<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7857/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:16:41+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Router Vulnerable to Remote Buffer Overflow (CVE-2026-7857)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7856/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:16:41+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Buffer Overflow (CVE-2026-7856) Exposes Web Management</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44331/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:16:39+03:00</news:publication_date>
      <news:title>ProFTPD SQL Injection (CVE-2026-44331) Exposes Servers to Remote Attacks</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-05</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-22, cwe-770, cwe-306, cwe-284, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8881/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:45:14+03:00</news:publication_date>
      <news:title>MedusaLocker Leaks Magnolia Data After Ransom Refusal</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7855/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:23+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Buffer Overflow - CVE-2026-7855 Public Exploit Available</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7854/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:23+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Critical Buffer Overflow (CVE-2026-7854)</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42997/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:22+03:00</news:publication_date>
      <news:title>OpenStack Ironic Vulnerability CVE-2026-42997 Exposes Keystone Tokens</news:title><news:keywords>vulnerability, cve, high-severity, cwe-669</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:21+03:00</news:publication_date>
      <news:title>OpenCTI Critical Auth Bypass: Unauthenticated API Access Threatens CTI Platforms</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7853/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:16:04+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Critical Buffer Overflow (CVE-2026-7853) Publicly Exploitable</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7851/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:16:03+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Router Vulnerability: Remote Stack Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ftc-bans-data-broker-kochava-from-selling-sensitive-location-wpt74/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:02:00+03:00</news:publication_date>
      <news:title>FTC Bans Kochava from Selling Sensitive Location Data</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4567/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:01:26+03:00</news:publication_date>
      <news:title>Grok Bypassed for $200k Crypto Theft via Morse Code in Username</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/conti-akira-ransomware-affiliate-given-8-year-sentence-x44pk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:33:00+03:00</news:publication_date>
      <news:title>Conti, Akira Ransomware Affiliate Sentenced to 8 Years</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:17:04+03:00</news:publication_date>
      <news:title>CVE-2026-43002 — OpenStack Horizon 25.6 And Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-696</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-wh5bp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:19:00+03:00</news:publication_date>
      <news:title>Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS, Potential RCE</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7844/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-7844 — Chatchat-Space Langchain-Chatchat Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:18+03:00</news:publication_date>
      <news:title>Eclipse BaSyx Server SDK Vulnerability Bypasses Network Segmentation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:18+03:00</news:publication_date>
      <news:title>Eclipse BaSyx RCE: Critical Path Traversal in Server SDK</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6907/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-6907 — An issue was discovered in 6.0 before 6.0.5 and 5.2 before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-524</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5766/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-5766 — An issue was discovered in 6.0 before 6.0.5 and 5.2 before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34956 — Open VSwitch Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34002 — The X.Org X Server Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-805</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34000/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34000 — The X.Org X Server Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daemon-tools-supply-chain-attack-compromises-official-instal-5vbfg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:07:00+03:00</news:publication_date>
      <news:title>DAEMON Tools Supply Chain Attack Compromises Official Installers</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5016/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T18:36:09+03:00</news:publication_date>
      <news:title>Icarus: New Threat Actor Emerges</news:title><news:keywords>darkweb, threat-intel, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-warns-of-sophisticated-phishing-campaign-targeting-2e78d/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:45:04+03:00</news:publication_date>
      <news:title>Microsoft Warns of Sophisticated AitM Phishing Campaign Targeting US Organizations</news:title><news:keywords>threat-intel, vulnerability, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-linked-uat-8302-targets-governments-using-shared-apt-m-xanvu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:19:00+03:00</news:publication_date>
      <news:title>China-Linked UAT-8302 APT Targets Governments in South America and Europe</news:title><news:keywords>threat-intel, vulnerability, malware, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-7834: Critical Stack-Based Buffer Overflow in EFM ipTIME NAS1dual</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7778/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-7778 — An issue that could allow a dashboard configuration to be</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:16:09+03:00</news:publication_date>
      <news:title>WeePie Cookie Allow Plugin SQLi Risks Unauthenticated Database Access</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-don-t-ch-onz4o/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:00:10+03:00</news:publication_date>
      <news:title>EOL Software Creates CVE Blind Spots in SCA Tools</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7833/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:31+03:00</news:publication_date>
      <news:title>EFM ipTIME C200 Vulnerability: Remote Command Injection Exposed</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7832/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:31+03:00</news:publication_date>
      <news:title>IObit Advanced SystemCare 19: High-Severity Symlink Following Vulnerability (CVE-2026-7832)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59, cwe-61</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-30246 — Fiber is a web framework for Go. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28510/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-28510 — eLabFTW is an open source electronic lab notebook. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-302</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27694/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-27694 — Traccar is an open source GPS tracking system. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27693/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-27693 — Traccar is an open source GPS tracking system. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-91</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27644/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27644 — Traccar is an open source GPS tracking system. In versions</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1236</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8879/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:15:01+03:00</news:publication_date>
      <news:title>Google Chrome Bugs Found by AI Earn $57,000 Bug Bounty</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8878/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:08:56+03:00</news:publication_date>
      <news:title>Taiwan High Speed Rail Emergency Stop Caused by SDR Attack</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vimeo-data-breach-exposes-personal-information-of-119-000-pe-1dxfn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:03:46+03:00</news:publication_date>
      <news:title>Vimeo Data Breach Exposes Personal Information of 119,000</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/australia-launches-cyber-review-board-modeled-on-version-dis-lvyr7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:45:00+03:00</news:publication_date>
      <news:title>Australia Establishes Cyber Incident Review Board</news:title><news:keywords>threat-intel, data-breach, government, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6261/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:21+03:00</news:publication_date>
      <news:title>Betheme WordPress Arbitrary File Upload RCE (CVE-2026-6261)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43571/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-43571: OpenClaw Plugin Trust Bypass Opens Attack Vectors</news:title><news:keywords>vulnerability, cve, high-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43569/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:20+03:00</news:publication_date>
      <news:title>OpenClaw Authentication Bypass (CVE-2026-43569) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43566/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-43566: OpenClaw Privilege Escalation via Untrusted Webhook Events</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43534/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:19+03:00</news:publication_date>
      <news:title>OpenClaw Input Validation Flaw (CVE-2026-43534) Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-345</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43533/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-43533: OpenClaw QQBot Arbitrary File Read Vulnerability Uncovered</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43530/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:19+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability CVE-2026-43530 Undermines Exec Approval</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43526/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-43526: OpenClaw QQBot SSRF Flaw Exposes Content Fetching</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42439/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:18+03:00</news:publication_date>
      <news:title>OpenClaw Server-Side Request Forgery Policy Bypass (CVE-2026-42439)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42435/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:17+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42435: Shell Wrapper Vulnerability Allows Environment Variable Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42434/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:17+03:00</news:publication_date>
      <news:title>OpenClaw Sandbox Escape (CVE-2026-42434) Allows Remote Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54348/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:17+03:00</news:publication_date>
      <news:title>ERPGo SaaS 3.9 CSV Injection Allows RCE via Vendor Fields</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1236</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:16+03:00</news:publication_date>
      <news:title>Frappe Framework ERPNext Sandbox Escape Allows RCE via CVE-2023-54345</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54344/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:16+03:00</news:publication_date>
      <news:title>Eclipse Equinox OSGi RCE: Critical Vulnerability Exposes Consoles to Unauthenticated Attackers</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54342/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:15+03:00</news:publication_date>
      <news:title>Eclipse Equinox OSGi RCE: Critical Vulnerability Allows Unauthenticated Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-remote-code-execution-vulnerability-patched-in-andr-lhq61/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:58:44+03:00</news:publication_date>
      <news:title>Android Critical RCE Vulnerability Patched in System Component</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-back-door-attackers-know-about-and-most-security-teams-7alcq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:58:00+03:00</news:publication_date>
      <news:title>OAuth Tokens: The Persistent Backdoor Most Teams Miss</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/metinfo-cms-cve-2026-29014-exploited-for-remote-code-executi-tppez/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:56:00+03:00</news:publication_date>
      <news:title>MetInfo CMS CVE-2026-29014 Exploited for RCE Attacks</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6322/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-6322: fast-uri Vulnerability Enables URI Authority Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-42611/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:16:31+03:00</news:publication_date>
      <news:title>CVE-2025-42611 — RouterOS provides various services that rely on correct</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4566/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T13:57:31+03:00</news:publication_date>
      <news:title>Trellix Source Code Access Confirmed by Security Vendor</news:title><news:keywords>vulnerability, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/we-scanned-1-million-exposed-ai-services-here-s-how-bad-the-duy09/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T13:30:00+03:00</news:publication_date>
      <news:title>Exposed AI Services: 1 Million LLM Deployments Found Insecure</news:title><news:keywords>threat-intel, vulnerability, data-breach, ai-security, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3601/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-3601 — The User Registration &amp; Membership plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3359/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-3359: WordPress Form Maker Plugin SQLi Exposes Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-o-4xv13/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:07:00+03:00</news:publication_date>
      <news:title>ScarCruft Hacks Gaming Platform, Deploys BirdCall Malware on Android &amp; Windows</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/whatsapp-discloses-file-spoofing-arbitrary-url-scheme-vulne-4g2vo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:01:14+03:00</news:publication_date>
      <news:title>WhatsApp Patches File Spoofing and URL Scheme Vulnerabilities</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5192/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T10:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-5192: Forminator WordPress Plugin Path Traversal Exposes Server Files</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40797/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T10:16:00+03:00</news:publication_date>
      <news:title>WebinarIgnition: Critical Blind SQL Injection CVE-2026-40797</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3454/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T10:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-3454 — The GenerateBlocks plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2729/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T10:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-2729 — The Forminator plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-details-phishing-campaign-targeting-35-000-users-a-seyqd/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T09:35:00+03:00</news:publication_date>
      <news:title>Microsoft Details Phishing Campaign Targeting 35,000 Users in 26 Countries</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7823/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7823: Critical Command Injection in Totolink A8000RU Routers</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7822/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7822 — Itsourcecode Courier Management System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7812/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7812: Remote Command Injection in 54yyyu code-mcp MCP Tool</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7811/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7811: High-Severity Path Traversal in 54yyyu code-mcp</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4362/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-4362 — The ElementsKit Elementor Addons plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4564/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:30:32+03:00</news:publication_date>
      <news:title>Oracle Lays Off 30,000 for AI Infrastructure Shift</news:title><news:keywords>cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-7810: Python Notebook Path Traversal Exposes Servers</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5957/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-5957 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5294/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-5294: Critical RCE in Geeky Bot WordPress Plugin</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5159/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-5159 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4803/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:18+03:00</news:publication_date>
      <news:title>Royal Elementor Addons XSS Vulnerability (CVE-2026-4803) Exposes WordPress Sites</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4665/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-4665 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:16+03:00</news:publication_date>
      <news:title>Oracle MCP Server Helper Tool Vulnerability Allows Malicious SQL Execution</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3456/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-3456: WordPress GeekyBot Plugin SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2948/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T07:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-2948 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6704/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-6704 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6702/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6702 — The Publish 2 Ping.fm plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6701/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6701 — The addfreespace plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6700/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6700 — The DX Sources plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6696/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6696 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6255 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5505/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-5505 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5247/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-5247 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5100/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:15:59+03:00</news:publication_date>
      <news:title>AWP Classifieds Plugin SQLi Exposes WordPress Sites</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4730/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-4730 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-4409 — The Subscribe To Comments Reloaded plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2868/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-2868 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1921/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-1921 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13618/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T06:15:58+03:00</news:publication_date>
      <news:title>CVE-2025-13618: WordPress Mentoring Plugin Allows Admin Account Registration</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5722/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T05:16:05+03:00</news:publication_date>
      <news:title>MoreConvert Pro WordPress Plugin Critical Authentication Bypass (CVE-2026-5722)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vimeo-119-167-breached-accounts-dqovf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T05:08:50+03:00</news:publication_date>
      <news:title>Vimeo Breach: ShinyHunters Leaks User Data via Third-Party Vendor Anodot</news:title><news:keywords>data-breach, identity, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44029/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T04:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-44029 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-36</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44028/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T04:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-44028: Nix/Lix Unbounded Recursion Leads to RCE as Root</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7788/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T03:16:18+03:00</news:publication_date>
      <news:title>Axle-Bucamp MCP-Docusaurus Path Traversal (CVE-2026-7788) Public Exploit</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7785/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T03:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7785: Wireshark-MCP OS Command Injection Hits High Severity</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7784/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T03:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7784: NagaAgent Path Traversal Exposes Servers</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7783/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T03:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7783 — CodeCanyon Perfex CRM SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7782/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T02:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7782 — CodeCanyon Perfex CRM Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7781/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T02:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7781 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7791/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:16:20+03:00</news:publication_date>
      <news:title>Amazon WorkSpaces Escalation: Local User to SYSTEM via Log Rotation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7780/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7780 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7776/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7776: Boundary Workers Vulnerable to DoS During TLS Handshakes</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/weaver-e-cology-critical-bug-exploited-in-attacks-since-marc-iah2c/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:12:57+03:00</news:publication_date>
      <news:title>Weaver E-cology Critical Bug Exploited in Attacks Since March</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7779/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-7779 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-42223 — Nginx UI is a web user interface for the Nginx web server.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:32+03:00</news:publication_date>
      <news:title>Nginx UI Vulnerability: Unauthenticated Bootstrap Takeover (CVE-2026-42222)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-42221: Nginx UI Admin Takeover Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42220/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42220 — Nginx UI is a web user interface for the Nginx web server.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8875/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:43:52+03:00</news:publication_date>
      <news:title>Handala Group Claims Fujairah Port Cyberattack Amid Missile Strikes</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7768/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7768: Fastify Accepts-Serializer DoS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6321/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-6321: fast-uri Path Normalization Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-04</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, command-injection, cwe-94, critical, out-of-bounds-1, cwe-125, privilege-escalation</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42154/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:16:04+03:00</news:publication_date>
      <news:title>Prometheus CVE-2026-42154: Unauthenticated Memory Exhaustion Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42151/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:16:04+03:00</news:publication_date>
      <news:title>Prometheus Azure AD OAuth Secret Exposed via Plaintext Config</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-312</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25863/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-25863: WordPress Plugin DoS Vulnerability Hits Contact Form 7</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/exploit-cyber-frenzy-threatens-millions-via-critical-cpanel-9twsz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:14:14+03:00</news:publication_date>
      <news:title>cPanel Authentication Bypass Vulnerability Exploited in the Wild</news:title><news:keywords>threat-intel, tools, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisco-moves-to-acquire-astrix-security-to-tackle-non-human-i-lo620/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:00:26+03:00</news:publication_date>
      <news:title>Cisco Acquires Astrix Security to Secure Non-Human Identities</news:title><news:keywords>threat-intel, vulnerability, identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43616/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:32+03:00</news:publication_date>
      <news:title>Detect-It-Easy Path Traversal Allows Arbitrary File Writes, Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42796/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:32+03:00</news:publication_date>
      <news:title>Arelle RCE: Unauthenticated Remote Code Execution in REST Endpoint</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42146/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42146 — CImg Library is a C++ library for image processing. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42144/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42144 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42092/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42092 — titra is an open source time tracking project. In version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42091/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42091 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42088/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>OpenC3 COSMOS Critical Script Runner Bypass (CVE-2026-42088)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42087/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:30+03:00</news:publication_date>
      <news:title>OpenC3 COSMOS TSDB SQL Injection Flaw Exposes Critical Systems</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42086/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42086 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42084/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42084: OpenC3 COSMOS Allows Password Change Without Old Password</news:title><news:keywords>vulnerability, cve, high-severity, cwe-620</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41572/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41572 — Note Mark is an open-source note-taking application. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41571/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41571: Note Mark Critical Auth Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41471/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41471: PayPal Events WordPress Plugin Exposes All Customer Orders</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-32834: WordPress Easy PayPal Plugin Authentication Bypass</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29004/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:26+03:00</news:publication_date>
      <news:title>BusyBox udhcpc6 Heap Overflow (CVE-2026-29004) Exposes Embedded Systems</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenc-gxd4y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:06:00+03:00</news:publication_date>
      <news:title>Phishing Campaign Leverages SimpleHelp, ScreenConnect RMM to Hit 80+ Orgs</news:title><news:keywords>threat-intel, vulnerability, phishing, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/educational-company-infrastructure-reports-cyber-incident-6eypo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:19:00+03:00</news:publication_date>
      <news:title>Infrastructure Education Company Reports Cyber Incident, User Data Exposed</news:title><news:keywords>threat-intel, data-breach, government, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42812/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>Apache Iceberg CVE-2026-42812 Bypasses Metadata Location Validation</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-284, cwe-732, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42811/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42811: Apache Polaris Credential Bypass Exposes Cloud Storage</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-917</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42810: Apache Polaris S3 Wildcard Vulnerability Creates Critical Data Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-116</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42809/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42809: Apache Polaris Critical Credential Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42376: D-Link DIR-456U EOL Router Exposes Critical Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42375/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:25+03:00</news:publication_date>
      <news:title>D-Link DIR-600L EOL Router Exposes Critical Telnet Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42374/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:25+03:00</news:publication_date>
      <news:title>D-Link DIR-600L EOL Router Has Hardcoded Telnet Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42373/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:25+03:00</news:publication_date>
      <news:title>D-Link DIR-605L EOL Router Hit by Critical Telnet Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42076/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-42076: Evolver Engine RCE Puts AI Agents at Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:22+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape Vulnerability (CVE-2026-26956) Allows Critical Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26332/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:22+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape (CVE-2026-26332) Exposes Node.js Apps to RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25293/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-25293: Critical PLC Buffer Overflow Puts Industrial Control Systems at Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24781/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:21+03:00</news:publication_date>
      <news:title>VM2 Sandbox Escape Vulnerability (CVE-2026-24781) Exposes Node.js Applications</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24120/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-24120: vm2 Sandbox Escape Allows Host Command Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:21+03:00</news:publication_date>
      <news:title>VM2 Sandbox Breakout Vulnerability: Critical Flaw Exposes Node.js Applications</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/forbes-preliminarily-agrees-to-pay-10-million-to-settle-cal-hnn8u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T19:49:00+03:00</news:publication_date>
      <news:title>Forbes Agrees to $10 Million Settlement in Wiretapping Lawsuit</news:title><news:keywords>threat-intel, data-breach, government, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ransomware-group-claims-breach-of-pro-orb-n-hungarian-media-b2s6y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T18:23:00+03:00</news:publication_date>
      <news:title>Ransomware Group Claims Breach of Hungarian Media Firm Mediaworks</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8874/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T18:18:34+03:00</news:publication_date>
      <news:title>Cisco Acquires Israeli Startup Astrix for $400M to Combat Non-Human Identities</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/weekly-recap-ai-powered-phishing-android-spying-tool-li-y3gu1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:23:00+03:00</news:publication_date>
      <news:title>AI Phishing, Android Spyware, Linux Exploit, GitHub RCE Headline Weekly Threats</news:title><news:keywords>threat-intel, vulnerability, data-breach, phishing, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6266/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-6266: AAP Gateway Email Auto-Link Flaw Allows Account Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34032/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-34032 — Apache HTTP Server: Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125, cwe-170</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33857/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-33857 — Apache HTTP Server: Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-31205 — Pluck CMS Before V.4.7.21dev Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-58074/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:28+03:00</news:publication_date>
      <news:title>Norton Secure VPN Privilege Escalation via Microsoft Store (CVE-2025-58074)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-1386</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7482/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T16:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7482: Critical Ollama Heap Out-of-Bounds Read Exposes Sensitive AI Data</news:title><news:keywords>vulnerability, cve, critical, high-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/progress-warns-of-critical-moveit-automation-auth-bypass-fla-unrgi/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T15:18:57+03:00</news:publication_date>
      <news:title>MOVEit Automation Critical Auth Bypass Flaw Requires Immediate Patch</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3120/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T15:16:29+03:00</news:publication_date>
      <news:title>SambaBox CVE-2026-3120: High-Severity OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/2026-the-year-of-ai-assisted-attacks-izhod/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T14:58:00+03:00</news:publication_date>
      <news:title>Kaikatsu Club Breach: 17-Year-Old Exposes 7 Million Users for Pokémon Cards</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-i-vmto2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T14:57:00+03:00</news:publication_date>
      <news:title>Silver Fox Deploys ABCDoor Malware via Tax Phishing in India and Russia</news:title><news:keywords>threat-intel, vulnerability, malware, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-says-copy-fail-flaw-now-exploited-to-root-linux-syste-6jlid/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T14:28:15+03:00</news:publication_date>
      <news:title>CISA Warns: &apos;Copy Fail&apos; Linux Root Vulnerability Actively Exploited</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7750/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:16:01+03:00</news:publication_date>
      <news:title>Totolink N300RH RCE: CVE-2026-7750 Buffer Overflow Affects Remote Management</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7749/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:16:01+03:00</news:publication_date>
      <news:title>Totolink N300RH Router Hit by High-Severity Buffer Overflow Vulnerability (CVE-2026-7749)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7748/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:16:00+03:00</news:publication_date>
      <news:title>Totolink N300RH Buffer Overflow (CVE-2026-7748) Remotely Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33846/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:15:59+03:00</news:publication_date>
      <news:title>GnuTLS DTLS Heap Overflow (CVE-2026-33846) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-vulnerability-weaponized-to-target-governmen-71rj3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:27:00+03:00</news:publication_date>
      <news:title>cPanel Vulnerability Weaponized Against Gov, Military, and MSPs</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8870/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:20:16+03:00</news:publication_date>
      <news:title>cPanel Exploited: Over 40,000 Systems Compromised Globally</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7747/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:16:01+03:00</news:publication_date>
      <news:title>Totolink N300RH Critical Buffer Overflow: Public Exploit Available</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7746/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7746 — SourceCodester Web-Based Pharmacy Product Management System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7745/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7745 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14320/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:15:59+03:00</news:publication_date>
      <news:title>CVE-2025-14320: Critical XSS in Tegsoft Online Support Application</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8868/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:38:19+03:00</news:publication_date>
      <news:title>Cyber News - Erez Dasa Debunks Stormous Claims and Crocs Israel Breach</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8867/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:33:57+03:00</news:publication_date>
      <news:title>Barshai Company Email Compromise Spreads Malicious Emails</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7744/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7744 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7743/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7743 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7742/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7742 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7741 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7738/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7738 — Puchunjie Doc-Tools-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7737/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7737 — Osrg GoBGP Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-119, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7736/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7736: GoBGP Integer Underflow Threatens BGP Routing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-189, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/edtech-firm-instructure-discloses-data-breach-amid-hacker-le-hu96u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:02:51+03:00</news:publication_date>
      <news:title>Instructure Data Breach: Student Data Stolen, Services Disrupted</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/a-week-in-security-april-27-8211-may-3-rww0r/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:01:00+03:00</news:publication_date>
      <news:title>cPanel Bug Exposes Millions of Websites to Takeover</news:title><news:keywords>malware, threat-intel, ransomware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7735/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:02+03:00</news:publication_date>
      <news:title>osrg GoBGP Buffer Overflow (CVE-2026-7735) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7734/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7734 — Osrg GoBGP Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7733/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7733: funadmin Unrestricted File Upload Exposes Systems</news:title><news:keywords>vulnerability, cve, high-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7732/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7732 — Code-Projects BloodBank Managing System Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7731/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7731 — Code-Projects BloodBank Managing System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/global-crackdown-arrests-276-shuts-9-crypto-scam-centers-s-ks2j6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:59:00+03:00</news:publication_date>
      <news:title>Global Law Enforcement Cracks Down on Crypto Scam Centers, Arrests 276</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7730/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7730 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7729/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7729 — Pixelsock Directus-Mcp Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7728 — Ryanjoachim Mcp-Rtfm Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7727/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7727: Shandong Hoteam Software PDM SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7725/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7725 — PrefectHQ Prefect Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/reborn-gaming-126-breached-accounts-qxmv4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:43:06+03:00</news:publication_date>
      <news:title>Reborn Gaming Breach: cPanel/WHM Vulnerability Exposes User Data</news:title><news:keywords>data-breach, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7724/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7724 — PrefectHQ Prefect Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-362, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7723/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7723: PrefectHQ Prefect WebSocket Lacks Authentication</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7722/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-7722 — PrefectHQ Prefect Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7721/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-7721 — Totolink WA300 5.2cu.7112_B20190227 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7720/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7720 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7719/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:15:58+03:00</news:publication_date>
      <news:title>Totolink WA300 Critical Buffer Overflow (CVE-2026-7719) Exploited</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7718/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7718 — Totolink WA300 5.2cu.7112_B20190227 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7713/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-7713 — Crocodilestick Calibre-Web-Automated Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7712/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-7712 — MindsDB Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7711/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>MindsDB Unrestricted File Upload (CVE-2026-7711) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7710/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-7710: YunaiV yudao-cloud Improper Authentication Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6948/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6948 — Velociraptor versions prior to 0.76.4 contain a resource</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7709/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7709 — Janeczku Calibre-Web Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7708/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7708 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7707/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7707 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7706/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7706 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7705/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7705 — JD Cloud JDCOS 4.5.1.R4518 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/marcus-millichap-1-837-078-breached-accounts-cqfcx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T01:53:12+03:00</news:publication_date>
      <news:title>Marcus &amp; Millichap Breach: ShinyHunters Leaks 1.8M Records</news:title><news:keywords>data-breach, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/instructure-confirms-data-breach-shinyhunters-claims-attack-hwvmu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T01:16:27+03:00</news:publication_date>
      <news:title>Instructure Confirms Data Breach as ShinyHunters Claims Attack</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url></urlset>
