<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7782/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T02:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7782 — CodeCanyon Perfex CRM Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7781/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T02:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7781 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7791/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:16:20+03:00</news:publication_date>
      <news:title>Amazon WorkSpaces Escalation: Local User to SYSTEM via Log Rotation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7780/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7780 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7776/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7776: Boundary Workers Vulnerable to DoS During TLS Handshakes</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/weaver-e-cology-critical-bug-exploited-in-attacks-since-marc-iah2c/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T01:12:57+03:00</news:publication_date>
      <news:title>Weaver E-cology Critical Bug Exploited in Attacks Since March</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7779/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-7779 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-42223 — Nginx UI is a web user interface for the Nginx web server.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:32+03:00</news:publication_date>
      <news:title>Nginx UI Vulnerability: Unauthenticated Bootstrap Takeover (CVE-2026-42222)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-42221: Nginx UI Admin Takeover Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42220/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42220 — Nginx UI is a web user interface for the Nginx web server.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8875/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:43:52+03:00</news:publication_date>
      <news:title>Handala Group Claims Fujairah Port Cyberattack Amid Missile Strikes</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7768/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7768: Fastify Accepts-Serializer DoS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6321/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-6321: fast-uri Path Normalization Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-04</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, command-injection, cwe-94, critical, out-of-bounds-1, cwe-125, privilege-escalation</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42154/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:16:04+03:00</news:publication_date>
      <news:title>Prometheus CVE-2026-42154: Unauthenticated Memory Exhaustion Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-400, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42151/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:16:04+03:00</news:publication_date>
      <news:title>Prometheus Azure AD OAuth Secret Exposed via Plaintext Config</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-312</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25863/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-25863: WordPress Plugin DoS Vulnerability Hits Contact Form 7</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/exploit-cyber-frenzy-threatens-millions-via-critical-cpanel-9twsz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:14:14+03:00</news:publication_date>
      <news:title>cPanel Authentication Bypass Vulnerability Exploited in the Wild</news:title><news:keywords>threat-intel, tools, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisco-moves-to-acquire-astrix-security-to-tackle-non-human-i-lo620/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T22:00:26+03:00</news:publication_date>
      <news:title>Cisco Acquires Astrix Security to Secure Non-Human Identities</news:title><news:keywords>threat-intel, vulnerability, identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43616/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:32+03:00</news:publication_date>
      <news:title>Detect-It-Easy Path Traversal Allows Arbitrary File Writes, Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42796/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:32+03:00</news:publication_date>
      <news:title>Arelle RCE: Unauthenticated Remote Code Execution in REST Endpoint</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42146/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42146 — CImg Library is a C++ library for image processing. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42144/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42144 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42092/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42092 — titra is an open source time tracking project. In version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42091/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42091 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42088/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:31+03:00</news:publication_date>
      <news:title>OpenC3 COSMOS Critical Script Runner Bypass (CVE-2026-42088)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-250</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42087/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:30+03:00</news:publication_date>
      <news:title>OpenC3 COSMOS TSDB SQL Injection Flaw Exposes Critical Systems</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42086/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42086 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42084/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42084: OpenC3 COSMOS Allows Password Change Without Old Password</news:title><news:keywords>vulnerability, cve, high-severity, cwe-620</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41572/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41572 — Note Mark is an open-source note-taking application. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41571/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41571: Note Mark Critical Auth Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41471/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41471: PayPal Events WordPress Plugin Exposes All Customer Orders</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-32834: WordPress Easy PayPal Plugin Authentication Bypass</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29004/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:16:26+03:00</news:publication_date>
      <news:title>BusyBox udhcpc6 Heap Overflow (CVE-2026-29004) Exposes Embedded Systems</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenc-gxd4y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T21:06:00+03:00</news:publication_date>
      <news:title>Phishing Campaign Leverages SimpleHelp, ScreenConnect RMM to Hit 80+ Orgs</news:title><news:keywords>threat-intel, vulnerability, phishing, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/educational-company-infrastructure-reports-cyber-incident-6eypo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:19:00+03:00</news:publication_date>
      <news:title>Infrastructure Education Company Reports Cyber Incident, User Data Exposed</news:title><news:keywords>threat-intel, data-breach, government, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42812/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>Apache Iceberg CVE-2026-42812 Bypasses Metadata Location Validation</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-284, cwe-732, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42811/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42811: Apache Polaris Credential Bypass Exposes Cloud Storage</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-917</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42810: Apache Polaris S3 Wildcard Vulnerability Creates Critical Data Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-116</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42809/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42809: Apache Polaris Critical Credential Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-42376: D-Link DIR-456U EOL Router Exposes Critical Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42375/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:25+03:00</news:publication_date>
      <news:title>D-Link DIR-600L EOL Router Exposes Critical Telnet Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42374/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:25+03:00</news:publication_date>
      <news:title>D-Link DIR-600L EOL Router Has Hardcoded Telnet Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42373/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:25+03:00</news:publication_date>
      <news:title>D-Link DIR-605L EOL Router Hit by Critical Telnet Backdoor</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42076/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-42076: Evolver Engine RCE Puts AI Agents at Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:22+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape Vulnerability (CVE-2026-26956) Allows Critical Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26332/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:22+03:00</news:publication_date>
      <news:title>vm2 Sandbox Escape (CVE-2026-26332) Exposes Node.js Apps to RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25293/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-25293: Critical PLC Buffer Overflow Puts Industrial Control Systems at Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24781/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:21+03:00</news:publication_date>
      <news:title>VM2 Sandbox Escape Vulnerability (CVE-2026-24781) Exposes Node.js Applications</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24120/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-24120: vm2 Sandbox Escape Allows Host Command Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T20:16:21+03:00</news:publication_date>
      <news:title>VM2 Sandbox Breakout Vulnerability: Critical Flaw Exposes Node.js Applications</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/forbes-preliminarily-agrees-to-pay-10-million-to-settle-cal-hnn8u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T19:49:00+03:00</news:publication_date>
      <news:title>Forbes Agrees to $10 Million Settlement in Wiretapping Lawsuit</news:title><news:keywords>threat-intel, data-breach, government, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ransomware-group-claims-breach-of-pro-orb-n-hungarian-media-b2s6y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T18:23:00+03:00</news:publication_date>
      <news:title>Ransomware Group Claims Breach of Hungarian Media Firm Mediaworks</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8874/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T18:18:34+03:00</news:publication_date>
      <news:title>Cisco Acquires Israeli Startup Astrix for $400M to Combat Non-Human Identities</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/weekly-recap-ai-powered-phishing-android-spying-tool-li-y3gu1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:23:00+03:00</news:publication_date>
      <news:title>AI Phishing, Android Spyware, Linux Exploit, GitHub RCE Headline Weekly Threats</news:title><news:keywords>threat-intel, vulnerability, data-breach, phishing, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6266/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-6266: AAP Gateway Email Auto-Link Flaw Allows Account Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34032/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-34032 — Apache HTTP Server: Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125, cwe-170</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33857/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-33857 — Apache HTTP Server: Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-31205 — Pluck CMS Before V.4.7.21dev Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-58074/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T17:16:28+03:00</news:publication_date>
      <news:title>Norton Secure VPN Privilege Escalation via Microsoft Store (CVE-2025-58074)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-1386</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7482/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T16:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7482: Critical Ollama Heap Out-of-Bounds Read Exposes Sensitive AI Data</news:title><news:keywords>vulnerability, cve, critical, high-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/progress-warns-of-critical-moveit-automation-auth-bypass-fla-unrgi/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T15:18:57+03:00</news:publication_date>
      <news:title>MOVEit Automation Critical Auth Bypass Flaw Requires Immediate Patch</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3120/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T15:16:29+03:00</news:publication_date>
      <news:title>SambaBox CVE-2026-3120: High-Severity OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/2026-the-year-of-ai-assisted-attacks-izhod/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T14:58:00+03:00</news:publication_date>
      <news:title>Kaikatsu Club Breach: 17-Year-Old Exposes 7 Million Users for Pokémon Cards</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-i-vmto2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T14:57:00+03:00</news:publication_date>
      <news:title>Silver Fox Deploys ABCDoor Malware via Tax Phishing in India and Russia</news:title><news:keywords>threat-intel, vulnerability, malware, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-says-copy-fail-flaw-now-exploited-to-root-linux-syste-6jlid/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T14:28:15+03:00</news:publication_date>
      <news:title>CISA Warns: &apos;Copy Fail&apos; Linux Root Vulnerability Actively Exploited</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7750/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:16:01+03:00</news:publication_date>
      <news:title>Totolink N300RH RCE: CVE-2026-7750 Buffer Overflow Affects Remote Management</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7749/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:16:01+03:00</news:publication_date>
      <news:title>Totolink N300RH Router Hit by High-Severity Buffer Overflow Vulnerability (CVE-2026-7749)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7748/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:16:00+03:00</news:publication_date>
      <news:title>Totolink N300RH Buffer Overflow (CVE-2026-7748) Remotely Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33846/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:15:59+03:00</news:publication_date>
      <news:title>GnuTLS DTLS Heap Overflow (CVE-2026-33846) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-vulnerability-weaponized-to-target-governmen-71rj3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:27:00+03:00</news:publication_date>
      <news:title>cPanel Vulnerability Weaponized Against Gov, Military, and MSPs</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8870/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:20:16+03:00</news:publication_date>
      <news:title>cPanel Exploited: Over 40,000 Systems Compromised Globally</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7747/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:16:01+03:00</news:publication_date>
      <news:title>Totolink N300RH Critical Buffer Overflow: Public Exploit Available</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7746/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7746 — SourceCodester Web-Based Pharmacy Product Management System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7745/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7745 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14320/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T12:15:59+03:00</news:publication_date>
      <news:title>CVE-2025-14320: Critical XSS in Tegsoft Online Support Application</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8868/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:38:19+03:00</news:publication_date>
      <news:title>Cyber News - Erez Dasa Debunks Stormous Claims and Crocs Israel Breach</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8867/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:33:57+03:00</news:publication_date>
      <news:title>Barshai Company Email Compromise Spreads Malicious Emails</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7744/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7744 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7743/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7743 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7742/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7742 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T11:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7741 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7738/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7738 — Puchunjie Doc-Tools-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7737/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7737 — Osrg GoBGP Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-119, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7736/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7736: GoBGP Integer Underflow Threatens BGP Routing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-189, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/edtech-firm-instructure-discloses-data-breach-amid-hacker-le-hu96u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:02:51+03:00</news:publication_date>
      <news:title>Instructure Data Breach: Student Data Stolen, Services Disrupted</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/a-week-in-security-april-27-8211-may-3-rww0r/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:01:00+03:00</news:publication_date>
      <news:title>cPanel Bug Exposes Millions of Websites to Takeover</news:title><news:keywords>malware, threat-intel, ransomware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7735/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:02+03:00</news:publication_date>
      <news:title>osrg GoBGP Buffer Overflow (CVE-2026-7735) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7734/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7734 — Osrg GoBGP Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7733/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7733: funadmin Unrestricted File Upload Exposes Systems</news:title><news:keywords>vulnerability, cve, high-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7732/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7732 — Code-Projects BloodBank Managing System Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7731/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T09:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7731 — Code-Projects BloodBank Managing System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/global-crackdown-arrests-276-shuts-9-crypto-scam-centers-s-ks2j6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:59:00+03:00</news:publication_date>
      <news:title>Global Law Enforcement Cracks Down on Crypto Scam Centers, Arrests 276</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7730/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7730 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7729/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7729 — Pixelsock Directus-Mcp Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7728 — Ryanjoachim Mcp-Rtfm Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7727/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7727: Shandong Hoteam Software PDM SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7725/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7725 — PrefectHQ Prefect Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/reborn-gaming-126-breached-accounts-qxmv4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:43:06+03:00</news:publication_date>
      <news:title>Reborn Gaming Breach: cPanel/WHM Vulnerability Exposes User Data</news:title><news:keywords>data-breach, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7724/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7724 — PrefectHQ Prefect Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-362, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7723/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7723: PrefectHQ Prefect WebSocket Lacks Authentication</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7722/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-7722 — PrefectHQ Prefect Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7721/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T06:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-7721 — Totolink WA300 5.2cu.7112_B20190227 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7720/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7720 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7719/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:15:58+03:00</news:publication_date>
      <news:title>Totolink WA300 Critical Buffer Overflow (CVE-2026-7719) Exploited</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7718/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T05:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7718 — Totolink WA300 5.2cu.7112_B20190227 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7713/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-7713 — Crocodilestick Calibre-Web-Automated Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7712/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-7712 — MindsDB Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7711/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>MindsDB Unrestricted File Upload (CVE-2026-7711) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7710/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-7710: YunaiV yudao-cloud Improper Authentication Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6948/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T03:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6948 — Velociraptor versions prior to 0.76.4 contain a resource</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7709/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7709 — Janeczku Calibre-Web Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7708/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7708 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7707/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7707 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7706/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7706 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7705/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T02:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7705 — JD Cloud JDCOS 4.5.1.R4518 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/marcus-millichap-1-837-078-breached-accounts-cqfcx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T01:53:12+03:00</news:publication_date>
      <news:title>Marcus &amp; Millichap Breach: ShinyHunters Leaks 1.8M Records</news:title><news:keywords>data-breach, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/instructure-confirms-data-breach-shinyhunters-claims-attack-hwvmu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T01:16:27+03:00</news:publication_date>
      <news:title>Instructure Confirms Data Breach as ShinyHunters Claims Attack</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-03</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-defender-wrongly-flags-digicert-certs-as-trojan-wi-aktp2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T21:11:25+03:00</news:publication_date>
      <news:title>Microsoft Defender Flags DigiCert Certificates as Trojan</news:title><news:keywords>threat-intel, data-breach, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7704/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T20:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7704 — AV Stumpfl Pixera Two Media Server Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7703/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T20:16:13+03:00</news:publication_date>
      <news:title>AV Stumpfl Pixera Two Media Server Websocket API Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/us-military-reaches-deals-with-7-tech-companies-to-use-their-7pkym/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:21:36+03:00</news:publication_date>
      <news:title>US Military Taps Google, Microsoft, AWS for Classified AI</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7702/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-7702 — Toeverything AFFiNE Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7701/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-7701 — Telegram Desktop Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-404, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7700/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T18:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7700 — The Function Eval Of The File Src/Lfx/Src/Lfx/Components/Llm Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7699/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T18:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7699 — Dromara MaxKey SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7698/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T17:16:27+03:00</news:publication_date>
      <news:title>Tiandy Easy7 RCE: Unauthenticated OS Command Injection via updateDbBackupInfo</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7697/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T17:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7697 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7696/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T16:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-7696 — Acrel Electrical EEMS Enterprise Power Operation And Mainten Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7695/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T16:16:08+03:00</news:publication_date>
      <news:title>Acrel Electrical EEMS Platform Hit by High-Severity SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7694/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T15:15:59+03:00</news:publication_date>
      <news:title>Acrel Electrical ECEMS SQLi (CVE-2026-7694) Exposes Microgrid Systems</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T15:00:00+03:00</news:publication_date>
      <news:title>Targeted Phishing Campaign Active in Israel Exploits Compromised Email Accounts</news:title><news:keywords>incd, israel, advisory, alert</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T14:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7692 — Wavlink WL-WN570HA1 R70HA1 V1410_221110 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7691/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T14:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7691 — Wavlink WL-WN570HA1 R70HA1 V1410_221110 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7690/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T13:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7690 — The Function Set_sys_adm Of The File /Cgi-Bin/Adm.Cgi Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7688/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T13:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7688 — Dolibarr ERP CRM SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7686/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7686 — Eyeo Adblock Plus Improper Access Control</news:title><news:keywords>vulnerability, cve, medium-severity, improper-access-control, cwe-266, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7685/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:25+03:00</news:publication_date>
      <news:title>Edimax BR-6208AC Buffer Overflow: Remote Exploit Public (CVE-2026-7685)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7684/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:25+03:00</news:publication_date>
      <news:title>Edimax BR-6428nC Buffer Overflow (CVE-2026-7684) Exposed, High Severity</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-7683 — An Unknown Function Of The File /Goform/SetWAN Of The Compon Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7682/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-7682 — Edimax BR-6208AC Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7681/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7681 — Jsbroks COCO Annotator Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7680/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-7680 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5063/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-5063: NEX-Forms WordPress Plugin Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7679/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:15:59+03:00</news:publication_date>
      <news:title>YunaiV yudao-cloud Authentication Bypass (CVE-2026-7679) Publicly Exploited</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7678/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7678 — YunaiV Yudao-Cloud SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7676/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7676 — Kerwincui FastBee Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7675/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T06:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-7675: Shenzhen Libituo LBT-T300-HW1 Buffer Overflow Exposed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7674/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:17:12+03:00</news:publication_date>
      <news:title>CVE-2026-7674: Libituo LBT-T300-HW1 Buffer Overflow Poses Remote Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7673/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:17:12+03:00</news:publication_date>
      <news:title>CVE-2026-7673 — Crmeb_java Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7672/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T03:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-7672 — Youlaitech Youlai-Boot SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url></urlset>
