<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3828/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:09+03:00</news:publication_date>
      <news:title>Hikvision Switches: Authenticated RCE in Discontinued Products</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-32683 — Some EZVIZ products utilize older versions of cloud feature</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1749/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-1749 — Some HikCentral Professional Versions. This Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cpanel-whm-release-fixes-for-three-new-vulnerabilities-pa-2ycdm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T10:16:00+03:00</news:publication_date>
      <news:title>cPanel, WHM Patch Three New Vulnerabilities: Privilege Escalation, RCE Risks</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42560/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T09:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-42560: Critical Patreon OAuth Flaw Merges User Identities</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42301/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42301: Malicious Code Execution Via pyp2spec RPM Generation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42296/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42296: Argo Workflows Bypass Grants Host Network Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41311/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:21+03:00</news:publication_date>
      <news:title>LiquidJS CVE-2026-41311: DoS Vulnerability in Template Engine</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7652/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T06:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-7652 — The LatePoint plugin for WordPress is vulnerable to Account</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-640</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6667/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6666/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-6666 — A possible null pointer reference in PgBouncer before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6665/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:09+03:00</news:publication_date>
      <news:title>PgBouncer SCRAM Vulnerability (CVE-2026-6665) Allows Stack Overflow</news:title><news:keywords>vulnerability, cve, high-severity, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6664/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:08+03:00</news:publication_date>
      <news:title>PgBouncer Integer Overflow (CVE-2026-6664) Leads to Remote Crash</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41705/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T04:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-41705: Spring AI MilvusVectorStore Vulnerable to Filter Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-917</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44313/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T03:16:29+03:00</news:publication_date>
      <news:title>Linkwarden SSRF Vulnerability (CVE-2026-44313) Allows Internal Network Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45130/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-45130 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-122, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42556/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-42556: Postiz AI Tool Vulnerability Allows Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42454/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:39+03:00</news:publication_date>
      <news:title>Termix RCE via Container ID Injection (CVE-2026-42454)</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42452/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>Termix CVE-2026-42452 Bypasses 2FA with Temporary JWT</news:title><news:keywords>vulnerability, cve, high-severity, cwe-304</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42354/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>Sentry SAML SSO Critical Vulnerability Allows Account Takeover (CVE-2026-42354)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42352/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>pygeoapi RCE: OGC API Vulnerability Exposes Internal Services</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42351/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-42351: pygeoapi Path Traversal Exposes Directories</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42346/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-42346 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:37+03:00</news:publication_date>
      <news:title>FastGPT Vulnerability: Cloud Metadata Bypass via URL Encoding (CVE-2026-42345)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42302/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-42302: FastGPT Agent Sandbox RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42298/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-42298: Critical RCE in Postiz AI Scheduling Tool</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42291/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-42291 — SysReptor is a fully customizable pentest reporting</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-42224: ipl/web XSS Vulnerability Impacts Icinga Web</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41520/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41520: Cilium Bugtool Leaks Sensitive WireGuard Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-312</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41432/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T02:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41432: LLM Gateway Stripe Webhook Flaw Allows Quota Forgery</news:title><news:keywords>vulnerability, cve, high-severity, cwe-345, cwe-863, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42209/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-42209 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-369</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42205: Avo Framework Privilege Escalation in Ruby on Rails Admin Panels</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-284, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42202/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42202 — nova-toggle-5 enables fliping booleans in the index. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42199/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42199 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42193: Plunk Email Platform Critical Unauthenticated Webhook Forgery</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42192/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T01:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42192 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44400/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T00:16:28+03:00</news:publication_date>
      <news:title>MailEnable WebAdmin Vulnerability Bypasses Authentication (CVE-2026-44400)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7807/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:32+03:00</news:publication_date>
      <news:title>SmarterTools SmarterMail CVE-2026-7807: Local File Inclusion Exposes Passwords</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42282/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42282 — n8n-MCP is an MCP server that provides AI assistants access</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42190/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42190 — RedwoodSDK is a server-first React framework. From version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42189/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42189: Russh SSH Library DoS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42185 — People is an application to handle users and teams, and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42181/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42181 — Lemmy is a link aggregator and forum for the fediverse.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42180/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42180 — Lemmy is a link aggregator and forum for the fediverse.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42176/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42176 — Scoold is a Q&amp;A and a knowledge sharing platform for teams.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41495/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-41495 — n8n-MCP is an MCP server that provides AI assistants access</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-08</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-1004, cwe-266, cwe-200, cwe-497, server-side-request-forgery</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/gm-to-pay-over-12-million-in-california-privacy-settlement-fm7xa/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T22:35:00+03:00</news:publication_date>
      <news:title>GM Fined $12 Million in California Privacy Settlement Over Driver Data</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8178/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T22:16:31+03:00</news:publication_date>
      <news:title>Amazon Redshift JDBC Driver Vulnerability Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-470</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41511/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T22:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-41511 — OpenMcdf is a fully .NET / C# library to manipulate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/kingdom-market-administrator-given-16-year-sentence-7hp4k/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T22:16:00+03:00</news:publication_date>
      <news:title>Kingdom Market Administrator Sentenced to 16 Years</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/virginia-man-found-guilty-of-deleting-96-government-database-xpdfr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T21:14:00+03:00</news:publication_date>
      <news:title>Virginia Man Convicted for Deleting 96 Government Databases</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tclbanker-banking-trojan-targets-financial-platforms-via-wha-qc78d/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T21:12:00+03:00</news:publication_date>
      <news:title>TCLBANKER Banking Trojan Targets 59 Financial Platforms via WhatsApp, Outlook Worms</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sen-schumer-seeks-dhs-plan-on-ai-cyber-coordination-with-st-orozv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T20:20:00+03:00</news:publication_date>
      <news:title>Schumer Demands DHS AI Cyber Plan for State, Local Governments</news:title><news:keywords>threat-intel, policy, government, vulnerability, data-breach, ai-security, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42072/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T20:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42072: Nornicdb Exposes Graph Database via Default Credentials on LAN</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-1392</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42030/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T20:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42030 — MapServer&apos;S WMS Server Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-80</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42028/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T20:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42028 — NovaGallery Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41887/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T20:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-41887 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-22, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvidia-confirms-geforce-now-data-breach-affecting-armenian-u-fmnfi/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:18:31+03:00</news:publication_date>
      <news:title>NVIDIA GeForce NOW Data Breach Impacts Armenian Users</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42353/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-42353: i18next-http-middleware Path Traversal and SSRF Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41886/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-41886: locize SDK Vulnerability Exposes Apps to Cross-Origin Attacks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41885/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41885 — i18next-locize-backend is a simple i18next backend for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41883/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:11+03:00</news:publication_date>
      <news:title>OmniFaces RCE: Server-Side EL Injection Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-917</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41693/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41693: i18next-fs-backend Path Traversal Exposes Servers</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41690/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41690: 18next-http-middleware Prototype Pollution Hits Node.js/Deno</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-22, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41683: i18next-http-middleware Header Injection Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79, cwe-113</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41591/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41591 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41070/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41070: openvpn-auth-oauth2 Critical Bypass in Plugin Mode</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34354/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T19:16:10+03:00</news:publication_date>
      <news:title>Akamai Guardicore Local Privilege Escalation Hits Linux, macOS Clients</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/multiple-universities-forced-to-reschedule-final-exams-after-7zybt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:48:00+03:00</news:publication_date>
      <news:title>Canvas Cyber Incident Forces Universities to Reschedule Exams</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44500/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:17:01+03:00</news:publication_date>
      <news:title>CVE-2026-44500 — Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41588/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:16:43+03:00</news:publication_date>
      <news:title>RELATE Courseware Vulnerability: Critical Timing Attack CVE-2026-41588</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41576/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:16:40+03:00</news:publication_date>
      <news:title>Brave CMS Vulnerability: Phishing via Unescaped Contact Form</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-41575 — An IP Reputation Checker Application Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79, cwe-80</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41570/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:16:40+03:00</news:publication_date>
      <news:title>PHPUnit Vulnerability Allows RCE via INI Setting Injection</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-88, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41524/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:16:40+03:00</news:publication_date>
      <news:title>Brave CMS XSS Vulnerability: Editor Role Leads to Persistent Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41308/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-41308 — OSS PasswordPusher Allowed Unauthenticated Creation Of File- Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fake-call-history-apps-stole-payments-from-users-after-7-3-m-v0k4g/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T18:08:00+03:00</news:publication_date>
      <news:title>Fake Call History Apps Steal Payments After Millions of Play Store Downloads</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-train-hacker-arrested-pamdoora-linux-backdoo-q2hmm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:30:00+03:00</news:publication_date>
      <news:title>PamDOORa Linux Backdoor Emerges Amidst Other Cyber Developments</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44339/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:46+03:00</news:publication_date>
      <news:title>PraisonAI Vulnerability Allows Undeclared Tool Invocation (CVE-2026-44339)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-470</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44338/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-44338: PraisonAI Flask API Lacks Default Authentication</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306, cwe-668, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44337/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-44337 — PraisonAI is a multi-agent teams system. From version 2.4.1</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-20, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44334/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-44334: PraisonAI Multi-Agent System Vulnerable to Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41512/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:34+03:00</news:publication_date>
      <news:title>ai-scanner RCE: Critical JavaScript Injection in BrowserAutomation</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41507/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-41507: math-codegen RCE Exposes Apps to Arbitrary Command Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41506/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-41506 — go-git is an extensible git implementation library written</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41497/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-41497: PraisonAI Multi-Agent System Critical RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41496/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-41496: PraisonAI SQL Injection Impacts Multiple Backends</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41491/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T17:16:33+03:00</news:publication_date>
      <news:title>Dapr CVE-2026-41491: ACL Bypass via Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/shinyhunters-claims-nearly-9-000-schools-affected-by-canvas-pr69l/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T16:29:45+03:00</news:publication_date>
      <news:title>ShinyHunters Claims Canvas Breach Affects 9,000 Schools, Demands Payment</news:title><news:keywords>threat-intel, policy, government, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-69233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T16:16:35+03:00</news:publication_date>
      <news:title>CVE-2025-69233 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-367, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-66467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T16:16:35+03:00</news:publication_date>
      <news:title>CVE-2025-66467: MinIO Policy Cleanup Flaw in Apache CloudStack Grants Unauthorized Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-459</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2022-50994/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T16:16:34+03:00</news:publication_date>
      <news:title>DrayTek Vigor 2960 RCE: Unauthenticated OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pro-ukraine-bo-team-and-head-mare-hackers-appear-to-team-up-92yv0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T16:09:00+03:00</news:publication_date>
      <news:title>Pro-Ukraine Hacktivists BO Team and Head Mare Coordinate Attacks Against Russia</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8153/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T15:16:29+03:00</news:publication_date>
      <news:title>Universal Robots PolyScope Critical OS Command Injection (CVE-2026-8153)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-firm-braintrust-prompts-api-key-rotation-after-data-breac-fg7a8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:14:01+03:00</news:publication_date>
      <news:title>Braintrust Data Breach Prompts API Key Rotation After AWS Compromise</news:title><news:keywords>threat-intel, vulnerability, data-breach, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/quasar-linux-rat-steals-developer-credentials-for-software-s-csdti/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T14:00:00+03:00</news:publication_date>
      <news:title>Quasar Linux RAT Targets Developers for Supply Chain Compromise</news:title><news:keywords>threat-intel, vulnerability, identity, phishing, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8897/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:48:26+03:00</news:publication_date>
      <news:title>Cloudflare, Arctic Wolf, CrowdStrike Layoffs Signal AI&apos;s Impact on Cybersecurity Workforce</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8896/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:33:40+03:00</news:publication_date>
      <news:title>Clickfix Campaign: Social Engineering Leads to Account Lockouts</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/one-missed-threat-per-week-what-25m-alerts-reveal-about-low-9acln/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:30:00+03:00</news:publication_date>
      <news:title>Enterprise Security Ignores One Threat Per Week: 25 Million Alerts Show</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8894/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:24:22+03:00</news:publication_date>
      <news:title>AI Supply Chain Under Attack: Malicious Models on Hugging Face, ClawHub</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7650/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7650 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7475/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7475 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5341/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T13:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-5341 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7330/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T12:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-7330: WordPress Auto Affiliate Links Plugin Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5127/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T12:16:08+03:00</news:publication_date>
      <news:title>WordPress Plugin Vulnerability: CVE-2026-5127 Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-cr-tvhl0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T11:41:00+03:00</news:publication_date>
      <news:title>PamDOORa Linux Backdoor Leverages PAM for Persistent SSH Access</news:title><news:keywords>threat-intel, vulnerability, malware, identity, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-linux-dirty-frag-zero-day-gives-root-on-all-major-dist-ca61c/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T10:45:24+03:00</news:publication_date>
      <news:title>Linux &apos;Dirty Frag&apos; Zero-Day Grants Root Privileges Across Major Distros</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/zara-197-376-breached-accounts-mgzew/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T10:14:22+03:00</news:publication_date>
      <news:title>Zara Breach: ShinyHunters Leveraged Anodot Compromise for Extortion</news:title><news:keywords>data-breach, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8138/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T08:16:11+03:00</news:publication_date>
      <news:title>Tenda CX12L Stack Buffer Overflow (CVE-2026-8138) Risks Remote Exploitation</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8137/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T08:16:11+03:00</news:publication_date>
      <news:title>Totolink X5000R Buffer Overflow (CVE-2026-8137) Exposed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42279/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T08:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-42279 — solidtime is an open-source time-tracking app. In version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42277/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T08:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-42277 — Onyx is an open-source AI platform. Prior to versions</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42276/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T08:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-42276 — Onyx is an open-source AI platform. Prior to versions</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8133/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-8133: zyx0814 FilePress SQL Injection Exploited</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8132/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:25+03:00</news:publication_date>
      <news:title>CodeAstro Leave Management System SQLi (CVE-2026-8132)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8131/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-8131: SourceCodester SUP Online Shopping SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8130/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:24+03:00</news:publication_date>
      <news:title>SourceCodester SUP Online Shopping SQLi: CVE-2026-8130 Exposed</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8129/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:24+03:00</news:publication_date>
      <news:title>SourceCodester SUP Online Shopping SQL Injection (CVE-2026-8129)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43943/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:23+03:00</news:publication_date>
      <news:title>electerm RCE (CVE-2026-43943) via Malicious SFTP Filenames</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-78, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43941/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:23+03:00</news:publication_date>
      <news:title>Electerm CVE-2026-43941: Critical RCE via Malicious Terminal Links</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-88, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-43940: electerm Path Traversal Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-22, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42275/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:22+03:00</news:publication_date>
      <news:title>zrok WebDAV Vulnerability (CVE-2026-42275) Allows Remote File Access</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22, cwe-61</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42264/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:20+03:00</news:publication_date>
      <news:title>Axios Prototype Pollution: Critical Vulnerability Exposes HTTP Requests</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42261/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-42261: PromptHub SSRF Bypass Via IPv6 Mapped Addresses</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-20, cwe-693, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41900/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-41900: OpenLearnX RCE Allows Sandbox Escape and Command Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-78, cwe-94, cwe-250, cwe-284, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41646/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-41646 — Nuclei&apos;S JavaScript Protocol Runtime Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41501/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:17+03:00</news:publication_date>
      <news:title>Electerm Critical Command Injection Flaw Patched (CVE-2026-41501)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41500/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T07:16:17+03:00</news:publication_date>
      <news:title>electerm CVE-2026-41500: Critical Command Injection in Terminal Client</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8128/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T06:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-8128: SourceCodester SUP Online Shopping SQLi Exposed</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8127/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T06:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-8127 — Eladmin Improper Access Control</news:title><news:keywords>vulnerability, cve, medium-severity, improper-access-control, cwe-266, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8126/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T06:16:25+03:00</news:publication_date>
      <news:title>SourceCodester Comment System SQLi Vulnerability (CVE-2026-8126)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8125/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T05:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8125 — Code-Projects Simple Chat System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8123/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T05:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-8123 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8122/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T04:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-8122 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8121/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T04:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-8121 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8120/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T04:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-8120 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8117/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T03:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-8117 — SourceCodester Pizzafy Ecommerce System Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8116/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T03:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-8116 — Unknown Code Of The File Src/Controllers/DxtController.Ts Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8115/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T02:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8115 — Gyoridavid Short-Video-Maker Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T02:16:32+03:00</news:publication_date>
      <news:title>MAXHUB Pivot Client Vulnerability Exposes Tenant Emails, Allows DoS</news:title><news:keywords>vulnerability, cve, high-severity, cwe-327</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42880/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T02:16:32+03:00</news:publication_date>
      <news:title>Argo CD CVE-2026-42880: Critical Data Exposure from Read-Only Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200, cwe-212</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/canvas-login-portals-hacked-in-mass-shinyhunters-extortion-c-g2isi/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:36:54+03:00</news:publication_date>
      <news:title>ShinyHunters Defaces Canvas Login Portals in Mass Extortion Campaign</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8112/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-8112 — 8421bit MiniClaw Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42826/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:35+03:00</news:publication_date>
      <news:title>Azure DevOps Critical Info Disclosure: CVE-2026-42826</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41105/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-41105: Azure Notification Service SSRF Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-40214 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-282</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>OpenStack Cyborg Flaw Allows FPGA Reprogramming via Unauthenticated API</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35435/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>Azure AI Foundry M365 Flaw Allows Network Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35428/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>Azure Cloud Shell Critical Command Injection: CVE-2026-35428 Allows Spoofing</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34327/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>Microsoft Partner Center Vulnerability Allows Spoofing (CVE-2026-34327)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-610</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33844/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>Azure Managed Instance for Apache Cassandra RCE: Critical Input Validation Flaw</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33823/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>Microsoft Teams Critical Auth Flaw Exposes Info (CVE-2026-33823)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33111/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>Microsoft Copilot Chat Command Injection Vulnerability Discloses Info</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33109/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-33109: Critical RCE in Azure Managed Instance for Apache Cassandra</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32207/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:33+03:00</news:publication_date>
      <news:title>Azure Machine Learning XSS Exposes Data, Allows Spoofing</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26164/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:33+03:00</news:publication_date>
      <news:title>M365 Copilot Injection Vulnerability CVE-2026-26164 Allows Info Disclosure</news:title><news:keywords>vulnerability, cve, high-severity, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26129/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T01:16:33+03:00</news:publication_date>
      <news:title>M365 Copilot Vulnerability CVE-2026-26129 Exposes Information</news:title><news:keywords>vulnerability, cve, high-severity, cwe-138</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/iranian-government-hackers-using-chaos-ransomware-as-cover-ge3zr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:30:00+03:00</news:publication_date>
      <news:title>MuddyWater Uses Chaos Ransomware as Cover for Espionage</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8098/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8098: SQL Injection in code-projects Feedback System 1.0</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8097/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8097 — CodeAstro Online Classroom SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42449/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42449: n8n-MCP SSRF Bypasses IPv6 Checks</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42047/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42047: Inngest Exposes Environment Variables via HTTP Handler</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41692 — i18nextify is a JavaScript library that adds website</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41691/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-08T00:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41691 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8087/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-8087 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43510/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-43510: CISA&apos;s manage.get.gov Domain Manager Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-266</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-42241 — Applications Using ParquetSharp To Read Untrusted Parquet Fi Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:16:44+03:00</news:publication_date>
      <news:title>Budibase Low-Code Platform Vulnerability Allows Full Account Takeover via XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-1004</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-07</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-346, cross-site-scripting-xss, cwe-79, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8086/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-8086 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8083/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-8083: SQL Injection in SourceCodester Pharmacy System</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44742/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-44742: Postorius HTML Injection Exploited In The Wild</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:02+03:00</news:publication_date>
      <news:title>GitPython CVE-2026-44244 Allows Remote Code Execution via HooksPath Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42284/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-42284: GitPython Vulnerability Allows Remote Code Execution Via Malicious Clones</news:title><news:keywords>vulnerability, cve, high-severity, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-42215: GitPython Arbitrary Command Execution Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>NotepadNext CVE-2026-42214: Arbitrary Command Execution via Malicious Extensions</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41906/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>FreeScout CVE-2026-41906: Agent Can Expose Hidden Customer Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41905/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>FreeScout CVE-2026-41905: Server-Side Request Forgery via Redirect Logic</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41904/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-41904: FreeScout XSS Delivers Payloads via Auto-Reply</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41903/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-41903 — FreeScout is a free help desk and shared inbox built with</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41902/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T22:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-41902: FreeScout Invite Hash Vulnerability Allows Permanent Account Takeover</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8081/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T21:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8081 — Router-For-Me CLIProxyAPI Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37709/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T21:16:19+03:00</news:publication_date>
      <news:title>Snipe-IT CVE-2026-37709: Critical RCE via Insecure Permissions</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4572/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T21:03:42+03:00</news:publication_date>
      <news:title>Anonymous Claims Control Over Three Chinese Satellites</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pcpjack-credential-stealer-exploits-5-cves-to-spread-worm-li-mu956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:45:00+03:00</news:publication_date>
      <news:title>PCPJack Credential Stealer Exploits 5 CVEs for Cloud Worm-Like Spread</news:title><news:keywords>threat-intel, vulnerability, malware, data-breach, cloud, identity, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7415: Yarbo Robot Firmware Exposes Sensitive Data via Anonymous MQTT</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7414/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:15:59+03:00</news:publication_date>
      <news:title>Yarbo Firmware v2.3.9 Critical Hardcoded Credential Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7413/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T20:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7413: Hidden Backdoor Found in Yarbo Firmware</news:title><news:keywords>vulnerability, cve, high-severity, cwe-912</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/has-cisa-finally-found-its-new-leader-in-tom-parker-5seag/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T19:55:12+03:00</news:publication_date>
      <news:title>Tom Parker Tipped for CISA Leadership Role</news:title><news:keywords>threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/palo-alto-zero-day-exploited-in-campaign-bearing-hallmarks-o-23gll/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:31:12+03:00</news:publication_date>
      <news:title>Palo Alto Networks Zero-Day Exploited by Suspected Chinese State Actor</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks-rm9dt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:20:51+03:00</news:publication_date>
      <news:title>Ivanti EPMM RCE Vulnerability Exploited in Zero-Day Attacks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44264/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-44264 — Weblate is a web based localization tool. Prior to version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-80</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44263/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-44263 — Weblate is a web based localization tool. Prior to version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-203</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42011/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>gnutls CVE-2026-42011: Certificate Validation Bypass Poses MITM Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41689/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41689 — Wallos is an open-source, self-hostable personal</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41688/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41688: Wallos SSRF Bypass via DNS Rebinding</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41687/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-41687 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41650/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-41650 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-91</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41519/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-41519 — Weblate is a web based localization tool. Prior to version</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41505/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-41505: RELATE Courseware Package Suffers Predictable Token Generation Flaw</news:title><news:keywords>vulnerability, cve, high-severity, cwe-330, cwe-338</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:16:06+03:00</news:publication_date>
      <news:title>Daptin Headless CMS SQLi Puts Data at High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-carolina-man-pleads-guilty-to-doxxing-supreme-court-ju-ur6p9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T18:00:00+03:00</news:publication_date>
      <news:title>North Carolina Man Pleads Guilty to Doxxing Supreme Court Justices</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5020/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:37:59+03:00</news:publication_date>
      <news:title>Ransomware Groups Aggressively Target Healthcare Sector Globally</news:title><news:keywords>darkweb, threat-intel, ransomware, malware, darkfeed</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/claude-code-oauth-tokens-can-be-stolen-through-stealthy-mcp-1mzs9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:33:06+03:00</news:publication_date>
      <news:title>Claude Code OAuth Tokens Vulnerable to Stealthy MCP Hijacking</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6795/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:04+03:00</news:publication_date>
      <news:title>DivvyDrive Open Redirect Vulnerability CVE-2026-6795 Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41685/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-41685 — Incus is a system container and virtual machine manager.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41684/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-41684 — Incus is a system container and virtual machine manager.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41647/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-41647 — Incus is a system container and virtual machine manager.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41589/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-41589: Critical Path Traversal in Wish SSH Server SCP Middleware</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41554/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:02+03:00</news:publication_date>
      <news:title>Bricks Builder Flaw: CVE-2026-41554 Exposes Websites to Reflected XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41490/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:02+03:00</news:publication_date>
      <news:title>Dagster Orchestration Platform Vulnerable to SQL Injection via Dynamic Partitions</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14341/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T17:16:00+03:00</news:publication_date>
      <news:title>CVE-2025-14341: DivvyDrive Vulnerability Allows Excessive Allocation, Flooding</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/one-click-total-shutdown-the-patient-zero-webinar-on-kil-imnwl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:50:00+03:00</news:publication_date>
      <news:title>AI-Powered Phishing: The &apos;Patient Zero&apos; Threat to Enterprise Security</news:title><news:keywords>threat-intel, vulnerability, data-breach, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/attackers-could-exploit-ai-vision-models-using-imperceptible-h4msp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:45:53+03:00</news:publication_date>
      <news:title>Cisco Researchers Expose Pixel-Level Attacks on AI Vision Models</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:16:13+03:00</news:publication_date>
      <news:title>DivvyDrive XSS Vulnerability (CVE-2026-6002) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-80</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5791/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:16:13+03:00</news:publication_date>
      <news:title>DivvyDrive Critical CSRF Vulnerability: CVE-2026-5791 Poses Remote Attack Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5784/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:16:13+03:00</news:publication_date>
      <news:title>DivvyDrive Stored XSS Vulnerability (CVE-2026-5784) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-coding-agents-could-fuel-next-supply-chain-crisis-fmgkw/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T16:00:00+03:00</news:publication_date>
      <news:title>AI Coding Agents Fuel Next Supply Chain Crisis with &apos;TrustFall&apos; Attacks</news:title><news:keywords>threat-intel, vulnerability, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/polish-intelligence-warns-hackers-attacked-water-treatment-c-ctbni/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:38:00+03:00</news:publication_date>
      <news:title>Polish Intelligence Warns of Attacks on Water Treatment Systems</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6508/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-6508: Liderahenk Origin Validation Error Allows Critical Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42285/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-42285: Critical GoBGP Flaw Allows Remote Crash via Malformed UPDATE</news:title><news:keywords>vulnerability, cve, high-severity, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42010/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-42010: GnuTLS RSA-PSK NUL Byte Authentication Bypass</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41643/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-41643: GoBGP Remote DoS Vulnerability Exposes Network Infrastructure</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-129</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41642/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:17+03:00</news:publication_date>
      <news:title>GoBGP DoS Vulnerability (CVE-2026-41642) Patched in Version 4.4.0</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3953/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-3953: Gosoft Proticaret E-Commerce XSS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-6973/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2026-6973 — Ivanti Endpoint Manager Mobile (EPMM): Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-edge-plaintext-passwords-ics-0-days-p-7p25i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:33:00+03:00</news:publication_date>
      <news:title>Old-School Attacks Still Win: Credential Dumps and Weak Defenses Plague 2026</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-27415 — PluginUs.Net BEAR Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8889/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:09:25+03:00</news:publication_date>
      <news:title>MedusaLocker Ransomware Group Details Financial Motivation, Operational Shifts</news:title><news:keywords>israel, telegram</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/day-zero-readiness-the-operational-gaps-that-break-incident-h2q7a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T13:54:00+03:00</news:publication_date>
      <news:title>Incident Response Retainers Aren&apos;t Readiness: The Operational Gap</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/gemini-cli-vulnerability-could-have-led-to-code-execution-s-ite2y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T13:39:34+03:00</news:publication_date>
      <news:title>Gemini CLI Vulnerability: Prompt Injection Leads to Code Execution</news:title><news:keywords>threat-intel, vulnerability, ai-security, tools, securityweek</news:keywords>
    </news:news>
  </url></urlset>
