<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/us-military-reaches-deals-with-7-tech-companies-to-use-their-7pkym/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:21:36+03:00</news:publication_date>
      <news:title>US Military Taps Google, Microsoft, AWS for Classified AI</news:title><news:keywords>threat-intel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7702/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-7702 — Toeverything AFFiNE Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7701/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-7701 — Telegram Desktop Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-404, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7700/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T18:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7700 — The Function Eval Of The File Src/Lfx/Src/Lfx/Components/Llm Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7699/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T18:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7699 — Dromara MaxKey SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7698/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T17:16:27+03:00</news:publication_date>
      <news:title>Tiandy Easy7 RCE: Unauthenticated OS Command Injection via updateDbBackupInfo</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7697/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T17:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7697 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7696/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T16:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-7696 — Acrel Electrical EEMS Enterprise Power Operation And Mainten Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7695/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T16:16:08+03:00</news:publication_date>
      <news:title>Acrel Electrical EEMS Platform Hit by High-Severity SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7694/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T15:15:59+03:00</news:publication_date>
      <news:title>Acrel Electrical ECEMS SQLi (CVE-2026-7694) Exposes Microgrid Systems</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T14:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7692 — Wavlink WL-WN570HA1 R70HA1 V1410_221110 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7691/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T14:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7691 — Wavlink WL-WN570HA1 R70HA1 V1410_221110 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7690/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T13:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7690 — The Function Set_sys_adm Of The File /Cgi-Bin/Adm.Cgi Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7688/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T13:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7688 — Dolibarr ERP CRM SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7686/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T11:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7686 — Eyeo Adblock Plus Improper Access Control</news:title><news:keywords>vulnerability, cve, medium-severity, improper-access-control, cwe-266, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7685/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:25+03:00</news:publication_date>
      <news:title>Edimax BR-6208AC Buffer Overflow: Remote Exploit Public (CVE-2026-7685)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7684/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:25+03:00</news:publication_date>
      <news:title>Edimax BR-6428nC Buffer Overflow (CVE-2026-7684) Exposed, High Severity</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-7683 — An Unknown Function Of The File /Goform/SetWAN Of The Compon Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7682/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T10:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-7682 — Edimax BR-6208AC Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7681/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7681 — Jsbroks COCO Annotator Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7680/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-7680 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5063/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T09:15:57+03:00</news:publication_date>
      <news:title>CVE-2026-5063: NEX-Forms WordPress Plugin Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7679/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:15:59+03:00</news:publication_date>
      <news:title>YunaiV yudao-cloud Authentication Bypass (CVE-2026-7679) Publicly Exploited</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7678/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7678 — YunaiV Yudao-Cloud SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7676/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T08:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7676 — Kerwincui FastBee Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7675/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T06:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-7675: Shenzhen Libituo LBT-T300-HW1 Buffer Overflow Exposed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7674/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:17:12+03:00</news:publication_date>
      <news:title>CVE-2026-7674: Libituo LBT-T300-HW1 Buffer Overflow Poses Remote Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7673/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T05:17:12+03:00</news:publication_date>
      <news:title>CVE-2026-7673 — Crmeb_java Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7672/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T03:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-7672 — Youlaitech Youlai-Boot SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7670/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T02:16:16+03:00</news:publication_date>
      <news:title>Jinher OA 1.0 SQL Injection (CVE-2026-7670) Exposes Data Remotely</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7669/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T01:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-7669 — Sgl-Project SGLang Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7668/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T00:16:07+03:00</news:publication_date>
      <news:title>MikroTik RouterOS 6.49.8 SCEP Endpoint Vulnerability (CVE-2026-7668)</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-119, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-02</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T21:16:45+03:00</news:publication_date>
      <news:title>Lapsus$ Claims Checkmarx Breach, Google Adjusts Bug Bounty, Blackwater Hits Hospitals</news:title><news:keywords>israel, vulnerability, data-breach, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7644/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T18:16:14+03:00</news:publication_date>
      <news:title>ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7643/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T18:16:14+03:00</news:publication_date>
      <news:title>CVE-2026-7643 — ChatGPTNextWeb NextChat Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-346, cwe-942</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7642/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T18:16:14+03:00</news:publication_date>
      <news:title>CVE-2026-7642 — Pskill9 Website-Downloader Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7633/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T18:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-7633 — Totolink N300RH 6.1c.1353_B20190305 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7632/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T17:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-7632: SQL Injection in Online Hospital Management System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7631/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T17:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-7631 — Code-Projects Online Hospital Management System Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7630/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T17:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-7630: InnoShop Improper Authentication Exposes Installation Endpoint</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7629/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T17:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7629 — Kleneway Awesome-Cursor-Mpc-Server Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3504/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T17:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-3504 — The Dokan: AI Powered WooCommerce Multivendor Marketplace</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2554/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T17:16:17+03:00</news:publication_date>
      <news:title>WCFM Frontend Manager: Critical IDOR Allows Admin Deletion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0703/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T17:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-0703 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7628/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7628 — CrazyrabbitLTC Mcp-Code-Review-Server Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6817/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6817 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6525/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6525 — IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6320/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:16+03:00</news:publication_date>
      <news:title>WordPress Salon Booking Plugin: Arbitrary File Read via Email Attachments</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4790/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-4790 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4100/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:16+03:00</news:publication_date>
      <news:title>Paid Memberships Pro Plugin: Stripe Webhook Vulnerability CVE-2026-4100</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4062/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:16+03:00</news:publication_date>
      <news:title>WordPress Geo Mashup Plugin: Unauthenticated SQL Injection via &apos;object_ids&apos;</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4061/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-4061: Geo Mashup WordPress Plugin SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4060/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T15:16:15+03:00</news:publication_date>
      <news:title>WordPress Geo Mashup Plugin SQLi via &apos;sort&apos; Parameter (CVE-2026-4060)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7627/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T14:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7627 — 8nite Metatrader-4-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7612/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-7612 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7609/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-7609 — TRENDnet TEW-821DAP Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7491/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:16:19+03:00</news:publication_date>
      <news:title>Zyosoft School App IOD Vulnerability Exposes Student Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7490/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:16:18+03:00</news:publication_date>
      <news:title>Sunnet CTMS/CPAS Arbitrary File Upload Allows RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7489/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:16:18+03:00</news:publication_date>
      <news:title>Sunnet CTMS SQL Injection (CVE-2026-7489) Exposes Databases</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5077/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T13:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-5077 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7608/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T12:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7608 — TRENDnet TEW-821DAP Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5324/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T12:16:22+03:00</news:publication_date>
      <news:title>Brizy WordPress Plugin CVE-2026-5324: Unauthenticated Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4024/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T12:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-4024 — The Royal Addons for Elementor plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:16:28+03:00</news:publication_date>
      <news:title>ARMember WordPress Plugin Vulnerable to SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7607/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:16:28+03:00</news:publication_date>
      <news:title>TRENDnet TEW-821DAP Buffer Overflow (CVE-2026-7607) Poses Risk to EOL Devices</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6457/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6457 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6449/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6449 — The Booking for Appointments and Events Calendar – Amelia</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6229: Royal Elementor Addons Plugin Vulnerable to SSRF</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4650/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-4650 — The FundPress – WordPress Donation Plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2052/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T11:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-2052: WordPress Plugin RCE Exposes Sites to Contributors</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7605/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T10:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7605 — JeecgBoot Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trellix-confirms-source-code-breach-with-unauthorized-reposi-goqwr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:41:00+03:00</news:publication_date>
      <news:title>Trellix Confirms Source Code Breach After Unauthorized Repository Access</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7647/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:04+03:00</news:publication_date>
      <news:title>WordPress Profile Builder Pro: Unauthenticated PHP Object Injection Risks Site Takeover</news:title><news:keywords>vulnerability, cve, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7049/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:04+03:00</news:publication_date>
      <news:title>PixelYourSite Pro Plugin SSRF Vulnerability (CVE-2026-7049)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6916/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6916 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6812/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6812 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6447/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-6447 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5113/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-5113: Gravity Forms XSS via Flawed Consent Field Validation</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5112/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:03+03:00</news:publication_date>
      <news:title>Gravity Forms Plugin: Unauthenticated Stored XSS Puts WordPress Admins at Risk</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5111/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-5111: Gravity Forms Plugin Hit by Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5110/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:03+03:00</news:publication_date>
      <news:title>Gravity Forms Plugin: Unauthenticated Stored XSS in WordPress</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5109/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T09:16:03+03:00</news:publication_date>
      <news:title>Gravity Forms Plugin Stored XSS: Unauthenticated Attackers Inject Scripts</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/zenbusiness-5-118-184-breached-accounts-uengp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:53:38+03:00</news:publication_date>
      <news:title>ZenBusiness Breach: ShinyHunters Exfiltrates 5M Records from Snowflake, Mixpanel, Salesforce</news:title><news:keywords>data-breach, ransomware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4557/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:40:01+03:00</news:publication_date>
      <news:title>Anthropic Launches Claude Security: AI for AppSec Vulnerability Detection</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7641/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7641: WordPress Multisite Privilege Escalation Via Plugin</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7604/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7604 — JeecgBoot Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7603/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7603 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7458/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7458: WordPress Plugin Auth Bypass Exposes Admins</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6963/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-6963: WordPress WP Mail Gateway Plugin Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6446/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-6446 — The My Social Feeds – Social Feeds Embedder plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-4882: WordPress Plugin Arbitrary File Upload Critical Flaw</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4658/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-4658 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14726/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T08:16:00+03:00</news:publication_date>
      <news:title>CVE-2025-14726 — The Widgets for Social Photo Feed plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7638/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T07:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7638 — The App Builder – Create Native Android &amp; iOS Apps On The</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7602/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T07:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7602 — JeecgBoot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7209/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T07:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7209 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T07:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-6378 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7601/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7601 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43824/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T05:16:00+03:00</news:publication_date>
      <news:title>Argo CD CVE-2026-43824: Critical Kubernetes Secret Disclosure</news:title><news:keywords>vulnerability, cve, high-severity, cwe-212</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7600/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T04:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-7600 — ArtMin96 Yii2-Mcp-Server Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/essential-data-sources-for-detection-beyond-the-endpoint-b8apv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T02:00:13+03:00</news:publication_date>
      <news:title>Palo Alto Unit 42: Beyond Endpoint Detection</news:title><news:keywords>threat-intel, apt, malware, research</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7599/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T01:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7599 — Dayoooun Hwpx-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7598/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T01:16:16+03:00</news:publication_date>
      <news:title>libssh2 Integer Overflow (CVE-2026-7598) Exposes Remote Attack Vector</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow, cwe-189, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7597/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T01:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-7597 — Mem0ai Mem0 Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7596/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T00:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-7596 — Nextlevelbuilder Ui-Ux-Pro-Max-Skill Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7595/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T00:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-7595 — Nextlevelbuilder Ui-Ux-Pro-Max-Skill Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7594/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T00:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7594: Flux159 mcp-game-asset-gen Path Traversal Exploitable Remotely</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7593/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-02T00:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7593: Sunwood-ai-labs Command-Executor OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7592/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T23:16:24+03:00</news:publication_date>
      <news:title>itsourcecode Courier Management System SQLi (CVE-2026-7592) Publicly Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-01</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-20, cwe-269, command-injection, cwe-77, cwe-78, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7591/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T22:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-7591 — TimBroddin Astro-Mcp-Server SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7590/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T22:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-7590: OS Command Injection in eyal-gor p_69_branch_monkey_mcp</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7589/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T22:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-7589 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-52347/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2025-52347: PassMark Drivers Expose Kernel to Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7588/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T21:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-7588 — Ggerve Coding-Standards-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T21:16:14+03:00</news:publication_date>
      <news:title>CVE-2026-35233 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/30-000-facebook-accounts-hacked-via-google-appsheet-phishing-1nme5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T21:09:00+03:00</news:publication_date>
      <news:title>Facebook Accounts Hacked via Google AppSheet Phishing Campaign</news:title><news:keywords>threat-intel, vulnerability, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/15-year-old-detained-over-french-govt-agency-data-breach-995af/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:52:06+03:00</news:publication_date>
      <news:title>France Titres Data Breach: 15-Year-Old Detained for Selling Stolen Data</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7587/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-7587 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37541/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:24+03:00</news:publication_date>
      <news:title>OVMS3 CVE-2026-37541: Critical Buffer Overflow Exposes EV Systems</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37540/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-37540: OpenAMP ELF Loader Integer Overflow Exposes Embedded Systems</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37539/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-37539: Critical Buffer Overflow in Cannelloni CAN FD Parsing</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37537/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-37537: Integer Underflow in Open-SAE-J1939 Leads to Out-of-Bounds Write</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37536/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-37536: Stack Buffer Overflow in miaofng/uds-c</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37535/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:23+03:00</news:publication_date>
      <news:title>openxc/isotp-c Out-of-Bounds Read: DoS and Info Leak via Malicious CAN Frame</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37532/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-37532: Heap Over-Read in AGL agl-service-can-low-level</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37531/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:22+03:00</news:publication_date>
      <news:title>AGL app-framework-main Critical Zip Slip + TOCTOU Vulnerability (CVE-2026-37531)</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37526/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:22+03:00</news:publication_date>
      <news:title>AGL app-framework-binder CVE-2026-37526 Allows Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37525/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T20:16:22+03:00</news:publication_date>
      <news:title>AGL app-framework-binder Privilege Escalation (CVE-2026-37525)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/senate-judiciary-advances-bill-that-would-bar-minors-from-in-bjtw0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T19:28:00+03:00</news:publication_date>
      <news:title>Senate Judiciary Advances Bill Barring Minors from AI Companions</news:title><news:keywords>threat-intel, data-breach, government, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/edtech-firm-instructure-confirms-data-breach-after-salesforc-duj4c/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T19:26:28+03:00</news:publication_date>
      <news:title>Instructure Canvas Breach: Social Engineering Exploits Salesforce Instance</news:title><news:keywords>threat-intel, data-breach, malware, phishing</news:keywords>
    </news:news>
  </url></urlset>
