<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8263/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-8263 — Tenda AC6 15.03.06.49_multi_TDE01 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8261/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8261 — The Function SQFunctionProto::Load Of The File Squirrel/Sqob Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8260/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>D-Link DCS-935L CVE-2026-8260: Remote Buffer Overflow in HNAP Service</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8259/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8259 — Tenda AC6 2.0/15.03.06.23 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8258/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T05:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8258 — Squirrel Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8252/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T03:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8252 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-404, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8251/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8251 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8250/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8250 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8249/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8249 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T02:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8248 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-10</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-290, privilege-escalation, cwe-862, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8905/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T19:01:33+03:00</news:publication_date>
      <news:title>ShinyHunters Ransomware Disrupts Instructure Canvas, Forces Payout</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2022-50944/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:32+03:00</news:publication_date>
      <news:title>Aero CMS 0.0.1 Vulnerability Allows Authenticated PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47949/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:31+03:00</news:publication_date>
      <news:title>CyberPanel 2.1 RCE via Symlink Attack (CVE-2021-47949)</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47943/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>TextPattern CMS RCE (CVE-2021-47943) Allows Authenticated Attackers to Execute Commands</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47941/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>WordPress Plugin Survey &amp; Poll SQLi Puts Data at Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>WordPress Plugin Download From Files: Critical Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, arbitrary-file-access, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47939/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>Evolution CMS RCE (CVE-2021-47939) Allows Authenticated Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47938/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:30+03:00</news:publication_date>
      <news:title>ImpressCMS 1.4.2 RCE: Authenticated Attackers Can Execute Arbitrary Code</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47937/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>e107 CMS RCE (CVE-2021-47937) Allows Authenticated Theme Uploads to Drop Web Shells</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47936/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>OpenCATS 0.9.4 Critical RCE via Malicious Resume Uploads</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47935/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>Sentry 8.2.0 RCE: Authenticated Superusers Can Execute Arbitrary Code</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47933/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>WordPress MStore API Critical RCE: Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47932/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>WordPress TheCartPress Unauthenticated Admin Creation (CVE-2021-47932)</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:29+03:00</news:publication_date>
      <news:title>CVE-2021-47930: Unauthenticated SQLi in Balbooa Joomla Forms Builder</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47928/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:28+03:00</news:publication_date>
      <news:title>Opencart TMD Vendor System Blind SQLi Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2021-47923/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T16:16:28+03:00</news:publication_date>
      <news:title>OpenCart 3.0.3.8 Session Fixation Vulnerability (CVE-2021-47923) Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8904/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T15:39:32+03:00</news:publication_date>
      <news:title>IDF Certificate Generator Exposes Rank and Unit Creation</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T13:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-8244 — Industrial Application Software IAS Canias ERP Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8243/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8243 — An Unknown Function Of The Component JNLP Deployment Endpoin Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-320, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T12:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-8241 — Industrial Application Software IAS Canias ERP Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8235/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T10:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8235 — 8421bit MiniClaw 0.8.0/0.9.0 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T10:16:08+03:00</news:publication_date>
      <news:title>EFM ipTIME A8004T Vulnerability: Remote Stack-Based Buffer Overflow Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8233 — Improper Access Control</news:title><news:keywords>vulnerability, cve, medium-severity, improper-access-control, cwe-266, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8231/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8231 — CodeAstro Online Catering Ordering System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:30:48+03:00</news:publication_date>
      <news:title>Europol Under Fire for Shadow IT System Exposing Sensitive Data</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8230/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8230 — Wavlink NU516U1 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8229/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8229 — Wavlink NU516U1 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8228/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8228 — Wavlink NU516U1 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8227/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8227 — The Function WzdapMesh Of The File /Cgi-Bin/Adm.Cgi Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8226/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8226 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8225/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-8225 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8224/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T06:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-8224 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T06:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8223 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T06:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8222 — Open5GS Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8217/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T05:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8217 — Industrial Application Software IAS Canias ERP Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8216/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T04:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8216: Canias ERP Remote Authentication Bypass Exposes Critical Systems</news:title><news:keywords>vulnerability, cve, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T04:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8215 — The Function IasRequestFileEvent Of The Component RMI Interf Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T04:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-8214 — Industrial Application Software IAS Canias ERP Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8213 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8212 — OSGeo Gdal Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-119, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8211 — Codelibs Fess Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45184/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T02:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-45184 — Kdenlive before 26.04.1 allows dangerous proxy parameters</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45181/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T01:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-45181 — Hex-Rays IDA Pro 9.2 and 9.3 before 9.3sp2 does not block</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T00:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-8210 — Aandrew-Me Tgpt Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8195/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8195 — JeecgBoot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8194/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8194 — OsTicket Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42606/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>AzuraCast CVE-2026-42606: Unauthenticated Account Takeover Via X-Forwarded-Host Poisoning</news:title><news:keywords>vulnerability, cve, high-severity, cwe-640</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42605/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:30+03:00</news:publication_date>
      <news:title>AzuraCast RCE via Path Traversal (CVE-2026-42605)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42576/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42576 — Any Workflow That Initializes The APK Database And Fetches R Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-704</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42575: apko Container Builder Silently Accepts Malicious Packages</news:title><news:keywords>vulnerability, cve, high-severity, cwe-345, cwe-494</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42574/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42574: apko Symlink Traversal Allows Host Path Writes</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42569/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:29+03:00</news:publication_date>
      <news:title>phpVMS Critical Vulnerability (CVE-2026-42569) Allows Unauthenticated Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-284, cwe-306, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42562/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:16:28+03:00</news:publication_date>
      <news:title>Plainpad CVE-2026-42562 Allows Low-Privilege Admin Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-09</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-347, privilege-escalation, cwe-284, cwe-639, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/jdownloader-site-hacked-to-replace-installers-with-python-ra-mdbd4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:27:58+03:00</news:publication_date>
      <news:title>JDownloader Site Compromised, Distributes Python RAT Malware</news:title><news:keywords>threat-intel, data-breach, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-8193 — Some Unknown Processing Of The File Config/Dompdf.Php Of The Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8192/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-8192 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8191/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T22:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-8191 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8190/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T21:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-8190 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8189/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T20:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8189 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8188/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T19:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8188 — Wavlink NU516U1 M16U1_V240425 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8198/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T16:16:43+03:00</news:publication_date>
      <news:title>CVE-2026-8198 — Authentication Bypass</news:title><news:keywords>vulnerability, cve, medium-severity, authentication-bypass, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8186/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T15:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-8186 — Open5GS Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-119, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8187/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T14:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-8187 — Open5GS Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400, cwe-404</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T14:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-8185 — UGREEN CM933 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3828/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:09+03:00</news:publication_date>
      <news:title>Hikvision Switches: Authenticated RCE in Discontinued Products</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32683/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-32683 — Some EZVIZ products utilize older versions of cloud feature</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1749/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T12:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-1749 — Some HikCentral Professional Versions. This Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cpanel-whm-release-fixes-for-three-new-vulnerabilities-pa-2ycdm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T10:16:00+03:00</news:publication_date>
      <news:title>cPanel, WHM Patch Three New Vulnerabilities: Privilege Escalation, RCE Risks</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42560/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T09:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-42560: Critical Patreon OAuth Flaw Merges User Identities</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42301/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42301: Malicious Code Execution Via pyp2spec RPM Generation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42296/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42296: Argo Workflows Bypass Grants Host Network Access</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41311/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T07:16:21+03:00</news:publication_date>
      <news:title>LiquidJS CVE-2026-41311: DoS Vulnerability in Template Engine</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7652/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T06:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-7652 — The LatePoint plugin for WordPress is vulnerable to Account</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-640</news:keywords>
    </news:news>
  </url></urlset>
