<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8933/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T23:22:12+03:00</news:publication_date>
      <news:title>Pwn2Own Berlin 2026 Concludes: 47 Zero-Days, $1.3 Million Awarded</news:title><news:keywords>israel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8932/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T23:19:26+03:00</news:publication_date>
      <news:title>node-ipc Supply Chain Attack: Malicious Code Steals Passwords</news:title><news:keywords>israel, telegram</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-16</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-307, code-execution, cwe-415, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4591/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T20:15:07+03:00</news:publication_date>
      <news:title>Microsoft Windows LPE: Nightmare Eclipse Resurfaces Old CVE-2020-17103 Flaw</news:title><news:keywords>vulnerability, microsoft, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47979/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:23+03:00</news:publication_date>
      <news:title>WordPress Plugin Backup and Restore: Arbitrary File Deletion Exposes Installations</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47976/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:23+03:00</news:publication_date>
      <news:title>TextPattern CMS RCE via Plugin Upload (CVE-2021-47976)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:21+03:00</news:publication_date>
      <news:title>EgavilanMedia PHPCRUD SQLi Exposes Unauthenticated Data Access</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47954/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:21+03:00</news:publication_date>
      <news:title>CVE-2021-47954: Unauthenticated SQLi in LayerBB 1.1.4</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:21+03:00</news:publication_date>
      <news:title>python jsonpickle RCE (CVE-2021-47952) Exploits Malicious JSON Payloads</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:20+03:00</news:publication_date>
      <news:title>CVE-2020-37244: Supsystic Membership SQLi Puts User Data at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37243/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:20+03:00</news:publication_date>
      <news:title>Supsystic Pricing Table SQLi &amp; XSS: Unauthenticated RCE Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37242/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:20+03:00</news:publication_date>
      <news:title>Supsystic Ultimate Maps SQLi: Unauthenticated RCE Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:20+03:00</news:publication_date>
      <news:title>CVE-2020-37239: libbabl Double Free Bypasses Memory Safety</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-415</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37232/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:19+03:00</news:publication_date>
      <news:title>Advanced SystemCare Service Vulnerability: Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-428</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37231/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:19+03:00</news:publication_date>
      <news:title>Privacy Drive 3.17.0 Unquoted Path Leads to Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-428</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37230/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:18+03:00</news:publication_date>
      <news:title>Syncplify.me Server! CVE-2020-37230: Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-428</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:18+03:00</news:publication_date>
      <news:title>OKI sPSV Port Manager: Local Privilege Escalation via Unquoted Path</news:title><news:keywords>vulnerability, cve, high-severity, cwe-428</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:18+03:00</news:publication_date>
      <news:title>CVE-2020-37228: iDS6 DSSPro Digital Signage CAPTCHA Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2020-37227/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T19:16:17+03:00</news:publication_date>
      <news:title>CVE-2020-37227: HS Brand Logo Slider Unrestricted File Upload Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-4202/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T16:16:16+03:00</news:publication_date>
      <news:title>CVE-2025-4202 — The Multicollab: Content Team Collaboration and Editorial</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4590/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T15:04:42+03:00</news:publication_date>
      <news:title>Foxconn North America Confirms Cyberattack by Nitrogen Ransomware</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/poc-code-published-for-critical-nginx-vulnerability-d938d/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T13:02:00+03:00</news:publication_date>
      <news:title>Critical NGINX Vulnerability: PoC Code Publicly Released</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8657/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T09:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-8657: jsondiffpatch Prototype Pollution Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8656/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T09:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-8656 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8681/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T06:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-8681 — The Essential Chat Support plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45665/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:55+03:00</news:publication_date>
      <news:title>Open WebUI XSS Allows Privilege Escalation to Super Admin</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45351/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-45351 — Open WebUI is a self-hosted artificial intelligence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45350/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:55+03:00</news:publication_date>
      <news:title>CVE-2026-45350: Open WebUI API Flaw Exposes Tools to Unauthorized Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-45345 — Open WebUI is a self-hosted artificial intelligence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45338/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-45338: Open WebUI SSRF Vulnerability Exposes Internal Resources</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:54+03:00</news:publication_date>
      <news:title>Open WebUI CVE-2026-45315: Polyglot Upload Enables XSS</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79, cwe-434, cwe-646</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45303/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-45303: Open WebUI Vulnerability Allows Script Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45301/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:53+03:00</news:publication_date>
      <news:title>Open WebUI Vulnerability Exposes All User Files</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44571/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-44571 — Open WebUI is a self-hosted artificial intelligence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44570/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:53+03:00</news:publication_date>
      <news:title>Open WebUI CVE-2026-44570: Inconsistent Auth Exposes User AI Memories</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44569/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-44569: Open WebUI IDOR Exposes Offline AI Messages</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44567/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-44567: Open WebUI API Fails Role Validation, Allows Unauthorized Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-602, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44566/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:52+03:00</news:publication_date>
      <news:title>Open WebUI Vulnerability Allows Arbitrary File Uploads via Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44565/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:52+03:00</news:publication_date>
      <news:title>Open WebUI Path Traversal (CVE-2026-44565) Allows Arbitrary File Upload</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44549/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T01:16:52+03:00</news:publication_date>
      <news:title>Open WebUI XSS Vulnerability Exposes Offline AI Platforms</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8696/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-16T00:16:39+03:00</news:publication_date>
      <news:title>radare2 Use-After-Free (CVE-2026-8696) Risks Denial of Service, RCE</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45675/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45675: Open WebUI Vulnerable to Admin Role Race Condition</news:title><news:keywords>vulnerability, cve, high-severity, cwe-269, cwe-362</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45671/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-45671: Open WebUI File Deletion Flaw Impacts Self-Hosted AI</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45399/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:48+03:00</news:publication_date>
      <news:title>Open WebUI CVE-2026-45399: Low-Privilege Users Disrupt System-Wide AI Tasks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:48+03:00</news:publication_date>
      <news:title>Open WebUI Vulnerability Exposes User Chat Conversations</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45339/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45339 — Open WebUI is a self-hosted artificial intelligence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45331/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45331: Open WebUI Vulnerability Exposes Internal Networks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44562/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44562 — Open WebUI is a self-hosted artificial intelligence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-283, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44560/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44560 — Open WebUI is a self-hosted artificial intelligence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44558/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44558 — Open WebUI is a self-hosted artificial intelligence</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44556/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44556: Open WebUI API Bypasses LLM Access Controls</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44555/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-44555: Open WebUI Exposes Restricted AI Models</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44554/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:46+03:00</news:publication_date>
      <news:title>Open WebUI Vulnerability: Unauthorized Collection Deletion (CVE-2026-44554)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44553/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:46+03:00</news:publication_date>
      <news:title>Open WebUI Vulnerability: Revoked Admins Retain Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44552/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:46+03:00</news:publication_date>
      <news:title>Open WebUI Vulnerability: Redis Key Collision Exposes Multi-Instance Deployments</news:title><news:keywords>vulnerability, cve, high-severity, cwe-668</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44551/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-44551: Open WebUI LDAP Bypass via Empty Password</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-15</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, authentication-bypass, cwe-305, information-disclosure, cwe-352, cwe-862, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/more-than-10-million-stolen-from-crypto-platform-thorchain-cuypo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:31:00+03:00</news:publication_date>
      <news:title>THORChain Suffers $10.7M Crypto Heist from Vault Compromise</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/funnel-builder-wordpress-plugin-bug-exploited-to-steal-credi-uvfof/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:30:33+03:00</news:publication_date>
      <news:title>Funnel Builder WordPress Plugin Exploited to Steal Credit Cards</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8686/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:05+03:00</news:publication_date>
      <news:title>coreMQTT CVE-2026-8686: DoS via Crafted MQTT v5.0 Packet</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:04+03:00</news:publication_date>
      <news:title>Vvveb CMS Vulnerability (CVE-2026-46408) Allows Cart Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:04+03:00</news:publication_date>
      <news:title>Vvveb CMS API Token Disclosure (CVE-2026-46407) High Severity</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46367/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:04+03:00</news:publication_date>
      <news:title>phpMyFAQ Stored XSS: Authenticated Users Can Steal Admin Sessions</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46366/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>phpMyFAQ Information Disclosure (CVE-2026-46366) Exposes Restricted Content</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46364/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46364: Critical SQL Injection in phpMyFAQ Unauthenticated API Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46361/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46361 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46359/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:03+03:00</news:publication_date>
      <news:title>CVE-2026-46359: phpMyFAQ SQL Injection via OAuth Token Claims</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45010/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:01+03:00</news:publication_date>
      <news:title>CVE-2026-45010: phpMyFAQ 2FA Bypass Grants Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44826/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:17:00+03:00</news:publication_date>
      <news:title>Vvveb CMS CVE-2026-44826 Allows Negative Order Totals, Exposing Merchants to Financial Fraud</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:56+03:00</news:publication_date>
      <news:title>CVE-2021-47966: PHP Timeclock SQLi Exposes Employee Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47965/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:56+03:00</news:publication_date>
      <news:title>WordPress Plugin WP Super Edit RCE via Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47964/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:56+03:00</news:publication_date>
      <news:title>Schlix CMS RCE (CVE-2021-47964) Exposes Servers to Authenticated Attackers</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47963/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:55+03:00</news:publication_date>
      <news:title>Anote 1.0 RCE via Persistent XSS (CVE-2021-47963)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47959/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T22:16:55+03:00</news:publication_date>
      <news:title>WordPress WPGraphQL DoS: Unauthenticated Attackers Can Crash Servers</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8695/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-8695: radare2 Use-After-Free Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-46383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-46383 — Microsoft APM is an open-source, community-driven</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45539/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>Microsoft APM Vulnerability CVE-2026-45539 Exposes AI Agent Files</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45037/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>Tabby Terminal Vulnerability CVE-2026-45037 Allows OS Protocol Handler Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45036/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45036: Tabby Terminal ZMODEM Flaw Enables Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44717/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-44717: Critical RCE in MCP Calculate Server Due to `eval()`</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44714/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44714: bitcoinj Library Flaw Allows Arbitrary P2PKH/P2WPKH Spends</news:title><news:keywords>vulnerability, cve, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44641/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44641: Microsoft APM Plugin Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44310/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44310 — Gitsign is a keyless Sigstore to signing tool for Git</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-129, cwe-390</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44309 — Gitsign is a keyless Sigstore to signing tool for Git</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42207/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-42207 — Magento Long Term Support (LTS) is an unofficial,</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41258/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:46+03:00</news:publication_date>
      <news:title>OpenMRS RCE: Critical Vulnerability Allows Unrestricted Java Reflection</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23695/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-23695 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/popular-node-ipc-npm-package-compromised-to-steal-credential-x3md6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:10:42+03:00</news:publication_date>
      <news:title>node-ipc npm Package Compromised to Steal Credentials</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-pers-tljha/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T20:10:25+03:00</news:publication_date>
      <news:title>Turla Transforms Kazuar Backdoor into Modular P2P Botnet</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45736/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T18:16:54+03:00</news:publication_date>
      <news:title>CVE-2026-45736 — ws is an open source WebSocket client and server for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-908</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-big-tech-vs-canada-encryption-bill-cisco-s-f-iomva/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T17:52:16+03:00</news:publication_date>
      <news:title>Nvidia, Android, Audi, Canvas: Security Week Highlights Key Flaws</news:title><news:keywords>threat-intel, vulnerability, data-breach, cloud, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/four-openclaw-flaws-enable-data-theft-privilege-escalation-a7v6t/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T16:35:04+03:00</news:publication_date>
      <news:title>OpenClaw Flaws Chained for Data Theft, Persistence</news:title><news:keywords>threat-intel, vulnerability, malware, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-all-federal-agencies-to-patch-exploited-bug-in-c-dxy9y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T16:16:00+03:00</news:publication_date>
      <news:title>CISA Mandates Cisco SD-WAN Patch for Federal Agencies</news:title><news:keywords>threat-intel, data-breach, government, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/attackers-replaced-jdownloader-installer-downloads-with-malw-ne7yp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T15:45:47+03:00</news:publication_date>
      <news:title>JDownloader Installer Compromised, Delivering Python RAT via Unpatched CMS</news:title><news:keywords>malware, threat-intel, ransomware, vulnerability, data-breach, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8931/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T15:03:45+03:00</news:publication_date>
      <news:title>Robotic Lawn Mower Vulnerability: Remote Control Exposes Physical Risk</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/american-lending-center-data-breach-affects-123-000-individu-m967u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T14:06:55+03:00</news:publication_date>
      <news:title>American Lending Center Data Breach Exposes 123,000 Individuals</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/what-45-days-of-watching-your-own-tools-will-tell-you-about-5do30/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T14:00:00+03:00</news:publication_date>
      <news:title>Trusted Tools: The Silent Threat in Your Attack Surface</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41971/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41971 — Permission control vulnerability in the security control</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41970/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41970 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41969/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41969 — Permission control vulnerability in the projection module.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-275</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41968/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41968 — Permission control vulnerability in the manufacturability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41967/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41967 — Permission control vulnerability in the manufacturability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41966 — Permission control vulnerability in the smart sensing</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41965/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41965 — Use-After-Free</news:title><news:keywords>vulnerability, cve, medium-severity, use-after-free, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41964/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41964: High-Severity Web Permission Control Vulnerability Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, cwe-362</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41961/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-41961 — Permission control vulnerability in contacts. Impact:</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-840</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-41960 — Permission control vulnerability in calls. Impact:</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/gremlin-stealer-s-evolved-tactics-hiding-in-plain-sight-wit-271z9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T13:00:52+03:00</news:publication_date>
      <news:title>Gremlin Stealer Evolves with Advanced Obfuscation, Crypto Clipping</news:title><news:keywords>threat-intel, apt, malware, research, unit-42</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/teampcp-ups-the-game-releases-shai-hulud-worm-s-source-code-cpe3q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:47:09+03:00</news:publication_date>
      <news:title>TeamPCP Releases Shai-Hulud Worm Source Code, Incentivizes Supply Chain Attacks</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attac-obplf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:40:42+03:00</news:publication_date>
      <news:title>Microsoft Exchange Zero-Day Exploited via XSS in Outlook on the web</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8425/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-8425 — The Notify Odoo plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8398/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-8398: DAEMON Tools Lite Supply Chain Compromise</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-506</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7563/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7563 — The Classified Listing – AI-Powered Classified ads &amp;</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7046/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7046 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6415 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6403/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>WordPress Quick Playground Plugin Path Traversal (CVE-2026-6403)</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6228: WordPress Frontend Admin Plugin Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>WordPress Form Notify Plugin: Critical Authentication Bypass (CVE-2026-5229)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-4683 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4588/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T12:05:28+03:00</news:publication_date>
      <news:title>Google Pixel Contextual Suggestions Raise Privacy Concerns</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/chrome-148-update-patches-critical-vulnerabilities-yx1wy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:25:15+03:00</news:publication_date>
      <news:title>Chrome 148 Update Patches Critical Vulnerabilities</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6646/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-6646 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4094/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-4094: WooCommerce Currency Switcher Plugin Vulnerable to Data Loss</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41702/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T10:16:18+03:00</news:publication_date>
      <news:title>VMware Fusion TOCTOU Flaw Grants Root Privileges</news:title><news:keywords>vulnerability, cve, high-severity, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28761/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T09:16:20+03:00</news:publication_date>
      <news:title>Musetheque V4 CSRF Vulnerability (CVE-2026-28761) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24662/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T09:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-24662 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2652/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T06:16:23+03:00</news:publication_date>
      <news:title>mlflow Unauthenticated Access: FastAPI Routes Exposed in Versions &lt; 3.10.0</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/teampcp-hackers-advertise-mistral-ai-code-repos-for-sale-weqm4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:50:36+03:00</news:publication_date>
      <news:title>Mistral AI Source Code Advertised for Sale by TeamPCP</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6811/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-6811 — Stack exhaustion vulnerability in the MongoDB PHP driver</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-45248 — The GET /Api/V1/Demo/Registered-Users Endpoint That Authentication Bypass</news:title><news:keywords>vulnerability, cve, medium-severity, authentication-bypass, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44671/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T01:16:44+03:00</news:publication_date>
      <news:title>ZITADEL LDAP Filter Injection Exposes Usernames, Attributes</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-90</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45370/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45370: python-utcp Exposes Process Secrets via Environment Variables</news:title><news:keywords>vulnerability, cve, high-severity, cwe-526</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45369/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45369: Python-UTCP RCE via Unsanitized Shell Commands</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44673/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44673: libyang Integer Overflow Leads to Heap Corruption</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-44661 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T00:16:46+03:00</news:publication_date>
      <news:title>PrestaShop XSS: Critical Back-Office Takeover via Customer Service View</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url></urlset>
