<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8098/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8098: SQL Injection in code-projects Feedback System 1.0</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8097/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8097 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42449/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42449: n8n-MCP SSRF Bypasses IPv6 Checks</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42047/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42047: Inngest Exposes Environment Variables via HTTP Handler</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41692 — i18nextify is a JavaScript library that adds website</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41691/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41691 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8087/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-8087 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43510/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-43510: CISA&apos;s manage.get.gov Domain Manager Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-266</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-42241 — Applications Using ParquetSharp To Read Untrusted Parquet Fi Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:44+03:00</news:publication_date>
      <news:title>Budibase Low-Code Platform Vulnerability Allows Full Account Takeover via XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-1004</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-07</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-346, cross-site-scripting-xss, cwe-79, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8086/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-8086 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8083/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-8083: SQL Injection in SourceCodester Pharmacy System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44742/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-44742: Postorius HTML Injection Exploited In The Wild</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:02+03:00</news:publication_date>
      <news:title>GitPython CVE-2026-44244 Allows Remote Code Execution via HooksPath Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42284/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-42284: GitPython Vulnerability Allows Remote Code Execution Via Malicious Clones</news:title><news:keywords>vulnerability, cve, high-severity, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-42215: GitPython Arbitrary Command Execution Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>NotepadNext CVE-2026-42214: Arbitrary Command Execution via Malicious Extensions</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41906/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>FreeScout CVE-2026-41906: Agent Can Expose Hidden Customer Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41905/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>FreeScout CVE-2026-41905: Server-Side Request Forgery via Redirect Logic</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41904/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-41904: FreeScout XSS Delivers Payloads via Auto-Reply</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41903/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-41903 — FreeScout is a free help desk and shared inbox built with</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41902/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-41902: FreeScout Invite Hash Vulnerability Allows Permanent Account Takeover</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8081/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T21:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8081 — Router-For-Me CLIProxyAPI Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37709/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T21:16:19+03:00</news:publication_date>
      <news:title>Snipe-IT CVE-2026-37709: Critical RCE via Insecure Permissions</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4572/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T21:03:42+03:00</news:publication_date>
      <news:title>Anonymous Claims Control Over Three Chinese Satellites</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pcpjack-credential-stealer-exploits-5-cves-to-spread-worm-li-mu956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:45:00+03:00</news:publication_date>
      <news:title>PCPJack Credential Stealer Exploits 5 CVEs for Cloud Worm-Like Spread</news:title><news:keywords>threat-intel, vulnerability, malware, data-breach, cloud, identity, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7415: Yarbo Robot Firmware Exposes Sensitive Data via Anonymous MQTT</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7414/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:15:59+03:00</news:publication_date>
      <news:title>Yarbo Firmware v2.3.9 Critical Hardcoded Credential Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7413/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7413: Hidden Backdoor Found in Yarbo Firmware</news:title><news:keywords>vulnerability, cve, high-severity, cwe-912</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/has-cisa-finally-found-its-new-leader-in-tom-parker-5seag/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T19:55:12+03:00</news:publication_date>
      <news:title>Tom Parker Tipped for CISA Leadership Role</news:title><news:keywords>threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/palo-alto-zero-day-exploited-in-campaign-bearing-hallmarks-o-23gll/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:31:12+03:00</news:publication_date>
      <news:title>Palo Alto Networks Zero-Day Exploited by Suspected Chinese State Actor</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks-rm9dt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:20:51+03:00</news:publication_date>
      <news:title>Ivanti EPMM RCE Vulnerability Exploited in Zero-Day Attacks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44264/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-44264 — Weblate is a web based localization tool. Prior to version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-80</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44263/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-44263 — Weblate is a web based localization tool. Prior to version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-203</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42011/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>gnutls CVE-2026-42011: Certificate Validation Bypass Poses MITM Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41689/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41689 — Wallos is an open-source, self-hostable personal</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41688/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41688: Wallos SSRF Bypass via DNS Rebinding</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41687/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41687 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41650/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-41650 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-91</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41519/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-41519 — Weblate is a web based localization tool. Prior to version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41505/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-41505: RELATE Courseware Package Suffers Predictable Token Generation Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-330, cwe-338</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:06+03:00</news:publication_date>
      <news:title>Daptin Headless CMS SQLi Puts Data at High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-carolina-man-pleads-guilty-to-doxxing-supreme-court-ju-ur6p9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:00:00+03:00</news:publication_date>
      <news:title>North Carolina Man Pleads Guilty to Doxxing Supreme Court Justices</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5020/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:37:59+03:00</news:publication_date>
      <news:title>Ransomware Groups Aggressively Target Healthcare Sector Globally</news:title><news:keywords>darkweb, threat-intel, ransomware, malware, darkfeed</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/claude-code-oauth-tokens-can-be-stolen-through-stealthy-mcp-1mzs9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:33:06+03:00</news:publication_date>
      <news:title>Claude Code OAuth Tokens Vulnerable to Stealthy MCP Hijacking</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6795/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:04+03:00</news:publication_date>
      <news:title>DivvyDrive Open Redirect Vulnerability CVE-2026-6795 Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41685/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-41685 — Incus is a system container and virtual machine manager.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41684/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-41684 — Incus is a system container and virtual machine manager.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41647/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-41647 — Incus is a system container and virtual machine manager.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41589/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-41589: Critical Path Traversal in Wish SSH Server SCP Middleware</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41554/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:02+03:00</news:publication_date>
      <news:title>Bricks Builder Flaw: CVE-2026-41554 Exposes Websites to Reflected XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41490/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:02+03:00</news:publication_date>
      <news:title>Dagster Orchestration Platform Vulnerable to SQL Injection via Dynamic Partitions</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14341/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:00+03:00</news:publication_date>
      <news:title>CVE-2025-14341: DivvyDrive Vulnerability Allows Excessive Allocation, Flooding</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/one-click-total-shutdown-the-patient-zero-webinar-on-kil-imnwl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:50:00+03:00</news:publication_date>
      <news:title>AI-Powered Phishing: The &apos;Patient Zero&apos; Threat to Enterprise Security</news:title><news:keywords>threat-intel, vulnerability, data-breach, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/attackers-could-exploit-ai-vision-models-using-imperceptible-h4msp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:45:53+03:00</news:publication_date>
      <news:title>Cisco Researchers Expose Pixel-Level Attacks on AI Vision Models</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:16:13+03:00</news:publication_date>
      <news:title>DivvyDrive XSS Vulnerability (CVE-2026-6002) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-80</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5791/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:16:13+03:00</news:publication_date>
      <news:title>DivvyDrive Critical CSRF Vulnerability: CVE-2026-5791 Poses Remote Attack Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5784/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:16:13+03:00</news:publication_date>
      <news:title>DivvyDrive Stored XSS Vulnerability (CVE-2026-5784) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-coding-agents-could-fuel-next-supply-chain-crisis-fmgkw/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:00:00+03:00</news:publication_date>
      <news:title>AI Coding Agents Fuel Next Supply Chain Crisis with &apos;TrustFall&apos; Attacks</news:title><news:keywords>threat-intel, vulnerability, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/polish-intelligence-warns-hackers-attacked-water-treatment-c-ctbni/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:38:00+03:00</news:publication_date>
      <news:title>Polish Intelligence Warns of Attacks on Water Treatment Systems</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6508/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-6508: Liderahenk Origin Validation Error Allows Critical Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42285/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-42285: Critical GoBGP Flaw Allows Remote Crash via Malformed UPDATE</news:title><news:keywords>vulnerability, cve, high-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42010/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-42010: GnuTLS RSA-PSK NUL Byte Authentication Bypass</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41643/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-41643: GoBGP Remote DoS Vulnerability Exposes Network Infrastructure</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-129</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41642/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:17+03:00</news:publication_date>
      <news:title>GoBGP DoS Vulnerability (CVE-2026-41642) Patched in Version 4.4.0</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3953/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-3953: Gosoft Proticaret E-Commerce XSS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-edge-plaintext-passwords-ics-0-days-p-7p25i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:33:00+03:00</news:publication_date>
      <news:title>Old-School Attacks Still Win: Credential Dumps and Weak Defenses Plague 2026</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-27415 — PluginUs.Net BEAR Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8889/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:09:25+03:00</news:publication_date>
      <news:title>MedusaLocker Ransomware Group Details Financial Motivation, Operational Shifts</news:title><news:keywords>israel, telegram</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/day-zero-readiness-the-operational-gaps-that-break-incident-h2q7a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T13:54:00+03:00</news:publication_date>
      <news:title>Incident Response Retainers Aren&apos;t Readiness: The Operational Gap</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/gemini-cli-vulnerability-could-have-led-to-code-execution-s-ite2y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T13:39:34+03:00</news:publication_date>
      <news:title>Gemini CLI Vulnerability: Prompt Injection Leads to Code Execution</news:title><news:keywords>threat-intel, vulnerability, ai-security, tools, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pypi-packages-deliver-zichatbot-malware-via-zulip-apis-on-wi-g5ity/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:20:00+03:00</news:publication_date>
      <news:title>PyPI Packages Deliver ZiChatBot Malware to Windows and Linux</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-44407 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-134</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27421/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27421 — WProyal Royal Elementor Addons Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27416/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27416 — BPlugins PDF Poster Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27329/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27329 — YITH YITH WooCommerce Wishlist Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25468/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-25468 — WeDevs Happy Addons For Elementor Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25436/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-25436 — WProyal Royal Elementor Addons Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-68604/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-68604 — WPGraphQL Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-68060/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-68060: High-Severity SQL Injection in WPMart Team Member Plugin</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-66105/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-66105 — Magepeople Inc. Bus Ticket Booking With Seat Reservation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62127/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-62127 — WEN Themes WEN Logo Slider Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-2514/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-2514 — Hitachi Virtual Storage Platform G130, G150, G350, G370, G70 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-1978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-1978: Hitachi Storage RCE Vulnerability Exposes Enterprise Data</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-43384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:24+03:00</news:publication_date>
      <news:title>CVE-2024-43384: Root Password Exposure via Improper Information Removal</news:title><news:keywords>vulnerability, cve, high-severity, cwe-212</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44406/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T11:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-44406 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-9661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T11:16:00+03:00</news:publication_date>
      <news:title>Hitachi VSP One Block OS Command Injection (CVE-2025-9661) CVSS 8.1</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/woflow-447-593-breached-accounts-rhbn4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:48:33+03:00</news:publication_date>
      <news:title>Woflow Data Breach: ShinyHunters Exposes 447K Accounts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8063/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-8063 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7252/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>WP-Optimize Plugin Flaw Allows Arbitrary File Deletion, RCE via wp-config.php</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-6692: WordPress Slider Revolution RCE Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4348/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-4348: Unauthenticated SQLi in BetterDocs Pro WordPress Plugin</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41641/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>NocoBase SQL Injection Bypass (CVE-2026-41641) Exposes Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41413/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-41413 — Istio is an open platform to connect, manage, and secure</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41143/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:04+03:00</news:publication_date>
      <news:title>YesWiki SQL Injection (CVE-2026-41143) Risks Data Exposure</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41139/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:04+03:00</news:publication_date>
      <news:title>Math.js Arbitrary Code Execution via Expression Parser (CVE-2026-41139)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-6214 — The Forminator Forms plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42194/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-42194 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41671/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-41671 — Authentication Bypass</news:title><news:keywords>vulnerability, cve, medium-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41670/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-41670: Admidio SAML IdP Bypass Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41669/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-41669: Admidio SAML Signature Bypass Puts User Management at Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41661 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41660/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:29+03:00</news:publication_date>
      <news:title>Admidio CVE-2026-41660: Logic Error Allows 2FA Bypass for Admin Accounts</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41658/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41658 — Admidio is an open-source user management solution. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41655/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41655 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41640/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41640: NocoBase No-Code Platform SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41201/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41201: Critical CI4MS Account Takeover Via Stored XSS</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41142/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41142: OpenEXR Integer Overflow Leads to Heap OOB Write</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:25+03:00</news:publication_date>
      <news:title>Spring Cloud Config Server Vulnerable to TOCTOU Attacks (CVE-2026-41002)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40982/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:24+03:00</news:publication_date>
      <news:title>Spring Cloud Config Vulnerability CVE-2026-40982 Allows Directory Traversal</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40981/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-40981: Spring Cloud Config Exposes GCP Secrets</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4807/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T06:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-4807 — The Appointment Booking Calendar plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6222 — The Forminator Forms plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40003/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T05:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-40003 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-korean-hackers-targeted-ethnic-koreans-in-china-with-a-941im/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T03:12:00+03:00</news:publication_date>
      <news:title>North Korean APT37 Targets Ethnic Koreans in China with BirdCall Malware</news:title><news:keywords>threat-intel, data-breach, government, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41484/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41484 — OpenTelemetry.Exporter.OneCollector is a .NET exporter that</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41483/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41483 — OpenTelemetry.Resources.Azure is the .NET resource detector</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41417/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41417 — Netty allows request-line validation to be bypassed when a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-93, cwe-444</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41310/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41310 — OpenTelemetry.Exporter.Zipkin is the .NET Zipkin exporter</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40296/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-40296 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40281/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:16:01+03:00</news:publication_date>
      <news:title>Gotenberg PDF API Vulnerability CVE-2026-40281 Allows Arbitrary File Overwrite</news:title><news:keywords>vulnerability, cve, critical, high-severity, arbitrary-file-access, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mirai-based-xlabs-v1-botnet-exploits-adb-to-hijack-iot-devic-xqkjl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:21:00+03:00</news:publication_date>
      <news:title>Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices</news:title><news:keywords>threat-intel, vulnerability, malware, data-breach, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8032/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:36+03:00</news:publication_date>
      <news:title>PicoTronica e-Clinic Healthcare System Hard-Coded Credential Vulnerability (CVE-2026-8032)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-259, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-44118: Loopback Owner Context Spoofing Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44116/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>OpenClaw Zalo Plugin SSRF Vulnerability (CVE-2026-44116) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44115/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-44115: OpenClaw Vulnerability Allows Shell Expansion Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44114/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability: Environment Namespace Override Poses Supply Chain Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44110/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>OpenClaw Authorization Bypass (CVE-2026-44110) Exposes Room Control</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44109/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>OpenClaw Authentication Bypass: Critical Vulnerability in Feishu Webhook</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43585/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability Allows Revoked Bearer Tokens to Remain Valid</news:title><news:keywords>vulnerability, cve, high-severity, cwe-672</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43584/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-43584: OpenClaw Environment Variable Vulnerability Allows Execution Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43581/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43581: Critical OpenClaw Sandbox Vulnerability Exposes DevTools</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43580/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43580: OpenClaw Vulnerability Bypasses SSRF Protections</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43578/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43578: OpenClaw Privilege Escalation Hits Critical Severity</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43577/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43577 — OpenClaw before 2026.4.9 contains a file read vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43576/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>OpenClaw SSRF Vulnerability (CVE-2026-43576) Allows Untrusted Pivoting</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-601, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43575: OpenClaw Critical Auth Bypass Exposes Browser Sessions</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-06</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, denial-of-service, remote-code-execution, cwe-94, cross-site-scripting-xss, cwe-79, sql-injection</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8031/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-8031 — PicoTronica E-Clinic Healthcare System ECHS Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41938/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41938: Vvveb Unrestricted File Upload Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41936/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41936: Vvveb XXE Allows File Disclosure, Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-611</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41934/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>Vvveb RCE: Authenticated Users Can Achieve Unauthenticated Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41931/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41931 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-209, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41930: Vvveb Docker Hard-Coded Credentials Lead to Critical Database Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:35+03:00</news:publication_date>
      <news:title>CVE-2025-31960 — HCL BigFix Service Management (SM) is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-209</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-30151/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:35+03:00</news:publication_date>
      <news:title>HCL BigFix Service Management Privilege Escalation (CVE-2024-30151)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-host-w0arn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:38:38+03:00</news:publication_date>
      <news:title>vm2 Sandbox Bug: Critical RCE Allows Host System Takeover</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices-bcyha/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:06:21+03:00</news:publication_date>
      <news:title>Cisco DoS Flaw Hits Network Controllers, Requires Manual Reboot</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7875/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:24+03:00</news:publication_date>
      <news:title>NanoClaw Container Vulnerability Allows Arbitrary File Access, Recursive Deletion</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-42503: gopls Vulnerability Exposes Dev Environments to RCE</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1327</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23870/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-23870: High-Severity DoS Flaw in React Server Components</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20219/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20219 — The REST API Of Cisco Slido Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20195/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20195 — An Identity Management API Endpoint Of Cisco ISE Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-204</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20193 — The RADIUS Policy API Endpoints Of Cisco ISE Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20189/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20189 — The Log File Download Functionality Of Cisco Prime Infrastru Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20188/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>Cisco Crosswork, NSO DoS Vulnerability (CVE-2026-20188)</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20185: Cisco SG350/SG350X SNMP DoS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20172/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20172 — The Lite Agent Feature Of Cisco Enterprise Chat And Email (E Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-646</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20169/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20169 — The Web-Based Management Interface Of Cisco IoT Field Networ Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20168/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20168 — The Web-Based Management Interface Of Cisco IoT Field Networ Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-388</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>Cisco IoT FND DoS Vulnerability (CVE-2026-20167) Allows Remote Router Reloads</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20035/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>Cisco Unity Connection Web Inbox SSRF Vulnerability (CVE-2026-20035)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20034/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>Cisco Unity Connection: Authenticated RCE Via Web Management Interface</news:title><news:keywords>vulnerability, cve, high-severity, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daemon-tools-devs-confirm-breach-release-malware-free-versi-mz2xg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T19:43:30+03:00</news:publication_date>
      <news:title>DAEMON Tools Supply Chain Attack Confirmed, Malware-Free Version Released</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6863/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T19:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-6863 — Velociraptor versions prior to 0.76.4 contain a cross</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6691/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-6691: MongoDB C Driver Heap Overflow via GSSAPI Username</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8027/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-8027 — A weakness has been identified in FlowiseAI Flowise up to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-52613/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:08+03:00</news:publication_date>
      <news:title>CVE-2025-52613 — HCL BigFix Service Management (SM) is affected by use of a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:06+03:00</news:publication_date>
      <news:title>CVE-2025-31978 — HCL BigFix Service Management (SM) does not adequately</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31976/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:06+03:00</news:publication_date>
      <news:title>CVE-2025-31976 — HCL BigFix Service Management (SM) is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/why-ransomware-attacks-succeed-even-when-backups-exist-s6wwb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T17:04:14+03:00</news:publication_date>
      <news:title>Ransomware Attacks Succeed by Destroying Backups First, Not Just Encrypting</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attack-btsl8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T16:02:52+03:00</news:publication_date>
      <news:title>MuddyWater Uses Chaos Ransomware as Decoy for Microsoft Teams Attacks</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:16:26+03:00</news:publication_date>
      <news:title>HCL BigFix RunBookAI Vulnerability Allows Command Smuggling</news:title><news:keywords>vulnerability, cve, high-severity, cwe-77, cwe-351, cwe-451</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-hacker-news-launches-cybersecurity-stars-awards-2026-a8nz8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:03:00+03:00</news:publication_date>
      <news:title>The Hacker News Launches &apos;Cybersecurity Stars Awards 2026&apos;</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6420/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-6420 — Keylime Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1241</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31970/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:16:03+03:00</news:publication_date>
      <news:title>CVE-2025-31970 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-358</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/your-ai-agents-are-already-inside-the-perimeter-do-you-know-va5k8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:57:00+03:00</news:publication_date>
      <news:title>AI Agents Proliferating Faster Than Enterprise Governance</news:title><news:keywords>threat-intel, vulnerability, identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-40001 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-35255 — The Oracle Cloud Native Environment Command Line Interface P Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1719/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:16:18+03:00</news:publication_date>
      <news:title>WordPress Gravity Bookings Plugin Vulnerable to SQL Injection (CVE-2026-1719)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-critical-infrastructure-must-master-isolation-recover-cncgj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:15:34+03:00</news:publication_date>
      <news:title>CISA Mandates Isolation, Recovery for Critical Infrastructure Against Foreign Cyber Threats</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/legionproxy-10-144-breached-accounts-5jdcb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:11:25+03:00</news:publication_date>
      <news:title>LegionProxy Breach Exposes 10,000 Accounts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-s-android-apps-get-public-verification-to-stop-supply-uxtb6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:13:00+03:00</news:publication_date>
      <news:title>Google Expands Android Binary Transparency to Counter Supply Chain Attacks</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-phone-link-exploited-by-cloudz-rat-to-steal-credenti-oy75b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:34:00+03:00</news:publication_date>
      <news:title>CloudZ RAT and Pheno Plugin Target Windows Phone Link for Credential Theft</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7841/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>GeoVision GV-ASWeb RCE: High-Severity Flaw Affects Notification Settings</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7457/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7457 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7448/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7448: WordPress LatePoint Plugin Open to Unauthenticated Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7332/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7332: WordPress LatePoint Plugin XSS Flaw Exposes Unauthenticated Attackers</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6672/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-6672 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6344/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-6344 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35254/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-35254 — The Oracle OCI CLI Product Of Oracle Open Source Projects. T Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35253/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-35253 — The Oracle Macoron Tool Product Of Oracle Open Source Projec Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8884/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T10:02:50+03:00</news:publication_date>
      <news:title>Cyber News: Basic Security Hygiene Gaps Plague Most Organizations</news:title><news:keywords>israel, cybersafe</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/oracle-debuts-monthly-critical-security-patch-updates-a19et/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:32:17+03:00</news:publication_date>
      <news:title>Oracle to Issue Monthly Critical Security Patch Updates</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2306/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-2306 — The Ninja Tables – Easy Data Table Builder plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4568/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T08:03:19+03:00</news:publication_date>
      <news:title>UK Age Verification Flaws Exploit Social Engineering, Parental Aid</news:title><news:keywords>phishing, the-independent</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firew-awpvq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T07:46:23+03:00</news:publication_date>
      <news:title>Palo Alto Networks Zero-Day Exploited to Hack Firewalls</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5753/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T07:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-5753 — The All-in-One WP Migration Unlimited Extension plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3208/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T07:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-3208 — The Mercado Pago payments for WooCommerce plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7573/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7573 — An authorization bypass (CWE-639) in the GetUserRoles gRPC</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7572/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7572 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-193</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71256/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:05+03:00</news:publication_date>
      <news:title>CVE-2025-71256: nr Modem DoS Vulnerability Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:05+03:00</news:publication_date>
      <news:title>CVE-2025-71255: Modem IMS Vulnerability Exposes Devices to Remote DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71254/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:04+03:00</news:publication_date>
      <news:title>Modem IMS DoS Vulnerability (CVE-2025-71254) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71253/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:04+03:00</news:publication_date>
      <news:title>Modem IMS Vulnerability (CVE-2025-71253) Allows Remote DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71252/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:04+03:00</news:publication_date>
      <news:title>CVE-2025-71252: Modem IMS Vulnerability Exposes Remote DoS Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71251/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:03+03:00</news:publication_date>
      <news:title>CVE-2025-71251: IMS DoS Vulnerability Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url></urlset>
