<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/2026-05-18-nvd-CVE-2026-47090/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:56:00+03:00</news:publication_date>
      <news:title></news:title>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8957/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:55:27+03:00</news:publication_date>
      <news:title>Dozens of Israeli Business Sites Defaced by Iranian Actors</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20240/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-20240 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:16:26+03:00</news:publication_date>
      <news:title>Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20238/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4602/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T21:02:25+03:00</news:publication_date>
      <news:title>LΣҒΔ𝕽ΩLL 🇮🇱 Exposes Sophisticated Social Engineering Tactics</news:title><news:keywords>telegram</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ftc-warns-12-major-tech-firms-of-violating-take-it-down-act-gm2ex/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:29:00+03:00</news:publication_date>
      <news:title>FTC Warns 12 Major Tech Firms Over Take It Down Act Violations</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9101/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-9101 — Prototype pollution in csv parsing logic during import can</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9100/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-9100 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-1285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9087/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-9087 — Keycloak Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7613/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:29+03:00</news:publication_date>
      <news:title>PixelYourSite WordPress Plugin Vulnerable to Stored XSS (CVE-2026-7613)</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20223/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:20+03:00</news:publication_date>
      <news:title>Cisco Secure Workload Critical RCE: Unauthenticated Site Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20206 — The BrowserBot Component Of Cisco ThousandEyes Enterprise Ag Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20199/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20199 — The SSL Certificate Handling Of Cisco ThousandEyes Virtual A Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20171/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-20171 — The Border Gateway Protocol (BGP)&amp;Nbsp;Enforce-First-As Feat Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-670</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agen-alb2u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T20:06:54+03:00</news:publication_date>
      <news:title>Microsoft Open-Sources RAMPART and Clarity for AI Agent Security</news:title><news:keywords>threat-intel, vulnerability, microsoft, ai-security, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukraine-probes-teen-suspect-in-cyber-theft-scheme-targeting-vda36/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:33:00+03:00</news:publication_date>
      <news:title>Ukraine Probes Teen Suspect in US E-commerce Cyber Theft</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/discord-migrates-all-users-to-end-to-end-encryption-by-defau-qoz09/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:29:00+03:00</news:publication_date>
      <news:title>Discord Enables End-to-End Encryption by Default</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8598/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>ZKTeco CCTV Cameras: Unauthenticated Port Exposes Critical Data (CVE-2026-8598)</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8488/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8488 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8487/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8487 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-276</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8486/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-8486 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5783/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:26+03:00</news:publication_date>
      <news:title>Beyaz CityPLus Reflective XSS (CVE-2026-5783) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4293/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-4293 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-32750/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:24+03:00</news:publication_date>
      <news:title>Dell PowerFlex Manager: Directory Listing Vulnerability Exposes Information</news:title><news:keywords>vulnerability, cve, high-severity, cwe-548</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-7346/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:16:23+03:00</news:publication_date>
      <news:title>CVE-2023-7346 — Ledger Bitcoin app versions 2.1.0 and 2.1.1 contain an</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-682</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/grafana-breach-caused-by-missed-token-rotation-after-tanstac-ijv20/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T18:46:37+03:00</news:publication_date>
      <news:title>Grafana Breach: Missed Token Rotation After TanStack Supply Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-powered-app-attacks-are-faster-more-frequent-and-harder-q8cvf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:37:36+03:00</news:publication_date>
      <news:title>AI-Powered Attacks Accelerate Mobile App Exploitation</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-takes-down-malware-signing-service-behind-ransomwa-ywtug/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:36:44+03:00</news:publication_date>
      <news:title>Microsoft Disrupts Fox Tempest Malware-Signing-as-a-Service</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8485/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:17:04+03:00</news:publication_date>
      <news:title>CVE-2026-8485 — Progress Software MOVEit Automation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24425/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:16:38+03:00</news:publication_date>
      <news:title>Twig Sandbox Bypass (CVE-2026-24425) Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22554/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-22554: MediaInfoLib Heap-Based Buffer Overflow Risks High Impact</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21836/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-21836 — The HCL DominoIQ RAG feature is affected by a Broken Access</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/identity-alone-isn-t-enough-why-device-security-has-to-shar-grj7u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:02:12+03:00</news:publication_date>
      <news:title>Identity Alone Isn&apos;t Enough: Device Security Must Share the Load</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-5950 — BIND 9 Versions Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-606</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5947/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:40+03:00</news:publication_date>
      <news:title>BIND DNS Vulnerability CVE-2026-5947: Race Condition Leads to Use-After-Free</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-362, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5946/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:40+03:00</news:publication_date>
      <news:title>BIND 9 Assertion Failure: CVE-2026-5946 Impacts DNS Handling</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-125, cwe-617, cwe-754, cwe-843</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45584/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:37+03:00</news:publication_date>
      <news:title>Microsoft Defender Heap Buffer Overflow Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45443/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-45443 — ADD-ONS.ORG PDF For Elementor Forms + Drag And Drop Template Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:34+03:00</news:publication_date>
      <news:title>Azure Portal Windows Admin Center Link Following Vulnerability (CVE-2026-42834)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:32+03:00</news:publication_date>
      <news:title>YITH WooCommerce Product Add-Ons Blind SQLi (CVE-2026-42383)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41091/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:29+03:00</news:publication_date>
      <news:title>Microsoft Defender Vulnerability CVE-2026-41091: Local Privilege Escalation via Improper Link Handling</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3593/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-3593: BIND 9 DNS-over-HTTPS Use-After-Free Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3592/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-3592 — BIND 9 Versions Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-408</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3039/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-3039: BIND Servers Face High-Severity Memory Exhaustion Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-771</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29518/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:17+03:00</news:publication_date>
      <news:title>Rsync CVE-2026-29518: TOCTOU Flaw Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27405/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-27405 — Magepeople Inc. WpBookingly Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24573/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-24573 — Themeisle Visualizer Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-11954/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:16:14+03:00</news:publication_date>
      <news:title>WISECP CSRF Vulnerability (CVE-2025-11954) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/texas-florida-top-list-of-states-reporting-millions-of-doll-qcrtp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:04:00+03:00</news:publication_date>
      <news:title>Crypto ATM Scams Cost Millions in Texas, Florida</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/anthropic-silently-patches-claude-code-sandbox-bypass-371rj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:00:00+03:00</news:publication_date>
      <news:title>Anthropic Patches Claude Code Sandbox Bypass with Prompt Injection Risk</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/drupal-critical-update-to-fix-bug-with-high-exploitation-ris-df3hc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:52:29+03:00</news:publication_date>
      <news:title>Drupal Critical Update: Exploitation Risk Hours After Disclosure</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webworm-deploys-echocreep-and-graphworm-backdoors-using-disc-n177a/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:51:43+03:00</news:publication_date>
      <news:title>Webworm Leverages Discord and MS Graph API for C2</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:48:28+03:00</news:publication_date>
      <news:title>Cyera Acquires 5-Month-Old Cybersecurity Startup for $50 Million</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-confirms-being-hacked-by-teampcp-says-customer-data-mrls1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:21:00+03:00</news:publication_date>
      <news:title>GitHub Confirms Breach by TeamPCP, Customer Data Unaffected</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31973/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:16:20+03:00</news:publication_date>
      <news:title>CVE-2025-31973 — HCL BigFix Service Management (SM) is susceptible to  a</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/senator-presses-cisa-for-answers-about-alleged-github-reposi-wtzos/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:11:00+03:00</news:publication_date>
      <news:title>CISA Pressed on Nightwing GitHub Leak by Senator Hassan</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/agent-ai-is-coming-are-you-ready-f9lb9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T14:58:00+03:00</news:publication_date>
      <news:title>Agent AI Era Exposes Massive Identity Gaps, Orchid Security Warns</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/over-320-npm-packages-hit-by-fresh-mini-shai-hulud-supply-ch-xgvox/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T14:06:49+03:00</news:publication_date>
      <news:title>Mini Shai-Hulud: 320+ NPM Packages Hit by Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/caught-off-guard-securing-ai-after-it-hits-production-lyk30/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T14:00:00+03:00</news:publication_date>
      <news:title>Enterprises Rushing AI to Production, Security Left Behind</news:title><news:keywords>threat-intel, vulnerability, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/typosquatting-is-no-longer-a-user-problem-it-s-a-supply-cha-c1lap/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:30:00+03:00</news:publication_date>
      <news:title>Typosquatting Evolves: AI-Generated Lookalikes Target Supply Chains</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9064/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-9064: 389-ds-base Denial-of-Service Vulnerability Exposes LDAP Servers</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-6728 — The Slider Revolution plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44933/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-44933: Plugin Script Vulnerability Allows Host Binary Execution with Root Privileges</news:title><news:keywords>vulnerability, cve, high-severity, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41054/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41054: Local Privilege Escalation in haveged</news:title><news:keywords>vulnerability, cve, high-severity, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35070/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-35070 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tracking-tamperedchef-clusters-via-certificate-and-code-reus-bqfd9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T13:00:46+03:00</news:publication_date>
      <news:title>TamperedChef Malware Uses Trojanized Apps and Malvertising for Stealthy Delivery</news:title><news:keywords>threat-intel, apt, malware, research, unit-42</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6405/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T11:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-6405 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5200/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T11:16:22+03:00</news:publication_date>
      <news:title>AcyMailing WordPress Plugin Vulnerable to Admin Takeover (CVE-2026-5200)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-confirms-breach-of-3-800-repos-via-malicious-vscode-e-17vmp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T11:14:08+03:00</news:publication_date>
      <news:title>GitHub Confirms 3,800 Repos Breached via Malicious VSCode Extension</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-shares-mitigation-for-yellowkey-windows-zero-day-dda5p/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:31:15+03:00</news:publication_date>
      <news:title>Microsoft Issues YellowKey Mitigation for BitLocker Zero-Day</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6566/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6566 — The Photo Gallery, Sliders, Proofing and Themes – NextGEN</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47784/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-47784: Memcached Timing Side Channel Exposes Passwords</news:title><news:keywords>vulnerability, cve, high-severity, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47783/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:15+03:00</news:publication_date>
      <news:title>memcached Timing Side Channel (CVE-2026-47783) Allows SASL Credential Guessing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44392/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-44392 — Missing authorization vulnerability exists in Movable Type.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2955/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-2955 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8954/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T10:03:54+03:00</news:publication_date>
      <news:title>Holidays and Long Weekends: Prime Time for Cyber Attacks</news:title><news:keywords>israel, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9057/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:23+03:00</news:publication_date>
      <news:title>Talend Administration Center: Broken Access Control Allows URL Modification</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9056/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-9056 — The Talend Administration Center Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7522/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7522: WordPress Advanced Database Cleaner Plugin Vulnerable to LFI</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-98</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5075/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-5075 — The All in One SEO plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:33:40+03:00</news:publication_date>
      <news:title>GitHub Investigates Source Code Theft Claims by TeamPCP</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2326/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:20:14+03:00</news:publication_date>
      <news:title>Crypto ATM Scams Surge: Over $388M Lost in US</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9010/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:59+03:00</news:publication_date>
      <news:title>Boost WordPress Plugin: Unauthenticated SQLi Exposes Data via current_url, user_name</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9003/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:59+03:00</news:publication_date>
      <news:title>TONNET E-LAN Hybrid Recording System SQLi (CVE-2026-9003)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7637/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:56+03:00</news:publication_date>
      <news:title>Boost WordPress Plugin Vulnerable to PHP Object Injection</news:title><news:keywords>vulnerability, cve, critical, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24215/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-24215 — The DALI Backend, Where An Attacker Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:47+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Integer Overflow Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:46+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Out-of-Bounds Read Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:46+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server DoS Vulnerability: CVE-2026-24210</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24209/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:46+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Path Traversal Exposes DoS Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24207/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Critical Authentication Bypass (CVE-2026-24207)</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>NVIDIA Triton Inference Server: Critical Auth Bypass Puts AI Workloads at Risk</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24163/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>NVIDIA TRT-LLM Vulnerability: Unsafe Deserialization Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24160/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-24160 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-690</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24142/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-24142 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-33255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:43+03:00</news:publication_date>
      <news:title>NVIDIA TRT-LLM Vulnerability Exposes AI Workloads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15369/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:16:42+03:00</news:publication_date>
      <news:title>CVE-2025-15369 — The Xpro Addons — 140+ Widgets for Elementor plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2325/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:02:04+03:00</news:publication_date>
      <news:title>Huawei Zero-Day Downs Luxembourg&apos;s Critical Infrastructure</news:title><news:keywords>israel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-investigating-teampcp-claimed-breach-of-4-000-intern-pen7g/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T07:01:15+03:00</news:publication_date>
      <news:title>GitHub Investigates TeamPCP Claimed Breach of 4,000 Internal Repositories</news:title><news:keywords>threat-intel, vulnerability, data-breach, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8685/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-8685 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8038/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-8038 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:39+03:00</news:publication_date>
      <news:title>WordPress Read More &amp; Accordion Plugin: Privilege Escalation (CVE-2026-7467)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7284/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-7284: Critical WordPress Elementor Plugin Privilege Escalation</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6555/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-6555: ProSolution WP Client Arbitrary File Upload Critical RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6549/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-6549 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6456/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:38+03:00</news:publication_date>
      <news:title>WordPress Account Switcher Plugin: Critical Privilege Escalation (CVE-2026-6456)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6397/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6397 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6391/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6391 — The Sentence To SEO (keywords, description and tags) plugin</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6072/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6072 — The Oliver POS – A WooCommerce Point of Sale (POS) plugin</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5293/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5293 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43620/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-43620 — Recv_files() In Receiver.C That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43619/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-43619 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-59, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43618/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:36+03:00</news:publication_date>
      <news:title>Rsync CVE-2026-43618: Integer Overflow Exposes Memory, Bypasses ASLR</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow, cwe-125, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3985/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T05:16:35+03:00</news:publication_date>
      <news:title>Creative Mail WordPress Plugin SQLi Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45585/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:44+03:00</news:publication_date>
      <news:title>CVE-2026-45585 — Microsoft is aware of a security feature bypass</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-39309 — Trilium Notes is a cross-platform, hierarchical note taking</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-290, cwe-451</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35593/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-35593 — Remote Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, remote-code-execution, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34754/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-34754 — Mantis Bug Tracker (MantisBT) is an open source issue</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/verizon-dbir-2026-vulnerability-exploitation-overtakes-cred-cou7n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T03:04:48+03:00</news:publication_date>
      <news:title>Verizon DBIR 2026: Vulnerability Exploitation Surpasses Credential Theft</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, data-breach, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34600/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T02:16:57+03:00</news:publication_date>
      <news:title>CVE-2026-34600 — Joplin is an open source note-taking and to-do application</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-281, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34358/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CtrlPanel Privilege Escalation (CVE-2026-34358) Allows Full Admin Takeover</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-284, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-34246 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-80, cwe-116</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-34241: CtrlPanel XSS Allows Admin Session Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:37+03:00</news:publication_date>
      <news:title>CtrlPanel RCE: Critical Flaw in Hosting Billing Software Actively Exploited</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15645/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:36+03:00</news:publication_date>
      <news:title>CVE-2025-15645 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-7345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T01:16:35+03:00</news:publication_date>
      <news:title>CVE-2023-7345 — Ledger Live with vulnerable versions of ledgerhq/hw-app-eth</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-704</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-34233 — CtrlPanel is open-source billing software for hosting</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34216/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-34216 — Remote Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, remote-code-execution, cwe-470</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>Libheif Heap Buffer Over-Read Vulnerability (CVE-2026-32882) Exposes Data, Causes DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32814/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-32814 — libheif is a HEIF and AVIF file format decoder and encoder.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-908</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:42+03:00</news:publication_date>
      <news:title>libheif Heap Overflow (CVE-2026-32741) Risks HEIF/AVIF Decoders</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-57798/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T00:16:40+03:00</news:publication_date>
      <news:title>CVE-2025-57798 — The Title Input Functionality Due To A Lack Of Proper Length Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32740/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T23:16:18+03:00</news:publication_date>
      <news:title>libheif Heap-Buffer-Overflow (CVE-2026-32740) Exposes Image Processing Stacks</news:title><news:keywords>vulnerability, cve, high-severity, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32739/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T23:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-32739 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-19</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-1392, remote-code-execution, cwe-917, cwe-94, code-execution</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fbi-americans-lost-over-388-million-to-scams-using-crypto-fi3g7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:45:39+03:00</news:publication_date>
      <news:title>FBI: Crypto ATM Scams Cost Americans $388M in 2025</news:title><news:keywords>threat-intel, data-breach, malware, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/huawei-zero-day-attack-behind-last-year-s-crash-of-luxembour-m1qhg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:18:00+03:00</news:publication_date>
      <news:title>Huawei Zero-Day Caused Luxembourg&apos;s Telecom Outage</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8096/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-8096 — The Kirki – Freeform Page Builder, Website Builder &amp;</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8073/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:51+03:00</news:publication_date>
      <news:title>WordPress Kirki Plugin Vulnerable to Arbitrary File Deletion</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-41470 — RTSP Session Command Handling That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33741/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:49+03:00</news:publication_date>
      <news:title>CVE-2026-33741 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33642/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:49+03:00</news:publication_date>
      <news:title>Kitty Terminal Heap Over-Read/Write Vulnerability (CVE-2026-33642) Critical Severity</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-125, cwe-190, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32738/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T22:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-32738 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-125, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47107/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T21:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-47107: Windmill Sandbox Vulnerability Exposes Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-276</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33633/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T21:16:21+03:00</news:publication_date>
      <news:title>Kitty Terminal Heap Buffer Overflow (CVE-2026-33633) — DoS, RCE Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32134/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T21:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-32134 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47358/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-47358: Terrascan SSRF Allows Local File Read in Server Mode</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-73, cwe-610, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47357/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-47357: Terrascan SSRF Exposes Local Files, Credentials</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-73, cwe-610, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47356/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T20:16:22+03:00</news:publication_date>
      <news:title>Terrascan SSRF Vulnerability (CVE-2026-47356) Exposes Scan Results</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-regulator-to-require-tech-firms-to-tackle-deepfakes-non-n0hka/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T19:57:00+03:00</news:publication_date>
      <news:title>UK Regulator Mandates Tech Firms Tackle Deepfakes and Non-Consensual Intimate Images</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-r-ruemv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T19:38:12+03:00</news:publication_date>
      <news:title>Trapdoor Android Ad Fraud Scheme Hits 659 Million Daily Bid Requests</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-disrupts-fox-tempest-malware-signing-as-a-service-1cjl7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T19:36:00+03:00</news:publication_date>
      <news:title>Microsoft Disrupts Fox Tempest Malware-Signing-as-a-Service</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/drupal-to-patch-highly-critical-vulnerability-at-risk-of-qui-2bfko/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T19:22:18+03:00</news:publication_date>
      <news:title>Drupal Patches Critical Flaw — Exploits Expected Imminently</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5804/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T19:16:22+03:00</news:publication_date>
      <news:title>Motorola Factory Test Component Exposes Sensitive Device Data via Improper Authentication</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-blames-undismissible-teams-location-prompts-on-mac-3k6qh/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T19:10:47+03:00</news:publication_date>
      <news:title>Microsoft Blames Undismissible Teams Location Prompts on macOS Update</news:title><news:keywords>threat-intel, data-breach, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8711/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T18:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8711: NGINX JavaScript Heap Overflow Risks Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47100/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T18:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-47100: Funnel Builder for WooCommerce Checkout Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45557/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T18:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-45557 — Technitium DNS Server aggressively tries to fetch missing</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-405, cwe-406, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44159/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T18:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-44159: Tyler Identity Local Ships with Default Admin Credentials</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-1392</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43634/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T18:16:31+03:00</news:publication_date>
      <news:title>HestiaCP IP Spoofing Vulnerability Bypasses Auth Controls</news:title><news:keywords>vulnerability, cve, high-severity, cwe-348</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2587/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T18:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-2587: Critical RCE in Glassfish Gadget Handler</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-917</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2586/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T18:16:28+03:00</news:publication_date>
      <news:title>GlassFish Administration Console RCE: Critical Flaw Demands Immediate Attention</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94, cwe-917</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43633/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:16:43+03:00</news:publication_date>
      <news:title>HestiaCP Web Terminal RCE: Critical Deserialization Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/7-eleven-confirms-data-breach-claimed-by-the-shinyhunters-ga-dhmhi/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:16:41+03:00</news:publication_date>
      <news:title>7-Eleven Confirms Breach by ShinyHunters Extortion Gang</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40904/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:16:28+03:00</news:publication_date>
      <news:title>CVE-2025-40904 — The Smart Polling Functionality Due To Improper Validation O Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40903/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:16:28+03:00</news:publication_date>
      <news:title>CVE-2025-40903 — The Schedule Restore Archive Functionality Due To Improper V Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40902/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:16:27+03:00</news:publication_date>
      <news:title>CVE-2025-40902 — The Users Functionality Due To Improper Validation Of An Inp Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40901/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:16:27+03:00</news:publication_date>
      <news:title>CVE-2025-40901 — The Credentials Manager Functionality Due To Improper Valida Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-40900/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:16:27+03:00</news:publication_date>
      <news:title>CVE-2025-40900 — The Reports Functionality Due To Improper Validation Of An I Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-microsoft-vulnerabilities-doubled-from-exposure-to-f1b6f/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T17:00:10+03:00</news:publication_date>
      <news:title>Microsoft Critical Vulnerabilities Double, Attackers Target Privilege Escalation</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, cloud, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8912/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T16:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-8912: WordPress Contest Gallery Plugin SQLi</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4883/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T16:16:19+03:00</news:publication_date>
      <news:title>Piotnet Forms Plugin for WordPress Critical RCE Vulnerability (CVE-2026-4883)</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8948/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T16:08:39+03:00</news:publication_date>
      <news:title>OAuth Phishing Campaign Mimics Spotify Using &quot;Profit&quot; Platform</news:title><news:keywords>israel, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-s-mshta-legacy-tool-still-powers-malware-campaigns-armuz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:58:25+03:00</news:publication_date>
      <news:title>Microsoft MSHTA: Legacy Tool Fuels Ongoing Malware Campaigns</news:title><news:keywords>malware, threat-intel, research, vulnerability, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/unpatched-chromadb-vulnerability-can-lead-to-server-takeover-v4uht/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:54:21+03:00</news:publication_date>
      <news:title>Unpatched ChromaDB Vulnerability Allows Server Takeover</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7571/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:19+03:00</news:publication_date>
      <news:title>Keycloak Vulnerability CVE-2026-7571 Allows Implicit Flow Bypass</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-472</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7507/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:19+03:00</news:publication_date>
      <news:title>Keycloak Session Fixation Flaw Allows Account Takeover (CVE-2026-7507)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7504/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:19+03:00</news:publication_date>
      <news:title>Keycloak CVE-2026-7504: Critical URL Validation Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7307/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:19+03:00</news:publication_date>
      <news:title>Keycloak DoS Vulnerability (CVE-2026-7307) Exposes SAML Endpoints</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-1286</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4630/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-4630 — Keycloak Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45442/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-45442 — Brainstorm Force Presto Player Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37982/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-37982 — Keycloak Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37981/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-37981 — Keycloak Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-1220</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37979/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-37979 — Keycloak Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-37978 — Keycloak Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-new-phishing-click-how-oauth-consent-bypasses-mfa-c3maf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T14:30:00+03:00</news:publication_date>
      <news:title>Microsoft 365 Organizations Hit by EvilTokens Phishing-as-a-Service</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-confirms-patching-issues-in-restricted-windows-net-yemh9/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T14:22:15+03:00</news:publication_date>
      <news:title>Microsoft Confirms Windows Update Failures in Restricted Networks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/drupal-to-release-urgent-core-security-updates-on-may-20-si-bw0ip/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T13:44:45+03:00</news:publication_date>
      <news:title>Drupal Core Security Update Imminent: Patch or Get Hacked</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2611/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T13:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-2611: MLflow Assistant Critical RCE via Origin Validation Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/poc-released-for-dirtydecrypt-linux-kernel-vulnerability-iwvx3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T12:42:56+03:00</news:publication_date>
      <news:title>DirtyDecrypt Linux Kernel Vulnerability PoC Released</news:title><news:keywords>threat-intel, vulnerability, tools, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/seppmail-secure-e-mail-gateway-vulnerabilities-enable-rce-an-rey8j/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T12:23:15+03:00</news:publication_date>
      <news:title>SEPPMail Secure E-Mail Gateway RCE and Mail Traffic Access Vulnerabilities</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T12:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-44408 — There is an unauthorized access vulnerability in ZTE</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8922/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-8922 — Keycloak Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-303</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4885/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-4885: Piotnet Addons for Elementor Pro RCE via File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-47317 — Samsung Open Source Escargot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-47316 — Samsung Open Source Escargot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-703</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-47315 — Samsung Open Source Escargot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-754</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:15+03:00</news:publication_date>
      <news:title>Samsung Escargot Out-of-Bounds Write Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47313/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-47313 — Samsung Open Source Escargot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47312/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T11:16:15+03:00</news:publication_date>
      <news:title>CVE-2026-47312 — Samsung Open Source Escargot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-763</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8830/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T10:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8830 — Keycloak Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-603</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8814/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T10:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8814 — Versions of the package exifreader before 4.39.0 are</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-409</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8813/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T10:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-8813: ExifReader DoS Via Crafted ICC mluc Tags</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47311/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T10:16:30+03:00</news:publication_date>
      <news:title>Samsung Escargot Heap Overflow (CVE-2026-47311) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47310/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T10:16:29+03:00</news:publication_date>
      <news:title>Samsung Open Source Escargot Vulnerability: Use-After-Free Allows Pointer Manipulation</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T10:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-47309 — Samsung Open Source Escargot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8946/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T09:43:22+03:00</news:publication_date>
      <news:title>New Phishing Campaign Uses Fake &apos;CEO Mandate&apos; for Email Signature</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-actions-supply-chain-attack-redirects-tags-to-steal-c-clj5s/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T08:28:06+03:00</news:publication_date>
      <news:title>GitHub Actions Supply Chain Attack Hijacks Tags to Steal CI/CD Credentials</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47308/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T08:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-47308 — Samsung Open Source Walrus Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32994/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T08:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-32994 — The /api/v1/autotranslate.translateMessage endpoint in</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2324/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:42:53+03:00</news:publication_date>
      <news:title>Chanhassen Dinner Theatres Suspend Shows After Ransomware Attack</news:title><news:keywords>israel, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8945/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:35:31+03:00</news:publication_date>
      <news:title>Mini Shai Hulud Campaign Hits AntV npm Packages, Echarts-for-React Affected</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4597/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:33:46+03:00</news:publication_date>
      <news:title>Audio Prompt Injection Attack: AudioHijack Bypasses Voice AI Defenses</news:title><news:keywords>ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47307/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-47307 — Samsung Open Source Walrus Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28733/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-28733 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27766/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-27766 — in OpenHarmony v6.0 and prior versions allow a local</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-364</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27648/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:28+03:00</news:publication_date>
      <news:title>OpenHarmony RCE: Remote Code Execution in Pre-Installed Apps (CVE-2026-27648)</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25850/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-25850 — in OpenHarmony v6.0 and prior versions allow a local</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-281</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25781/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:28+03:00</news:publication_date>
      <news:title>OpenHarmony CVE-2026-25781 Allows Local DOS, Unrecoverable Impact</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24792/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:27+03:00</news:publication_date>
      <news:title>OpenHarmony v6.0 RCE: Pre-Installed Apps Vulnerable</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-364</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22069/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T07:16:25+03:00</news:publication_date>
      <news:title>O+ Connect Vulnerability: Local Privilege Escalation (CVE-2026-22069) Exposes Systems</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-266</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T05:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-33234 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T05:16:15+03:00</news:publication_date>
      <news:title>AutoGPT Insecure Deserialization (CVE-2026-33233) Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, insecure-deserialization, cwe-94, cwe-345, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33232/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T05:16:15+03:00</news:publication_date>
      <news:title>AutoGPT DoS: Unauthenticated Attack Exhausts Disk Space</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-459, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32323/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T05:16:14+03:00</news:publication_date>
      <news:title>Mullvad VPN macOS Installer Flaw Allows Root Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-269, cwe-345, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ctt-468-124-breached-accounts-vcqpx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T03:28:54+03:00</news:publication_date>
      <news:title>CTT Data Breach Exposes 468K Portuguese Accounts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T03:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-32244 — Discourse is an open-source discussion platform. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-524, cwe-672</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T02:16:33+03:00</news:publication_date>
      <news:title>AutoGPT Authenticated Session Hijacking via IDOR (CVE-2026-30950)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27892/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T01:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-27892 — Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-200, cwe-212</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27891/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T01:16:38+03:00</news:publication_date>
      <news:title>FacturaScripts CVE-2026-27891: Critical Zip Slip Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-20, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27737/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T01:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-27737 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8851/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T00:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-8851: SOGo SQL Injection Exposes Database Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8838/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T00:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-8838: Critical RCE in amazon-redshift-python-driver</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4137/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T00:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-4137: MLflow Temporary Files Vulnerability Exposes Models to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-378</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27130/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T00:16:39+03:00</news:publication_date>
      <news:title>Dokploy PaaS: Critical OS Command Injection CVE-2026-27130</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T00:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-25244: WebdriverIO RCE via Malicious Git Branch Names</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T00:16:39+03:00</news:publication_date>
      <news:title>Joplin Path Traversal (CVE-2026-22810) Allows Arbitrary File Overwrites</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-24</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/addi-34-532-941-breached-accounts-mgitm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:55:51+03:00</news:publication_date>
      <news:title>Addi Fintech Breach: 34 Million Accounts Exposed by ShinyHunters</news:title><news:keywords>data-breach, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/more-than-200-arrested-in-cyber-raids-aimed-at-middle-east-s-m0gxs/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:52:00+03:00</news:publication_date>
      <news:title>Middle East Cyber Raids Net 200+ Scam Network Arrests</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47092/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-47092: Claude HUD Vulnerability Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-45246 — The Refresh-Free Configuration Rewrite Path That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-732</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45245/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-45245: Hover Summary Feature Exposes Authenticated Requests</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918, cwe-940</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45244/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-45244 — Summarize prior to 0.15.1 contains a missing authorization</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21789/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-21789 — HCL Connections contains a broken access control</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-65954/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:16:36+03:00</news:publication_date>
      <news:title>CVE-2025-65954 — SimpleSAMLphp-casserver is a CAS 1.0 and 2.0 compliant CAS</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-18</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89, cross-site-scripting-xss, cwe-79, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8836/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-8836: Critical lwIP Stack Buffer Overflow in SNMPv3 USM Handler</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45243/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-45243 — The Content Script Window.PostMessage Bridge That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45242/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T22:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-45242: Summarize Daemon Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45231/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T22:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-45231 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8944/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-18T22:02:29+03:00</news:publication_date>
      <news:title>Cloudflare Leverages AI for Code Review, Finds Critical Security Flaws</news:title><news:keywords>israel, cloud</news:keywords>
    </news:news>
  </url></urlset>
