<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/2026-05-18-nvd-CVE-2026-47090/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T23:49:09+03:00</news:publication_date>
      <news:title></news:title>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/laravel-lang-packages-hijacked-to-deploy-credential-stealing-2mycz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T23:48:23+03:00</news:publication_date>
      <news:title>Laravel Lang Packages Hijacked to Deploy Credential-Stealing Malware</news:title><news:keywords>threat-intel, data-breach, malware, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-23</news:title><news:keywords>daily-digest, u-s-department-of-justice, u-s-department-of-defense, kimwolf, vulnerability, litespeed, cpanel, malware, identity, threat-intel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4611/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T20:01:22+03:00</news:publication_date>
      <news:title>HackerOne Slashes Bug Bounty Payouts, Citing AI-Driven Report Floods</news:title><news:keywords>vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/npm-adds-2fa-gated-publishing-and-package-install-controls-a-6ejxo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T19:35:10+03:00</news:publication_date>
      <news:title>npm Boosts Supply Chain Security with 2FA-Gated Staged Publishing</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/packagist-supply-chain-attack-infects-8-packages-using-githu-8sc3t/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T19:07:51+03:00</news:publication_date>
      <news:title>Packagist Supply Chain Attack Infects 8 Packages with Linux Malware</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4610/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T17:10:14+03:00</news:publication_date>
      <news:title>TeamPCP Interview Fabrication Rumors Debunked by LΣҒΔ𝕽ΩLL 🇮🇱</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/claude-mythos-ai-finds-10-000-high-severity-flaws-in-widely-akx09/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T14:55:35+03:00</news:publication_date>
      <news:title>Anthropic AI Finds 10,000 High-Severity Flaws in Critical Software</news:title><news:keywords>threat-intel, vulnerability, cloud, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5046/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T13:21:05+03:00</news:publication_date>
      <news:title>High-Risk Source Code Leak on Darknet Forum Detected</news:title><news:keywords>darkweb, threat-intel, ransomware, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/laravel-lang-php-packages-compromised-to-deliver-cross-platf-r3qu3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T12:51:13+03:00</news:publication_date>
      <news:title>Laravel-Lang PHP Packages Compromised with Cross-Platform Credential Stealer</news:title><news:keywords>threat-intel, vulnerability, malware, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/litespeed-cpanel-plugin-cve-2026-48172-exploited-to-run-scri-hkmur/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T10:35:13+03:00</news:publication_date>
      <news:title>LiteSpeed cPanel Plugin CVE-2026-48172 Exploited, Root Access Granted</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4609/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T09:32:24+03:00</news:publication_date>
      <news:title>KimWolf DDoS Botnet Admin Arrested in Canada</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-to-allow-researchers-to-report-vulnerabilities-to-explo-2kz4t/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T04:11:00+03:00</news:publication_date>
      <news:title>CISA Opens KEV Catalog to External Vulnerability Reports</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-22</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-88, privilege-escalation, cwe-863, critical, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ghostwriter-targets-ukraine-government-entities-with-prometh-bwi6o/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T19:20:32+03:00</news:publication_date>
      <news:title>Ghostwriter Targets Ukraine Government with Prometheus Phishing</news:title><news:keywords>threat-intel, vulnerability, malware, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-industrial-router-exploitation-cisa-kev-nomi-biz1y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T17:07:06+03:00</news:publication_date>
      <news:title>Huawei Router Flaw Triggered Telecom Blackout, SecurityWeek Reports</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trend-micro-warns-of-apex-one-zero-day-exploited-in-the-wild-lf7fe/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T16:39:19+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Zero-Day Under Active Exploitation</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tracking-iranian-apt-screening-serpens-2026-espionage-campa-bwdjf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T16:00:42+03:00</news:publication_date>
      <news:title>Iranian APT Screening Serpens Uses AppDomainManager Hijacking in Espionage Campaigns</news:title><news:keywords>threat-intel, apt, malware, research, unit-42</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4607/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:03:46+03:00</news:publication_date>
      <news:title>Chromium Exploit Code Leaked for Unpatched Browser Fetch Vulnerability</news:title><news:keywords>vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ubiquiti-patches-three-max-severity-unifi-os-vulnerabilities-phgxb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:42+03:00</news:publication_date>
      <news:title>Ubiquiti Patches Three Max Severity UniFi OS Vulnerabilities</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/megalodon-github-attack-targets-5-561-repos-with-malicious-c-n7fj3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T14:55:24+03:00</news:publication_date>
      <news:title>Megalodon GitHub Attack: 5,561 Repos Hit with Malicious CI/CD Workflows</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/making-vulnerable-drivers-exploitable-without-hardware-the-tr7vj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T14:38:12+03:00</news:publication_date>
      <news:title>Windows Kernel Drivers Can Be Exploited Without Hardware, The Hacker News Reports</news:title><news:keywords>threat-intel, vulnerability, microsoft, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/paved-with-intent-roadtools-and-nation-state-tactics-in-the-rwgfz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T13:00:24+03:00</news:publication_date>
      <news:title>ROADtools Misused by Nation-States in Cloud Intrusions</news:title><news:keywords>threat-intel, apt, malware, research, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/first-vpn-cybercrime-service-disrupted-administrator-arre-paajp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:24:22+03:00</news:publication_date>
      <news:title>First VPN Cybercrime Service Disrupted, Administrator Arrested</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9011/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:33+03:00</news:publication_date>
      <news:title>WordPress Ditty Plugin: Authorization Bypass Exposes Non-Public Content</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8692 — The Vedrixa Forms – User Registration Form, Signup Form &amp;</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8684/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8684 — The MotoPress Hotel Booking plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8679/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8679: WordPress AudioIgniter Plugin Exposes Playlist Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8381/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8381 — A broken access control vulnerability exists in the</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7798/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7798 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7636/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7636 — The Slider by Soliloquy – Responsive Image Slider for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7615/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7615 — The Widget Context plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/kimwolf-ddos-botnet-operator-arrested-in-canada-over-ddos-fo-q0w3w/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T11:50:18+03:00</news:publication_date>
      <news:title>Kimwolf DDoS Botnet Operator Arrested in Canada</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/grafana-says-codebase-and-other-data-stolen-via-tanstack-sup-pmbhp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T10:49:38+03:00</news:publication_date>
      <news:title>Grafana Codebase Stolen via Unrotated Token in TanStack Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9104/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-9104 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9018/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-9018: Easy Elements WordPress Plugin Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7509/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-7509 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7249/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-7249 — The Location Weather plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6864/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6864 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4070/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-4070 — The Alfie – Feed Plugin plugin for WordPress is vulnerable</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-44409 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3481/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-3481 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2518/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-2518 — The FastX theme for WordPress is vulnerable to unauthorized</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4606/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T07:30:04+03:00</news:publication_date>
      <news:title>GitHub Breached: Supply Chain Attack on Nx Console Compromises Internal Repos</news:title><news:keywords>malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T07:16:26+03:00</news:publication_date>
      <news:title>WP ERP Pro SQL Injection (CVE-2026-4834) Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Path Traversal (CVE-2026-34911) Puts System Files at Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34910/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Critical Command Injection (CVE-2026-34910) Demands Immediate Attention</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34909/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Critical Path Traversal Vulnerability (CVE-2026-34909)</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34908/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Critical Improper Access Control Vulnerability: CVE-2026-34908</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33000/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:33+03:00</news:publication_date>
      <news:title>UniFi OS Critical Command Injection (CVE-2026-33000)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T01:16:48+03:00</news:publication_date>
      <news:title>BookingPress Pro Plugin: Critical RCE via Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22678/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T01:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-22678 — The Email Template Description Field Of The System And Serve Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47102/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T00:16:32+03:00</news:publication_date>
      <news:title>LiteLLM Privilege Escalation: User Role Manipulation Grants Admin Access (CVE-2026-47102)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47101/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T00:16:32+03:00</news:publication_date>
      <news:title>LiteLLM Privilege Escalation Via API Key Misconfiguration (CVE-2026-47101)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url></urlset>
