/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>Aman Views for WPForms Vulnerability Allows Blind SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:20+03:00</news:publication_date>
      <news:title>Ninja Forms Views Blind SQL Injection (CVE-2026-42741) — High Severity</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41713/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-41713: High-Severity AI Model Manipulation Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41712/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:19+03:00</news:publication_date>
      <news:title>Spring AI Chat Memory Vulnerability Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2465/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:16:19+03:00</news:publication_date>
      <news:title>Turboard FOR-S Privilege Escalation via Incorrect Authorization (CVE-2026-2465)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sap-fixes-critical-vulnerabilities-in-commerce-cloud-and-s-4-p44lq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T14:04:55+03:00</news:publication_date>
      <news:title>SAP Patches Critical Flaws in Commerce Cloud and S/4HANA</news:title><news:keywords>threat-intel, data-breach, malware, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/why-agentic-ai-is-security-s-next-blind-spot-5dlko/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:30:00+03:00</news:publication_date>
      <news:title>Agentic AI: Security&apos;s Next Blind Spot Already in Production</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-6001: ABIS BAPSİS Authorization Bypass Exposes Trusted Identifiers</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:46+03:00</news:publication_date>
      <news:title>Solid Edge SE2026 Vulnerability Allows Code Execution via PAR Files</news:title><news:keywords>vulnerability, cve, high-severity, stack-based-buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:46+03:00</news:publication_date>
      <news:title>Solid Edge SE2026 Vulnerability Allows Code Execution via PAR Files</news:title><news:keywords>vulnerability, cve, high-severity, cwe-824</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41551/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-41551: Critical Path Traversal in ROS# Exposes Arbitrary Files</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-33893: Siemens Teamcenter Hardcoded Key Exposes Unauthorized Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27662/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-27662: Control Panel Exposes Web Browser, High Severity</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25787/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-25787: Critical XSS in Motion Control Diagnostics</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25786/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-25786: Critical XSS in PLC/Station Name Field</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22925/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:44+03:00</news:publication_date>
      <news:title>SIMATIC CN 4100 DoS Vulnerability: CVE-2026-22925 Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22924/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>SIMATIC CN 4100 Critical Vulnerability: Unauthenticated Resource Exhaustion</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-6577/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>Akilli Commerce E-Commerce Website SQLi Vulnerability (CVE-2025-6577)</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40949/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>CVE-2025-40949: Critical RUGGEDCOM ROX Command Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40947/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:43+03:00</news:publication_date>
      <news:title>RUGGEDCOM ROX RCE via Feature Key Installation (CVE-2025-40947)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40946/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:42+03:00</news:publication_date>
      <news:title>CVE-2025-40946: KACO new energy Inverter Credential Derivation Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40833/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T13:16:41+03:00</news:publication_date>
      <news:title>CVE-2025-40833: IPv4 Null Pointer Dereference Triggers DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:58+03:00</news:publication_date>
      <news:title>CVE-2026-7661 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7659/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:57+03:00</news:publication_date>
      <news:title>CVE-2026-7659 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6913/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:56+03:00</news:publication_date>
      <news:title>CVE-2026-6913 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6690/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>LifePress Plugin XSS: Unauthenticated Attackers Inject Malicious Scripts</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6256/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-6256 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6247/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-6247 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6237/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-6237 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5715/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-5715 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5340/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-5340 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5028/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-5028 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4920/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-4920 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4859/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-4859 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39432/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-39432: Timetics Plugin Missing Authorization Exposes Access Controls</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:40+03:00</news:publication_date>
      <news:title>WordPress AIWU Plugin SQLi: Unauthenticated Data Extraction</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2300/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-2300 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guard-k2810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T11:50:00+03:00</news:publication_date>
      <news:title>Mini Shai-Hulud Worm Hits TanStack, Mistral AI, Guardrails AI Packages</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/instructure-reaches-ransom-agreement-with-shinyhunters-to-st-xfe90/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:37:00+03:00</news:publication_date>
      <news:title>Instructure Reaches Ransom Agreement with ShinyHunters to Stop Canvas Leak</news:title><news:keywords>threat-intel, vulnerability, ransomware, data-breach, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1681/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-1681 — Issuing an ICMP ping via the `net ping` shell command to a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-1185 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0804/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-0804 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0802/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-0802 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-1287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0541/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T10:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-0541 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cushman-wakefield-310-431-breached-accounts-ak8xd/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:58:16+03:00</news:publication_date>
      <news:title>Cushman &amp; Wakefield Suffers ShinyHunters Data Extortion, 310K Accounts Breached</news:title><news:keywords>data-breach, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/openai-launches-daybreak-for-ai-powered-vulnerability-detect-sfxld/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:55:00+03:00</news:publication_date>
      <news:title>OpenAI Launches Daybreak for AI-Powered Vulnerability Detection</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41872/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T09:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41872: Kura Sushi App Vulnerable to MITM via Improper Certificate Validation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ios-26-5-brings-default-end-to-end-encrypted-rcs-messaging-b-69skb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T08:18:00+03:00</news:publication_date>
      <news:title>Apple iOS 26.5 Brings End-to-End Encrypted RCS Messaging</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T08:03:16+03:00</news:publication_date>
      <news:title>SMS-Based Disinformation Campaign Targets Mobile Users</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7287/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>Zyxel NWA1100-N Firmware DoS: CVE-2026-7287 Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7257/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7257 — The Configuration File Of Zyxel WRE6505 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-922</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7256/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>Zyxel WRE6505 v2: High-Severity Command Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7255 — The Web Management Interface Of Zyxel WRE6505 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45430/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-45430: Backdrop CMS Salesforce Module CSRF Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40137/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40137 — SAP TAF_APPLAUNCHER within Business Server Pages allows an</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40136/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40136 — SAP Financial Consolidation allows an authenticated</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40135/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40135 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40134/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40134 — Due to insufficient authorization checks in the SAP</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40133/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40133 — Due to missing authorization check in SAP S/4HANA Condition</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40132/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-40132 — Due to missing authorization check in SAP Strategic</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40129/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-40129 — SAP Application Server ABAP For SAP NetWeaver And ABAP Platf Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34263/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>SAP Commerce Cloud: Critical RCE via Spring Security Misconfiguration</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-459</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>SAP S/4HANA SQLi: Critical Flaw Exposes Data, Risks Availability</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34259/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>SAP Forecasting &amp; Replenishment OS Command Execution (CVE-2026-34259)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34258/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34258 — SAPUI5 (Search UI) allows an unauthenticated attacker to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-451</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27682/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-27682 — SAP NetWeaver Application Server ABAP (Applications Based On Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0502/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T06:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-0502 — Due to insufficient CSRF protection in SAP BusinessObjects</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45321/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T04:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-45321: TanStack npm Packages Hit by Critical Supply Chain Attack</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-506</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T03:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-8349 — Omec-Project Amf Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-119</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8346/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T03:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-8346 — D-Link DIR-816 1.10CNB05_R1B011D88210 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:22+03:00</news:publication_date>
      <news:title>CVE-2026-8345 — D-Link DIR-816 1.10CNB05_R1B011D88210 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:22+03:00</news:publication_date>
      <news:title>Vaultwarden CVE-2026-43914: Brute-Force Bypass via 2FA Email</news:title><news:keywords>vulnerability, cve, high-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43913/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:22+03:00</news:publication_date>
      <news:title>Vaultwarden CVE-2026-43913: Unconfirmed Owners Can Purge Vaults</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43912/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>Vaultwarden CVE-2026-43912 Allows Org Data Access via Group Management Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43911 — Vaultwarden is a Bitwarden-compatible server written in</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43901/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43901 — Wireshark MCP is an MCP Server that turns tshark into a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43900/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43900: DeepChat XSS Bypass Threatens AI Implementations</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43899/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:20:21+03:00</news:publication_date>
      <news:title>CVE-2026-43899: DeepChat RCE Via Incomplete Patch for External Protocol Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34963/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:19:47+03:00</news:publication_date>
      <news:title>CVE-2026-34963: barebox EFI PE Loader Memory Safety Flaws</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34962/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T02:19:47+03:00</news:publication_date>
      <news:title>CVE-2026-34962 — barebox version prior to 2026.04.0 contains a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8344/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:14+03:00</news:publication_date>
      <news:title>CVE-2026-8344 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:14+03:00</news:publication_date>
      <news:title>CVE-2026-43893: ExifTool Argument Injection Threatens File Operations</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43890/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:13+03:00</news:publication_date>
      <news:title>Outline CVE-2026-43890: Authorization Bypass Exposes Documents</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43889/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:13+03:00</news:publication_date>
      <news:title>CVE-2026-43889 — Outline is a service that allows for collaborative</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43888/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:13+03:00</news:publication_date>
      <news:title>Outline Service Vulnerability CVE-2026-43888 Allows Directory Traversal</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43887/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:13+03:00</news:publication_date>
      <news:title>Outline Collaboration Service Vulnerability Allows Client-Side Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43886/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:13+03:00</news:publication_date>
      <news:title>Outline Service Vulnerability Elevates OAuth Tokens to Full API Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43884/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:13+03:00</news:publication_date>
      <news:title>WWBN AVideo SSRF Bypass via Redirects (CVE-2026-43884)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43876/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:11+03:00</news:publication_date>
      <news:title>CVE-2026-43876 — WWBN AVideo is an open source video platform. In versions</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43875/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:11+03:00</news:publication_date>
      <news:title>CVE-2026-43875 — WWBN AVideo is an open source video platform. In versions</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-598</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43873/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:11+03:00</news:publication_date>
      <news:title>WWBN AVideo CVE-2026-43873: Shared Secret Leak Exposes Databases</news:title><news:keywords>vulnerability, cve, high-severity, cwe-209</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42564/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:11+03:00</news:publication_date>
      <news:title>jotty·page Path Traversal Vulnerability (CVE-2026-42564) Exposes Data</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42046/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:11+03:00</news:publication_date>
      <news:title>CVE-2026-42046: libcaca Integer Overflow Resurfaces, RCE Risk</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-122, cwe-190, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34961/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:11+03:00</news:publication_date>
      <news:title>CVE-2026-34961 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:22:10+03:00</news:publication_date>
      <news:title>CVE-2026-34960 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/official-checkmarx-jenkins-package-compromised-with-infostea-lxem8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:03:06+03:00</news:publication_date>
      <news:title>Checkmarx Jenkins Plugin Compromised with Infostealer</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-ghostlock-tool-abuses-windows-api-to-block-file-access-qpjah/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:02:00+03:00</news:publication_date>
      <news:title>GhostLock Tool Abuses Windows API to Block File Access</news:title><news:keywords>threat-intel, data-breach, malware, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/inside-ad-cs-escalation-unpacking-advanced-misuse-technique-pl1qr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T01:00:43+03:00</news:publication_date>
      <news:title>AD CS Exploitation: Misconfigurations and Shadow Credentials Under Attack</news:title><news:keywords>threat-intel, apt, malware, research, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43874/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T00:19:02+03:00</news:publication_date>
      <news:title>CVE-2026-43874: WWBN AVideo WebSocket Vulnerability Allows RCE</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41489/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T00:19:00+03:00</news:publication_date>
      <news:title>Pi-hole Privilege Escalation via Systemd Scripts (CVE-2026-41489)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-15, cwe-269, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8321/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:48+03:00</news:publication_date>
      <news:title>CVE-2026-8321: Inkeep Agents Authentication Bypass Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-287, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8320/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:48+03:00</news:publication_date>
      <news:title>CVE-2026-8320 — Jishenghua JshERP Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8319/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:48+03:00</news:publication_date>
      <news:title>CVE-2026-8319 — A weakness has been identified in aiwaves-cn agents up to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45026/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:47+03:00</news:publication_date>
      <news:title>CVE-2026-45026 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45025/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:46+03:00</news:publication_date>
      <news:title>CVE-2026-45025 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42887/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:45+03:00</news:publication_date>
      <news:title>CVE-2026-42887 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42886/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:45+03:00</news:publication_date>
      <news:title>CVE-2026-42886 — Audiobookshelf is a self-hosted audiobook and podcast</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-409</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42883/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:44+03:00</news:publication_date>
      <news:title>CVE-2026-42883 — Audiobookshelf is a self-hosted audiobook and podcast</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:44+03:00</news:publication_date>
      <news:title>oxyno-zeta/s3-proxy Critical Auth Bypass (CVE-2026-42882)</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42876/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:44+03:00</news:publication_date>
      <news:title>CVE-2026-42876 — External Secrets Operator reads information from a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42872/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:43+03:00</news:publication_date>
      <news:title>CVE-2026-42872 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42869/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:43+03:00</news:publication_date>
      <news:title>CVE-2026-42869: SOCFortress CoPilot Critical Auth Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287, cwe-522, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42565/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:42+03:00</news:publication_date>
      <news:title>CVE-2026-42565 — Open Redirect</news:title><news:keywords>vulnerability, cve, medium-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42050/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:42+03:00</news:publication_date>
      <news:title>CVE-2026-42050 — ImageMagick is free and open-source software used for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2614/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:25:41+03:00</news:publication_date>
      <news:title>MLflow Arbitrary File Read Vulnerability Bypasses Path Validation</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-11</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, improper-access-control, cwe-184, cwe-918, cwe-441, cwe-863, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/texas-sues-netflix-over-alleged-data-practices-that-create-dikbm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:56:00+03:00</news:publication_date>
      <news:title>Texas Sues Netflix for Alleged Data &apos;Surveillance Machinery&apos;</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-8318 — VectifyAI PageIndex Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-404, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:16:28+03:00</news:publication_date>
      <news:title>Crabbox Path Traversal (CVE-2026-45224) Enables Arbitrary File Deletion</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-45223: Crabbox Authentication Bypass Allows Admin Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-45222 — Summarize versions through 0.14.1, fixed in commit 0cfb0fb,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42864/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-42864: Unauthenticated RCE in FireFighter Incident Management App</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4577/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:11:31+03:00</news:publication_date>
      <news:title>Trump Mobile T1 and $TRUMP Memecoin: A Brand Power Illusion</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:44+03:00</news:publication_date>
      <news:title>OpenClaw Improper Authentication: CVE-2026-8305 Publicly Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45006/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:40+03:00</news:publication_date>
      <news:title>OpenClaw Improper Access Control Bypasses Denylist, Allows Persistent Malicious Configs</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45004/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:40+03:00</news:publication_date>
      <news:title>OpenClaw RCE: Arbitrary Code Execution via Plugin Setup Resolver</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:40+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-45001: Gateway Bypass Exposes Operator Settings</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44995/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:39+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-44995: Arbitrary Code Execution via Environment Variable Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44413/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:38+03:00</news:publication_date>
      <news:title>JetBrains TeamCity CVE-2026-44413: Authenticated Exposure of Server API</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43640/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:37+03:00</news:publication_date>
      <news:title>Bitwarden Server CVE-2026-43640: SCIM API Key Exposed Without Re-Auth</news:title><news:keywords>vulnerability, cve, high-severity, cwe-303</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43639/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:36+03:00</news:publication_date>
      <news:title>Bitwarden Server CVE-2026-43639 Allows Organization Takeover on Cloud</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42860/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:36+03:00</news:publication_date>
      <news:title>Open edX Enterprise Service Vulnerability Allows SSRF via SAML Metadata</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42858/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:36+03:00</news:publication_date>
      <news:title>Open edX Platform SSRF via Unvalidated URL Parameter (CVE-2026-42858)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-42315: pyLoad Directory Traversal Puts Data at Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22, cwe-36</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42313/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-42313: pyLoad Proxy Bypass Exposes Outbound Traffic</news:title><news:keywords>vulnerability, cve, high-severity, cwe-441, cwe-863, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42312/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-42312 — pyLoad is a free and open-source download manager written</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295, cwe-306, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-41431: Zen Browser Updater Strips Signature Verification</news:title><news:keywords>vulnerability, cve, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T21:16:31+03:00</news:publication_date>
      <news:title>MLflow SSRF Vulnerability (CVE-2026-2393) Exposes Internal Services</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fcc-pushes-ban-on-security-updates-for-foreign-made-routers-190xb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:50:00+03:00</news:publication_date>
      <news:title>FCC Delays Security Update Ban for Foreign Routers and Drones to 2029</news:title><news:keywords>threat-intel, data-breach, government, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7819/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:39+03:00</news:publication_date>
      <news:title>pgAdmin 4 Path Traversal (CVE-2026-7819) Allows Arbitrary File Writes</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7818/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:38+03:00</news:publication_date>
      <news:title>CVE-2026-7818: pgAdmin 4 Deserialization Flaw Allows RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7817/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:38+03:00</news:publication_date>
      <news:title>CVE-2026-7817 — PgAdmin 4: Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7816/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:38+03:00</news:publication_date>
      <news:title>pgAdmin 4 CVE-2026-7816: OS Command Injection via Query Export</news:title><news:keywords>vulnerability, cve, high-severity, command-injection</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7815/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:37+03:00</news:publication_date>
      <news:title>pgAdmin 4 SQLi (CVE-2026-7815) Allows RCE on PostgreSQL Servers</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7813/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:37+03:00</news:publication_date>
      <news:title>CVE-2026-7813: Critical Authorization Bypass in pgAdmin 4 Server Mode</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44200/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:35+03:00</news:publication_date>
      <news:title>CVE-2026-44200 — Wagtail is an open source content management system built</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-280</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44199/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:35+03:00</news:publication_date>
      <news:title>CVE-2026-44199 — Wagtail is an open source content management system built</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-280</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44197/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:34+03:00</news:publication_date>
      <news:title>CVE-2026-44197 — Wagtail is an open source content management system built</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-280</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42613/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:34+03:00</news:publication_date>
      <news:title>Grav Critical Vulnerability Allows Unauthenticated Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42612/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:34+03:00</news:publication_date>
      <news:title>Grav XSS Vulnerability (CVE-2026-42612) Allows Publisher Account Takeover</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42611/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:34+03:00</news:publication_date>
      <news:title>Grav XSS Escalates to RCE via Admin Panel</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42610/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:33+03:00</news:publication_date>
      <news:title>CVE-2026-42610 — Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42609/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:33+03:00</news:publication_date>
      <news:title>Grav Admin Panel Vulnerability Allows Account Takeover via Low-Privilege User</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-269, cwe-285, cwe-639, cwe-837</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42607/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T19:17:32+03:00</news:publication_date>
      <news:title>Grav RCE via Malicious Plugin Upload (CVE-2026-42607)</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-f-og1av/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T18:45:00+03:00</news:publication_date>
      <news:title>AI-Developed Zero-Day Bypasses 2FA, Google Confirms</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8290/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-8290 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8289/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-8289 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4802/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:16:31+03:00</news:publication_date>
      <news:title>Cockpit CVE-2026-4802: Remote Command Execution via Unsanitized Logs</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/build-application-firewalls-aim-to-stop-the-next-supply-chai-yciiv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:06:01+03:00</news:publication_date>
      <news:title>Build Application Firewalls to Stop Supply Chain Attacks</news:title><news:keywords>threat-intel, vulnerability, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8288/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T16:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8288 — The Function Gsm_handle_pdu_session_modification_qos_flow_de Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-detects-first-ai-generated-zero-day-exploit-3kggl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T16:04:21+03:00</news:publication_date>
      <news:title>Google Detects First AI-Generated Zero-Day Exploit Bypassing 2FA</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-zh0um/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T16:02:30+03:00</news:publication_date>
      <news:title>Google: AI Used to Develop Zero-Day Exploit for Web Admin Tool</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-water-company-allowed-hackers-to-lurk-undetected-for-near-baqhq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:51:00+03:00</news:publication_date>
      <news:title>Cl0p Ransomware: UK Water Company Fined for Two-Year Undetected Breach</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/weekly-recap-linux-rootkit-macos-crypto-stealer-websock-h9uws/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:36:00+03:00</news:publication_date>
      <news:title>Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers Emerge</news:title><news:keywords>threat-intel, vulnerability, malware, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/dirty-frag-linux-kernel-hit-by-second-major-security-flaw-i-mmuax/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:26:00+03:00</news:publication_date>
      <news:title>Dirty Frag: Linux Kernel Hit by Second Major Flaw in Weeks</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-9973/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:16:11+03:00</news:publication_date>
      <news:title>CVE-2025-9973 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-10470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:16:10+03:00</news:publication_date>
      <news:title>CVE-2025-10470: Magic Link DoS via Uncontrolled Memory Growth</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:09:37+03:00</news:publication_date>
      <news:title>Nitrogen Group Claims Major Foxconn Data Breach, Affecting Apple, Google, Nvidia Supply Chains</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/skoda-data-breach-hits-online-shop-customers-3cpgk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:54:27+03:00</news:publication_date>
      <news:title>Skoda Data Breach Exposes Online Shop Customer Data</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/your-purple-team-isn-t-purple-it-s-just-red-and-blue-in-th-82xug/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:30:00+03:00</news:publication_date>
      <news:title>Purple Teaming: Not Just Red and Blue in the Same Room</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sailpoint-discloses-github-repository-hack-llfmw/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:52:23+03:00</news:publication_date>
      <news:title>SailPoint GitHub Repository Hacked, No Customer Data Impacted</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:13+03:00</news:publication_date>
      <news:title>GROWI Path Traversal (CVE-2026-41951) Allows EJS Template Execution</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40636/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:13+03:00</news:publication_date>
      <news:title>Dell ECS, ObjectScale Hit by Critical Hard-Coded Credential Flaw</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35157/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-35157 — The UI. An Unauthenticated Attacker With Remote Access Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1236</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32658/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:13+03:00</news:publication_date>
      <news:title>Dell Automation Platform: Missing Authorization Vulnerability (CVE-2026-32658)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26946/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-26946 — The OS. A High Privileged Attacker With Local Access Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-8325/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:13+03:00</news:publication_date>
      <news:title>CVE-2025-8325 — Internal Service APIs, Potentially Exposing Them In WSO2 API Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-281</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-8154/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:12+03:00</news:publication_date>
      <news:title>CVE-2025-8154 — In Webhook API invocations, the component accepts</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-43992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:12+03:00</news:publication_date>
      <news:title>CVE-2025-43992 — Geo Replication. An Unauthenticated Attacker With Remote Acc Authentication Bypass</news:title><news:keywords>vulnerability, cve, medium-severity, authentication-bypass, cwe-302</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-0391/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T13:16:11+03:00</news:publication_date>
      <news:title>CVE-2024-0391 — The check user account lock states feature within the email</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-204</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/checkmarx-jenkins-ast-plugin-compromised-in-supply-chain-att-z0m7a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T12:34:55+03:00</news:publication_date>
      <news:title>Checkmarx Jenkins AST Plugin Hit by Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-dirty-frag-linux-vulnerability-possibly-exploited-in-a-jnol5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T11:15:28+03:00</news:publication_date>
      <news:title>New &apos;Dirty Frag&apos; Linux Vulnerability Exploited Pre-Patch</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1677/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-1677 — Zephyr sockets created with `IPPROTO_TLS_1_3` can still</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-757</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8910/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:51:01+03:00</news:publication_date>
      <news:title>TrustedVolumes Crypto Project Suffers $6.7M Theft</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8908/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:20:24+03:00</news:publication_date>
      <news:title>US Nationals Jailed for Aiding North Korean IT Worker Fraud Scheme</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8274/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-8274 — Npitre Cramfs-Tools Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8273/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-8273 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8272/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-8272 — D-Link DNS-320 2.06B01 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8271/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-8271 — D-Link DNS-320 2.06B01 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8270/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-8270 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8269/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-8269 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4576/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:45:19+03:00</news:publication_date>
      <news:title>Apple AirPods Cameras: Privacy Nightmare Beyond User Choice</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8268/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-8268 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8267/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-8267 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8266/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-8266 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8265/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-8265 — Tenda AC6 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8264/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-8264 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T07:12:10+03:00</news:publication_date>
      <news:title>ClaudeBleed: Critical Flaw Hijacks Claude&apos;s Browser Extension</news:title><news:keywords>israel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8263/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-8263 — Tenda AC6 15.03.06.49_multi_TDE01 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8261/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8261 — The Function SQFunctionProto::Load Of The File Squirrel/Sqob Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>D-Link DCS-935L CVE-2026-8260: Remote Buffer Overflow in HNAP Service</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8259/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8259 — Tenda AC6 2.0/15.03.06.23 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8258/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8258 — Squirrel Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8252/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T03:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8252 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-404, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8251/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8251 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8250/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8250 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8249/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8249 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8248 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-10</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-290, privilege-escalation, cwe-862, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8905/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T19:01:33+03:00</news:publication_date>
      <news:title>ShinyHunters Ransomware Disrupts Instructure Canvas, Forces Payout</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2022-50944/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:32+03:00</news:publication_date>
      <news:title>Aero CMS 0.0.1 Vulnerability Allows Authenticated PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47949/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:31+03:00</news:publication_date>
      <news:title>CyberPanel 2.1 RCE via Symlink Attack (CVE-2021-47949)</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47943/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>TextPattern CMS RCE (CVE-2021-47943) Allows Authenticated Attackers to Execute Commands</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47941/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>WordPress Plugin Survey &amp; Poll SQLi Puts Data at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>WordPress Plugin Download From Files: Critical Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, arbitrary-file-access, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47939/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>Evolution CMS RCE (CVE-2021-47939) Allows Authenticated Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47938/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>ImpressCMS 1.4.2 RCE: Authenticated Attackers Can Execute Arbitrary Code</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47937/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>e107 CMS RCE (CVE-2021-47937) Allows Authenticated Theme Uploads to Drop Web Shells</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47936/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>OpenCATS 0.9.4 Critical RCE via Malicious Resume Uploads</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47935/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>Sentry 8.2.0 RCE: Authenticated Superusers Can Execute Arbitrary Code</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47933/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>WordPress MStore API Critical RCE: Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47932/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>WordPress TheCartPress Unauthenticated Admin Creation (CVE-2021-47932)</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>CVE-2021-47930: Unauthenticated SQLi in Balbooa Joomla Forms Builder</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47928/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:28+03:00</news:publication_date>
      <news:title>Opencart TMD Vendor System Blind SQLi Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47923/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:28+03:00</news:publication_date>
      <news:title>OpenCart 3.0.3.8 Session Fixation Vulnerability (CVE-2021-47923) Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8904/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T15:39:32+03:00</news:publication_date>
      <news:title>IDF Certificate Generator Exposes Rank and Unit Creation</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url></urlset>
