<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/congress-punts-fisa-renewal-to-june-3xl7y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:31:00+03:00</news:publication_date>
      <news:title>Congress Punts FISA Renewal to June, Raising Surveillance Questions</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7435/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:16:34+03:00</news:publication_date>
      <news:title>SSCMS v7.4.0 SQLi: High-Severity Database Compromise Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6539/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-6539 — The Find Results Panel Handler That Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-134</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-4503: IBM Langflow Desktop Exposes User Images via IOR</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4502/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-4502 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3346/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-3346 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3340/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-3340 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28532/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-28532 — Integer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, integer-overflow, cwe-125, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-earning-millions-from-hijacked-cargo-fbi-says-c4fh5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T23:22:00+03:00</news:publication_date>
      <news:title>Hackers Hijack Cargo Worth Millions Through System Compromises</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7429/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T23:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-7429 — The STL Processing Endpoint That Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-30</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, out-of-bounds-1, cwe-125, path-traversal, cwe-23, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7461/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T22:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-7461: Amazon ECS Agent Vulnerability Allows SYSTEM Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40904/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T22:16:10+03:00</news:publication_date>
      <news:title>Chartbrew CVE-2026-40904 Exposes Cross-Project Data in v4.9.0</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40603/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T22:16:10+03:00</news:publication_date>
      <news:title>CVE-2026-40603 — Chartbrew is an open-source web application that can</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40601/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T22:16:10+03:00</news:publication_date>
      <news:title>Chartbrew CVE-2026-40601: Unauthenticated Data Exposure</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40600/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T22:16:09+03:00</news:publication_date>
      <news:title>Chartbrew CVE-2026-40600: Cross-Project SharePolicy Manipulation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40595/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T22:16:09+03:00</news:publication_date>
      <news:title>Chartbrew CVE-2026-40595: Unauthenticated Data Exposure for Hidden Charts</news:title><news:keywords>vulnerability, cve, high-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35514/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T22:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-35514 — Chartbrew is an open-source web application that can</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3833/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-3833 — Gnutls Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-178</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-36763/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-36763 — The /Api/Blade-Desk/Notice/Submit Endpoint Of SpringBlade Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-36761/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-36761 — The /Msg/MsgInner/Save Endpoint Of JeeSite Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33845/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T21:16:28+03:00</news:publication_date>
      <news:title>GnuTLS Vulnerability CVE-2026-33845: Underflow Leads to Remote Exploitation</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4555/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T21:05:57+03:00</news:publication_date>
      <news:title>Operation PowerOFF&apos;s DDoS Honeypot Snares Attackers</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71284/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T20:16:25+03:00</news:publication_date>
      <news:title>CVE-2025-71284: Critical RCE in Synway SMG Gateway Management Software</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-51846/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T20:16:25+03:00</news:publication_date>
      <news:title>CVE-2025-51846: CryptPad Instance Denial-of-Service via WebSocket Flood</news:title><news:keywords>vulnerability, cve, high-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2022-50993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T20:16:24+03:00</news:publication_date>
      <news:title>Weaver E-office RCE: Unauthenticated File Upload Exploit Active</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2022-50992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T20:16:24+03:00</news:publication_date>
      <news:title>Weaver E-cology Arbitrary File Read via XML-RPC (CVE-2022-50992)</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/zambia-cancels-global-digital-freedoms-conference-days-befor-5z7o3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T20:11:00+03:00</news:publication_date>
      <news:title>Zambia Cancels Digital Freedoms Conference Over Security, Dialogue Concerns</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trump-s-cyber-ambassador-nominee-advances-to-full-senate-vot-27elz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:34:00+03:00</news:publication_date>
      <news:title>Trump&apos;s Cyber Ambassador Nominee Advances to Full Senate Vote</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4553/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:32:51+03:00</news:publication_date>
      <news:title>AI Agent Wipes Production Database and Backups for PocketOS</news:title><news:keywords>identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attac-6itos/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:32:18+03:00</news:publication_date>
      <news:title>FBI Warns of Cyber-Enabled Cargo Theft Surge, $725M Losses Projected</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pytorch-lightning-compromised-in-pypi-supply-chain-attack-to-u86dg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:31:00+03:00</news:publication_date>
      <news:title>PyTorch Lightning Compromised in PyPI Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/france-investigates-15-year-old-over-alleged-hack-of-nationa-qjps2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:28:00+03:00</news:publication_date>
      <news:title>France Investigates Teen Over National ID Agency Data Breach</news:title><news:keywords>threat-intel, data-breach, government, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5174/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:16:44+03:00</news:publication_date>
      <news:title>MOVEit Automation Privilege Escalation (CVE-2026-5174)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4670/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:16:44+03:00</news:publication_date>
      <news:title>MOVEit Automation Critical Authentication Bypass (CVE-2026-4670)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4552/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T18:20:19+03:00</news:publication_date>
      <news:title>AI Bots Drive 12X Surge in Daily Attacks, Over Half of Web Traffic is Automated</news:title><news:keywords>threat-intel, the-independent</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7500/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T18:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7500 — When Keycloak is started with</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-425</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T17:16:36+03:00</news:publication_date>
      <news:title>Pallets Click CVE-2026-7246: Command Injection from Unprivileged Accounts</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7163/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T17:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-7163 — The Assisted-Service REST API, An Optional Assisted Installe Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-312</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2892/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T17:16:29+03:00</news:publication_date>
      <news:title>Otter Blocks WordPress Plugin Vulnerable to Purchase Bypass (CVE-2026-2892)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-84jfh/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:55:00+03:00</news:publication_date>
      <news:title>Fake Cell Towers and Sneaky Installers: New Threats Emerge</news:title><news:keywords>threat-intel, vulnerability, cloud, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/moldova-s-health-insurance-agency-reports-possible-data-leak-d0t29/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:37:00+03:00</news:publication_date>
      <news:title>Moldova Health Insurance Agency Reports Possible Data Leak After Cyberattack</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7402/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:16:06+03:00</news:publication_date>
      <news:title>MeWare PDKS Flooding Vulnerability: CVE-2026-7402 Impacts Time &amp; Attendance Systems</news:title><news:keywords>vulnerability, cve, high-severity, cwe-799</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7399/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:16:06+03:00</news:publication_date>
      <news:title>MeWare PDKS Authorization Bypass (CVE-2026-7399) Exposes High-Risk Privilege Abuse</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7382/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-7382 — MeWare Software Development Inc. PDKS Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-359</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-python-backdoor-uses-tunneling-service-to-steal-browser-ei1dl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:36:00+03:00</news:publication_date>
      <news:title>DEEP#DOOR Python Backdoor Disables Security Controls for Credential Theft</news:title><news:keywords>threat-intel, vulnerability, malware, cloud, microsoft, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:16:24+03:00</news:publication_date>
      <news:title>JetBrains IntelliJ IDEA Vulnerability Allows Arbitrary File Reading</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-41940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2026-41940 — WebPros cPanel &amp; WHM and WP2 (WordPress Squared): WebPros cPanel &amp; WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/enocean-smartserver-flaws-expose-buildings-to-remote-hacking-q04hq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T14:57:31+03:00</news:publication_date>
      <news:title>EnOcean SmartServer Vulnerabilities Enable Building System Hacking</news:title><news:keywords>threat-intel, vulnerability, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/etherrat-distribution-spoofing-administrative-tools-via-gith-mmur8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T14:30:00+03:00</news:publication_date>
      <news:title>EtherRAT Campaign Spoofs Admin Tools via GitHub Facades</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-whm-vulnerability-exploited-as-zero-day-fo-s3kuu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T14:10:30+03:00</news:publication_date>
      <news:title>cPanel &amp; WHM Zero-Day Exploited for Months, Granting Admin Access</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6498/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-6498 — The Five Star Restaurant Reservations plugin for WordPress</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-345</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42800/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-42800: High-Severity Null Pointer Dereference in ASR Lapwing_Linux</news:title><news:keywords>vulnerability, cve, high-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-linux-copy-fail-vulnerability-enables-root-access-on-m-avzxo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T12:24:00+03:00</news:publication_date>
      <news:title>Linux &apos;Copy Fail&apos; Vulnerability Grants Root Access</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42799/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T12:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-42799: ASR Kestrel Out-of-Bounds Read Flaw Exposes Systems</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22070/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T12:16:02+03:00</news:publication_date>
      <news:title>ColorOS Assistant CVE-2026-22070: Unauthenticated Path Traversal Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sandhills-medical-says-ransomware-breach-affects-170-000-1xudy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T11:35:59+03:00</news:publication_date>
      <news:title>Sandhills Medical Discloses Inc Ransomware Breach Affecting 170,000 Patients</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6521/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6521 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6520/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6520 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6519/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6519 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5657/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5657 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-415</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5655/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5655 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5654/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5654 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5653/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5653 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5409 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5408 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5407 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5406/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5406 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5402/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>Wireshark TLS Dissector Heap Overflow (CVE-2026-5402) Enables DoS, RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5401/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5401 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5299/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5299 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41226/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41226 — Open Redirect</news:title><news:keywords>vulnerability, cve, medium-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enab-bv4bq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:07:00+03:00</news:publication_date>
      <news:title>Google Gemini CLI RCE: CVSS 10 Flaw Exposes CI/CD to Attack</news:title><news:keywords>threat-intel, vulnerability, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7379/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7379 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-401</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7378 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7376 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7375/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-7375 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6868/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6868 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13030/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:14+03:00</news:publication_date>
      <news:title>CVE-2025-13030: django-mdeditor Vulnerable to Code Execution via Image Upload</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8854/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T07:18:04+03:00</news:publication_date>
      <news:title>Iranian Group Claims 30TB Breach of Israeli Company IMCO Industries</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T06:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7470: Tenda 4G300 Router Vulnerable to Remote Stack Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7469/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-7469 — Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7468/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T04:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7468: Improper Access Control Flaw in 1024-lab smart-admin</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-266, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7447/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T04:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7447 — SourceCodester Pet Grooming Management Software SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7446/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T03:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7446: VetCoders mcp-server-semgrep OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7445/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T03:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7445 — ZachHandley ZMCPTools Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7443/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7443: BurtTheCoder mcp-dnstwist OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7420/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7420: UTT HiPER 1250GW Buffer Overflow Exploitable Remotely</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7419/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>UTT HiPER 1250GW CVE-2026-7419: Remote Buffer Overflow Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/official-sap-npm-packages-compromised-to-steal-credentials-uiepq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:43:44+03:00</news:publication_date>
      <news:title>SAP npm Packages Compromised in Supply-Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/house-approves-spy-program-on-second-attempt-senate-fate-mu-3dg2q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:41:00+03:00</news:publication_date>
      <news:title>House Renews Section 702 FISA, Senate Fate Uncertain</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7418/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>UTT HiPER 1250GW: High-Severity Buffer Overflow (CVE-2026-7418)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7417/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>Algovate xhs-mcp SSRF Vulnerability (CVE-2026-7417) Publicly Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7416/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>PolarVista xcode-mcp-server Suffers High-Severity OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7410/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7410 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7409 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7408 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7407 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7404/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7404: mcpo-simple-server Vulnerability Exposes Data via Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7403/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7403 — Geldata Gel-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1858/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-1858 — wget2 accepts a server certificate with incorrect Key Usage</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/researchers-built-a-chatbot-that-only-knows-the-world-before-cchcy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:58:30+03:00</news:publication_date>
      <news:title>Researchers Build LLM Limited to Pre-1931 Knowledge for Bias Study</news:title><news:keywords>malware, threat-intel, ransomware, data-breach, cloud, identity, ai-security, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/us-china-partner-on-scam-center-takedown-in-dubai-17mq8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:51:00+03:00</news:publication_date>
      <news:title>US, China Partner on Dubai Scam Center Takedown</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-exploit-rce-flaws-in-qinglong-task-scheduler-for-cry-1kr1n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:50:35+03:00</news:publication_date>
      <news:title>Qinglong Task Scheduler Exploited for Cryptomining via RCE Flaws</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, cloud, identity, tools, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7426: FreeRTOS-Plus-TCP IPv6 RA Heap Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34965/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-34965: Cockpit CMS RCE via PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25318: Tenda Router Vulnerability Allows DNS Hijacking</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>Tenda Routers: CVE-2018-25317 Allows Unauthenticated DNS Hijacking</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25316: Tenda Router Flaw Exposes DNS Hijacking Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25315: Alloksoft Video Joiner Buffer Overflow Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25314: Alloksoft WMV Converter Buffer Overflow Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25308/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:26+03:00</news:publication_date>
      <news:title>BuddyPress RCE: Authenticated Users Can Delete Arbitrary Files</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25307/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:26+03:00</news:publication_date>
      <news:title>SysGauge Pro 4.6.12 Vulnerability Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>Free Download Manager CVE-2018-25304: Local Buffer Overflow Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25303/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25303: Allok Video to DVD Burner Stack Overflow</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25302/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25302: Allok AVI to DVD Converter Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25301/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25301: Easy MPEG to DVD Burner Local Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25300/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25300: XATABoost CMS SQL Injection Allows Unauthenticated Data Extraction</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25299/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25299: Prime95 Local Buffer Overflow Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/reverse-engineering-with-ai-unearths-high-severity-github-bu-htoqy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:08:17+03:00</news:publication_date>
      <news:title>AI Reverse Engineering Unearths High-Severity GitHub Bug</news:title><news:keywords>threat-intel, tools, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-29</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-862, improper-access-control, cwe-266, cwe-269, cwe-284, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-finds-38-security-flaws-in-electronic-health-record-platf-g54ev/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:32:42+03:00</news:publication_date>
      <news:title>AI Spots 38 Critical Flaws in OpenEMR Healthcare Platform</news:title><news:keywords>threat-intel, tools, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7466/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:27+03:00</news:publication_date>
      <news:title>AgentFlow RCE Vulnerability (CVE-2026-7466) Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7439/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7439 — AgentFlow&apos;s local web API accepts non-JSON content types on</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7424/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7424: FreeRTOS-Plus-TCP DHCPv6 Vulnerability Leads to DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7423/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7423 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7422 — Insufficient packet validation in FreeRTOS-Plus-TCP before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7398/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7398: Path Traversal in BioinfoMCP Upload Endpoint</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7397/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7397 — NousResearch Hermes-Agent Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-59, cwe-61</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41499/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-41499 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-124, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>Wazuh CVE-2026-30893: Critical Path Traversal to RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-28221 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27105/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-27105 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-26206 — Wazuh is a free and open source platform used for threat</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307, cwe-362, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7396/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7396 — NousResearch Hermes-Agent Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7394/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7394 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5712/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>IdentityIQ CVE-2026-5712: Authenticated Users Can Edit Roles</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-26204 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-124, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7393 — SourceCodester Pizzafy Ecommerce System Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7392/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7392 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7391/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7391 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6915/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-6915 — An authorization flaw in the user management command could</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-6914 — Computing the MD5 checksum of a malformed BSON object under</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-0206 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-0205 — SonicOS Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>SonicOS Access Control Bypass (CVE-2026-0204) Rated High Severity</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306, cwe-1390</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sap-npm-packages-compromised-by-mini-shai-hulud-credential-4sc03/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:26:00+03:00</news:publication_date>
      <news:title>SAP npm Packages Compromised by &quot;Mini Shai-Hulud&quot; Credential Stealing Malware</news:title><news:keywords>threat-intel, vulnerability, malware, cloud, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7389/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7389: EyouCMS SQL Injection Vulnerability Exposed</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7388/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7388 — A weakness has been identified in EyouCMS up to 1.7.9.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7386/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7386: fatbobman mail-mcp-bridge Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6849/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:28+03:00</news:publication_date>
      <news:title>Pardus OS My Computer Vulnerability Allows OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5166/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-5166: Critical Path Traversal in TUBITAK Pardus Software Center</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42198/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:25+03:00</news:publication_date>
      <news:title>pgjdbc Client-Side DoS: Malicious Servers Can Exhaust CPU via SCRAM-SHA-256</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:25+03:00</news:publication_date>
      <news:title>cPanel &amp; WHM Critical Authentication Bypass (CVE-2026-41940)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cpanel-whm-emergency-update-fixes-critical-auth-bypass-bug-hr31j/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:51:44+03:00</news:publication_date>
      <news:title>cPanel, WHM Emergency Patch Fixes Critical Auth Bypass</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/european-commission-accuses-meta-of-breaching-child-safety-r-ozmby/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:47:00+03:00</news:publication_date>
      <news:title>European Commission Accuses Meta of Child Safety Breaches Under DSA</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vect-2-0-ransomware-acts-as-wiper-thanks-to-design-error-oj9u5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:23:53+03:00</news:publication_date>
      <news:title>Vect 2.0 Ransomware Acts as Wiper Due to Design Error</news:title><news:keywords>threat-intel, tools, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-7384 — Ezequiroga Mcp-Bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea3 Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5161/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-5161: Pardus About Suffers High-Severity Symlink Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5141/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-5141: Pardus Software Center Vulnerability Allows Privileged Process Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-266, cwe-269, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:06+03:00</news:publication_date>
      <news:title>Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-123</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41220/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:05+03:00</news:publication_date>
      <news:title>Acronis DLP, Cyber Protect Agent Vulnerable to Local Privilege Escalation (CVE-2026-41220)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25852/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-25852 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-ian3i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:43:00+03:00</news:publication_date>
      <news:title>DPRK Uses AI-Inserted npm Malware, Targeting Developers</news:title><news:keywords>threat-intel, vulnerability, malware, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/swiss-police-arrest-10-suspected-members-of-nigeria-linked-c-2qt9f/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:15:00+03:00</news:publication_date>
      <news:title>Black Axe: Swiss Police Arrest 10 Suspected Members</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/learning-from-the-vercel-breach-shadow-ai-oauth-sprawl-3uywm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T16:05:14+03:00</news:publication_date>
      <news:title>Vercel Breach Highlights OAuth App Risks and Shadow AI Threats</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/lotus-wiper-attack-targeted-venezuelan-energy-firms-utiliti-hhfv0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T16:00:00+03:00</news:publication_date>
      <news:title>Lotus Wiper Targets Venezuelan Energy, Utilities with Sophisticated LotL</news:title><news:keywords>threat-intel, tools, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-fixes-rce-flaw-that-gave-access-to-millions-of-privat-xvj23/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:41:17+03:00</news:publication_date>
      <news:title>GitHub RCE Flaw Could Have Exposed Millions of Private Repositories</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-how-to-automate-exposure-validation-to-match-the-sp-ynxh4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:02:00+03:00</news:publication_date>
      <news:title>AI Automates Attacks: Autonomous Agents Target Active Directory in Minutes</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:00:00+03:00</news:publication_date>
      <news:title>Unidentified RMM Tool Exploited in Active Attacks Against Israeli Organizations</news:title><news:keywords>incd, israel, advisory, alert</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/what-to-look-for-in-an-exposure-management-platform-and-wha-zhxzs/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T14:30:00+03:00</news:publication_date>
      <news:title>Exposure Management Platforms Fall Short: Context is Key, Not Just Counts</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day-47f0x/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T13:29:31+03:00</news:publication_date>
      <news:title>CISA Mandates Urgent Patching for Windows Zero-Day Exploited in Attacks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-authentication-vulnerability-identified-up-10tps/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:37:00+03:00</news:publication_date>
      <news:title>Critical cPanel Authentication Flaw Exposes Servers</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4019/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-4019 — The Complianz – GDPR/CCPA Cookie Consent plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-42412 — WeDevs WP User Frontend Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-10503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:23+03:00</news:publication_date>
      <news:title>CVE-2025-10503 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T11:16:18+03:00</news:publication_date>
      <news:title>SureForms Pro Vulnerability CVE-2026-42377 Exposes Access Control Flaws</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8849/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T10:02:16+03:00</news:publication_date>
      <news:title>Cyber News - Erez Dasa: Unattributed Foreign Login Triggered Investigation</news:title><news:keywords>israel, cybersafe</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8847/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T09:02:28+03:00</news:publication_date>
      <news:title>Vect Ransomware: Bug Turns Encryption into Irreversible Data Wiper</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35155/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T08:16:04+03:00</news:publication_date>
      <news:title>Dell iDRAC10 Vulnerability: Low-Privilege Race Condition Grants High Access</news:title><news:keywords>vulnerability, cve, high-severity, race-condition, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42615/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:41+03:00</news:publication_date>
      <news:title>GCHQ CyberChef XSS Vulnerability (CVE-2026-42615) Identified</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23773/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-23773 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-42167: ProFTPD mod_sql RCE Via Log Expansion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7319/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-7319: Path Traversal in elinsky execution-system-mcp Poses Remote Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7318 — Elie Mcp-Project Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7317 — Grav CMS Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7316: Aider-mcp Command Injection Exposes AI Dev Workflows</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7315: eiceblue spire-pdf-mcp-server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7314: eiceblue spire-doc-mcp-server Path Traversal Publicly Exploited</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7306/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7306 — Xuxueli Xxl-Job Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-320, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-7305 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:49+03:00</news:publication_date>
      <news:title>Outline Insecure Direct Object Reference (CVE-2026-41649) Exposes Documents</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-33467 — Improper Verification of Cryptographic Signature (CWE-347)</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/spy-agency-officials-say-job-loss-anxiety-moving-fast-safe-x3o7u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T00:43:20+03:00</news:publication_date>
      <news:title>NGA Grapples with AI Workforce Overhaul and Job Anxiety</news:title><news:keywords>threat-intel, policy, government, microsoft, tools</news:keywords>
    </news:news>
  </url></urlset>
