<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27415/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-27415 — PluginUs.Net BEAR Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8889/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T14:09:25+03:00</news:publication_date>
      <news:title>MedusaLocker Ransomware Group Details Financial Motivation, Operational Shifts</news:title><news:keywords>israel, telegram</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/gemini-cli-vulnerability-could-have-led-to-code-execution-s-ite2y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T13:39:34+03:00</news:publication_date>
      <news:title>Gemini CLI Vulnerability: Prompt Injection Leads to Code Execution</news:title><news:keywords>threat-intel, vulnerability, ai-security, tools, securityweek</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pypi-packages-deliver-zichatbot-malware-via-zulip-apis-on-wi-g5ity/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:20:00+03:00</news:publication_date>
      <news:title>PyPI Packages Deliver ZiChatBot Malware to Windows and Linux</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-44407 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-134</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27421/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27421 — WProyal Royal Elementor Addons Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27416/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27416 — BPlugins PDF Poster Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27329/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27329 — YITH YITH WooCommerce Wishlist Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25468/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-25468 — WeDevs Happy Addons For Elementor Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25436/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-25436 — WProyal Royal Elementor Addons Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-68604/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-68604 — WPGraphQL Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-68060/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-68060: High-Severity SQL Injection in WPMart Team Member Plugin</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-66105/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-66105 — Magepeople Inc. Bus Ticket Booking With Seat Reservation Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62127/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-62127 — WEN Themes WEN Logo Slider Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-2514/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-2514 — Hitachi Virtual Storage Platform G130, G150, G350, G370, G70 Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-1978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2025-1978: Hitachi Storage RCE Vulnerability Exposes Enterprise Data</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-43384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:16:24+03:00</news:publication_date>
      <news:title>CVE-2024-43384: Root Password Exposure via Improper Information Removal</news:title><news:keywords>vulnerability, cve, high-severity, cwe-212</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44406/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T11:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-44406 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-9661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T11:16:00+03:00</news:publication_date>
      <news:title>Hitachi VSP One Block OS Command Injection (CVE-2025-9661) CVSS 8.1</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/woflow-447-593-breached-accounts-rhbn4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:48:33+03:00</news:publication_date>
      <news:title>Woflow Data Breach: ShinyHunters Exposes 447K Accounts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8063/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-8063 — Null Pointer Dereference</news:title><news:keywords>vulnerability, cve, medium-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7252/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>WP-Optimize Plugin Flaw Allows Arbitrary File Deletion, RCE via wp-config.php</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-6692: WordPress Slider Revolution RCE Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4348/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-4348: Unauthenticated SQLi in BetterDocs Pro WordPress Plugin</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41641/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:05+03:00</news:publication_date>
      <news:title>NocoBase SQL Injection Bypass (CVE-2026-41641) Exposes Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41413/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-41413 — Istio is an open platform to connect, manage, and secure</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41143/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:04+03:00</news:publication_date>
      <news:title>YesWiki SQL Injection (CVE-2026-41143) Risks Data Exposure</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41139/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:16:04+03:00</news:publication_date>
      <news:title>Math.js Arbitrary Code Execution via Expression Parser (CVE-2026-41139)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6214/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-6214 — The Forminator Forms plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42194/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-42194 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41671/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-41671 — Authentication Bypass</news:title><news:keywords>vulnerability, cve, medium-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41670/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-41670: Admidio SAML IdP Bypass Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41669/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-41669: Admidio SAML Signature Bypass Puts User Management at Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41661/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41661 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41660/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:29+03:00</news:publication_date>
      <news:title>Admidio CVE-2026-41660: Logic Error Allows 2FA Bypass for Admin Accounts</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41658/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41658 — Admidio is an open-source user management solution. Prior</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41655/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41655 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41640/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41640: NocoBase No-Code Platform SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41201/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41201: Critical CI4MS Account Takeover Via Stored XSS</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41142/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41142: OpenEXR Integer Overflow Leads to Heap OOB Write</news:title><news:keywords>vulnerability, cve, high-severity, integer-overflow, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:25+03:00</news:publication_date>
      <news:title>Spring Cloud Config Server Vulnerable to TOCTOU Attacks (CVE-2026-41002)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40982/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:24+03:00</news:publication_date>
      <news:title>Spring Cloud Config Vulnerability CVE-2026-40982 Allows Directory Traversal</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40981/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T07:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-40981: Spring Cloud Config Exposes GCP Secrets</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4807/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T06:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-4807 — The Appointment Booking Calendar plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T05:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-6222 — The Forminator Forms plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40003/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T05:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-40003 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-korean-hackers-targeted-ethnic-koreans-in-china-with-a-941im/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T03:12:00+03:00</news:publication_date>
      <news:title>North Korean APT37 Targets Ethnic Koreans in China with BirdCall Malware</news:title><news:keywords>threat-intel, data-breach, government, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41484/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41484 — OpenTelemetry.Exporter.OneCollector is a .NET exporter that</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41483/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41483 — OpenTelemetry.Resources.Azure is the .NET resource detector</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41417/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41417 — Netty allows request-line validation to be bypassed when a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-93, cwe-444</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41310/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41310 — OpenTelemetry.Exporter.Zipkin is the .NET Zipkin exporter</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40296/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T01:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-40296 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40281/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:16:01+03:00</news:publication_date>
      <news:title>Gotenberg PDF API Vulnerability CVE-2026-40281 Allows Arbitrary File Overwrite</news:title><news:keywords>vulnerability, cve, critical, high-severity, arbitrary-file-access, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mirai-based-xlabs-v1-botnet-exploits-adb-to-hijack-iot-devic-xqkjl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:21:00+03:00</news:publication_date>
      <news:title>Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices</news:title><news:keywords>threat-intel, vulnerability, malware, data-breach, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8032/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:36+03:00</news:publication_date>
      <news:title>PicoTronica e-Clinic Healthcare System Hard-Coded Credential Vulnerability (CVE-2026-8032)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-259, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-44118: Loopback Owner Context Spoofing Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44116/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>OpenClaw Zalo Plugin SSRF Vulnerability (CVE-2026-44116) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44115/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-44115: OpenClaw Vulnerability Allows Shell Expansion Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44114/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:35+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability: Environment Namespace Override Poses Supply Chain Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44110/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>OpenClaw Authorization Bypass (CVE-2026-44110) Exposes Room Control</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44109/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>OpenClaw Authentication Bypass: Critical Vulnerability in Feishu Webhook</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43585/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability Allows Revoked Bearer Tokens to Remain Valid</news:title><news:keywords>vulnerability, cve, high-severity, cwe-672</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43584/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:34+03:00</news:publication_date>
      <news:title>CVE-2026-43584: OpenClaw Environment Variable Vulnerability Allows Execution Hijack</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43581/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43581: Critical OpenClaw Sandbox Vulnerability Exposes DevTools</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43580/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43580: OpenClaw Vulnerability Bypasses SSRF Protections</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43578/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43578: OpenClaw Privilege Escalation Hits Critical Severity</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43577/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43577 — OpenClaw before 2026.4.9 contains a file read vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43576/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>OpenClaw SSRF Vulnerability (CVE-2026-43576) Allows Untrusted Pivoting</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-601, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43575/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-43575: OpenClaw Critical Auth Bypass Exposes Browser Sessions</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-06</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, denial-of-service, remote-code-execution, cwe-94, cross-site-scripting-xss, cwe-79, sql-injection</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8031/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:53+03:00</news:publication_date>
      <news:title>CVE-2026-8031 — PicoTronica E-Clinic Healthcare System ECHS Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41938/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41938: Vvveb Unrestricted File Upload Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41936/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41936: Vvveb XXE Allows File Disclosure, Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-611</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41934/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>Vvveb RCE: Authenticated Users Can Achieve Unauthenticated Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41931/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41931 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-209, cwe-1188</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41930: Vvveb Docker Hard-Coded Credentials Lead to Critical Database Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:35+03:00</news:publication_date>
      <news:title>CVE-2025-31960 — HCL BigFix Service Management (SM) is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-209</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-30151/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T22:16:35+03:00</news:publication_date>
      <news:title>HCL BigFix Service Management Privilege Escalation (CVE-2024-30151)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-host-w0arn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:38:38+03:00</news:publication_date>
      <news:title>vm2 Sandbox Bug: Critical RCE Allows Host System Takeover</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices-bcyha/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:06:21+03:00</news:publication_date>
      <news:title>Cisco DoS Flaw Hits Network Controllers, Requires Manual Reboot</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7875/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:24+03:00</news:publication_date>
      <news:title>NanoClaw Container Vulnerability Allows Arbitrary File Access, Recursive Deletion</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-42503: gopls Vulnerability Exposes Dev Environments to RCE</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1327</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23870/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-23870: High-Severity DoS Flaw in React Server Components</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20219/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20219 — The REST API Of Cisco Slido Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20195/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20195 — An Identity Management API Endpoint Of Cisco ISE Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-204</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20193/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20193 — The RADIUS Policy API Endpoints Of Cisco ISE Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20189/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20189 — The Log File Download Functionality Of Cisco Prime Infrastru Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20188/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>Cisco Crosswork, NSO DoS Vulnerability (CVE-2026-20188)</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20185/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-20185: Cisco SG350/SG350X SNMP DoS Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20172/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20172 — The Lite Agent Feature Of Cisco Enterprise Chat And Email (E Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-646</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20169/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20169 — The Web-Based Management Interface Of Cisco IoT Field Networ Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20168/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-20168 — The Web-Based Management Interface Of Cisco IoT Field Networ Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-388</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>Cisco IoT FND DoS Vulnerability (CVE-2026-20167) Allows Remote Router Reloads</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20035/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>Cisco Unity Connection Web Inbox SSRF Vulnerability (CVE-2026-20035)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20034/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:16:20+03:00</news:publication_date>
      <news:title>Cisco Unity Connection: Authenticated RCE Via Web Management Interface</news:title><news:keywords>vulnerability, cve, high-severity, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daemon-tools-devs-confirm-breach-release-malware-free-versi-mz2xg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T19:43:30+03:00</news:publication_date>
      <news:title>DAEMON Tools Supply Chain Attack Confirmed, Malware-Free Version Released</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6863/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T19:16:12+03:00</news:publication_date>
      <news:title>CVE-2026-6863 — Velociraptor versions prior to 0.76.4 contain a cross</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6691/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-6691: MongoDB C Driver Heap Overflow via GSSAPI Username</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8027/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:13+03:00</news:publication_date>
      <news:title>CVE-2026-8027 — A weakness has been identified in FlowiseAI Flowise up to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-285, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-52613/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:08+03:00</news:publication_date>
      <news:title>CVE-2025-52613 — HCL BigFix Service Management (SM) is affected by use of a</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:06+03:00</news:publication_date>
      <news:title>CVE-2025-31978 — HCL BigFix Service Management (SM) does not adequately</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31976/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:16:06+03:00</news:publication_date>
      <news:title>CVE-2025-31976 — HCL BigFix Service Management (SM) is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/why-ransomware-attacks-succeed-even-when-backups-exist-s6wwb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T17:04:14+03:00</news:publication_date>
      <news:title>Ransomware Attacks Succeed by Destroying Backups First, Not Just Encrypting</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attack-btsl8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T16:02:52+03:00</news:publication_date>
      <news:title>MuddyWater Uses Chaos Ransomware as Decoy for Microsoft Teams Attacks</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:16:26+03:00</news:publication_date>
      <news:title>HCL BigFix RunBookAI Vulnerability Allows Command Smuggling</news:title><news:keywords>vulnerability, cve, high-severity, cwe-77, cwe-351, cwe-451</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-hacker-news-launches-cybersecurity-stars-awards-2026-a8nz8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:03:00+03:00</news:publication_date>
      <news:title>The Hacker News Launches &apos;Cybersecurity Stars Awards 2026&apos;</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6420/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-6420 — Keylime Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1241</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31970/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:16:03+03:00</news:publication_date>
      <news:title>CVE-2025-31970 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-358</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/your-ai-agents-are-already-inside-the-perimeter-do-you-know-va5k8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:57:00+03:00</news:publication_date>
      <news:title>AI Agents Proliferating Faster Than Enterprise Governance</news:title><news:keywords>threat-intel, vulnerability, identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-40001 — Code Execution</news:title><news:keywords>vulnerability, cve, medium-severity, code-execution, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-35255 — The Oracle Cloud Native Environment Command Line Interface P Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1719/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:16:18+03:00</news:publication_date>
      <news:title>WordPress Gravity Bookings Plugin Vulnerable to SQL Injection (CVE-2026-1719)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-critical-infrastructure-must-master-isolation-recover-cncgj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:15:34+03:00</news:publication_date>
      <news:title>CISA Mandates Isolation, Recovery for Critical Infrastructure Against Foreign Cyber Threats</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/legionproxy-10-144-breached-accounts-5jdcb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:11:25+03:00</news:publication_date>
      <news:title>LegionProxy Breach Exposes 10,000 Accounts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-s-android-apps-get-public-verification-to-stop-supply-uxtb6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:13:00+03:00</news:publication_date>
      <news:title>Google Expands Android Binary Transparency to Counter Supply Chain Attacks</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-phone-link-exploited-by-cloudz-rat-to-steal-credenti-oy75b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:34:00+03:00</news:publication_date>
      <news:title>CloudZ RAT and Pheno Plugin Target Windows Phone Link for Credential Theft</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7841/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>GeoVision GV-ASWeb RCE: High-Severity Flaw Affects Notification Settings</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7457/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7457 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7448/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7448: WordPress LatePoint Plugin Open to Unauthenticated Stored XSS</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7332/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-7332: WordPress LatePoint Plugin XSS Flaw Exposes Unauthenticated Attackers</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6672/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-6672 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6344/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-6344 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35254/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-35254 — The Oracle OCI CLI Product Of Oracle Open Source Projects. T Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35253/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T11:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-35253 — The Oracle Macoron Tool Product Of Oracle Open Source Projec Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8884/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T10:02:50+03:00</news:publication_date>
      <news:title>Cyber News: Basic Security Hygiene Gaps Plague Most Organizations</news:title><news:keywords>israel, cybersafe</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/oracle-debuts-monthly-critical-security-patch-updates-a19et/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:32:17+03:00</news:publication_date>
      <news:title>Oracle to Issue Monthly Critical Security Patch Updates</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2306/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-2306 — The Ninja Tables – Easy Data Table Builder plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4568/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T08:03:19+03:00</news:publication_date>
      <news:title>UK Age Verification Flaws Exploit Social Engineering, Parental Aid</news:title><news:keywords>phishing, the-independent</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firew-awpvq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T07:46:23+03:00</news:publication_date>
      <news:title>Palo Alto Networks Zero-Day Exploited to Hack Firewalls</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5753/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T07:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-5753 — The All-in-One WP Migration Unlimited Extension plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3208/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T07:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-3208 — The Mercado Pago payments for WooCommerce plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7573/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-7573 — An authorization bypass (CWE-639) in the GetUserRoles gRPC</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7572/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:15:58+03:00</news:publication_date>
      <news:title>CVE-2026-7572 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-193</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71256/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:05+03:00</news:publication_date>
      <news:title>CVE-2025-71256: nr Modem DoS Vulnerability Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71255/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:05+03:00</news:publication_date>
      <news:title>CVE-2025-71255: Modem IMS Vulnerability Exposes Devices to Remote DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71254/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:04+03:00</news:publication_date>
      <news:title>Modem IMS DoS Vulnerability (CVE-2025-71254) Poses Remote Threat</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71253/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:04+03:00</news:publication_date>
      <news:title>Modem IMS Vulnerability (CVE-2025-71253) Allows Remote DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71252/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:04+03:00</news:publication_date>
      <news:title>CVE-2025-71252: Modem IMS Vulnerability Exposes Remote DoS Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71251/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T05:16:03+03:00</news:publication_date>
      <news:title>CVE-2025-71251: IMS DoS Vulnerability Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T00:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-41950 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trellix-source-code-breach-highlights-growing-supply-chain-t-qt8rq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:40:11+03:00</news:publication_date>
      <news:title>Trellix Source Code Breach Exposes Supply Chain Risks</news:title><news:keywords>threat-intel, tools, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7857/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:16:41+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Router Vulnerable to Remote Buffer Overflow (CVE-2026-7857)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7856/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:16:41+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Buffer Overflow (CVE-2026-7856) Exposes Web Management</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44331/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:16:39+03:00</news:publication_date>
      <news:title>ProFTPD SQL Injection (CVE-2026-44331) Exposes Servers to Remote Attacks</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-05</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-22, cwe-770, cwe-306, cwe-284, privilege-escalation, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8881/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:45:14+03:00</news:publication_date>
      <news:title>MedusaLocker Leaks Magnolia Data After Ransom Refusal</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7855/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:23+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Buffer Overflow - CVE-2026-7855 Public Exploit Available</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7854/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:23+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Critical Buffer Overflow (CVE-2026-7854)</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42997/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:22+03:00</news:publication_date>
      <news:title>OpenStack Ironic Vulnerability CVE-2026-42997 Exposes Keystone Tokens</news:title><news:keywords>vulnerability, cve, high-severity, cwe-669</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T22:16:21+03:00</news:publication_date>
      <news:title>OpenCTI Critical Auth Bypass: Unauthenticated API Access Threatens CTI Platforms</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7853/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:16:04+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Critical Buffer Overflow (CVE-2026-7853) Publicly Exploitable</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7851/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:16:03+03:00</news:publication_date>
      <news:title>D-Link DI-8100 Router Vulnerability: Remote Stack Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ftc-bans-data-broker-kochava-from-selling-sensitive-location-wpt74/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:02:00+03:00</news:publication_date>
      <news:title>FTC Bans Kochava from Selling Sensitive Location Data</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4567/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:01:26+03:00</news:publication_date>
      <news:title>Grok Bypassed for $200k Crypto Theft via Morse Code in Username</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/conti-akira-ransomware-affiliate-given-8-year-sentence-x44pk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:33:00+03:00</news:publication_date>
      <news:title>Conti, Akira Ransomware Affiliate Sentenced to 8 Years</news:title><news:keywords>threat-intel, data-breach, government, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:17:04+03:00</news:publication_date>
      <news:title>CVE-2026-43002 — OpenStack Horizon 25.6 And Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-696</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-wh5bp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:19:00+03:00</news:publication_date>
      <news:title>Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS, Potential RCE</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7844/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-7844 — Chatchat-Space Langchain-Chatchat Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:18+03:00</news:publication_date>
      <news:title>Eclipse BaSyx Server SDK Vulnerability Bypasses Network Segmentation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:18+03:00</news:publication_date>
      <news:title>Eclipse BaSyx RCE: Critical Path Traversal in Server SDK</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6907/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-6907 — An issue was discovered in 6.0 before 6.0.5 and 5.2 before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-524</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5766/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-5766 — An issue was discovered in 6.0 before 6.0.5 and 5.2 before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34956 — Open VSwitch Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34002 — The X.Org X Server Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-805</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34000/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-34000 — The X.Org X Server Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daemon-tools-supply-chain-attack-compromises-official-instal-5vbfg/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T19:07:00+03:00</news:publication_date>
      <news:title>DAEMON Tools Supply Chain Attack Compromises Official Installers</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5016/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T18:36:09+03:00</news:publication_date>
      <news:title>Icarus: New Threat Actor Emerges</news:title><news:keywords>darkweb, threat-intel, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-warns-of-sophisticated-phishing-campaign-targeting-2e78d/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:45:04+03:00</news:publication_date>
      <news:title>Microsoft Warns of Sophisticated AitM Phishing Campaign Targeting US Organizations</news:title><news:keywords>threat-intel, vulnerability, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-linked-uat-8302-targets-governments-using-shared-apt-m-xanvu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:19:00+03:00</news:publication_date>
      <news:title>China-Linked UAT-8302 APT Targets Governments in South America and Europe</news:title><news:keywords>threat-intel, vulnerability, malware, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-7834: Critical Stack-Based Buffer Overflow in EFM ipTIME NAS1dual</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7778/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-7778 — An issue that could allow a dashboard configuration to be</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:16:09+03:00</news:publication_date>
      <news:title>WeePie Cookie Allow Plugin SQLi Risks Unauthenticated Database Access</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-don-t-ch-onz4o/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T17:00:10+03:00</news:publication_date>
      <news:title>EOL Software Creates CVE Blind Spots in SCA Tools</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7833/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:31+03:00</news:publication_date>
      <news:title>EFM ipTIME C200 Vulnerability: Remote Command Injection Exposed</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7832/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:31+03:00</news:publication_date>
      <news:title>IObit Advanced SystemCare 19: High-Severity Symlink Following Vulnerability (CVE-2026-7832)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59, cwe-61</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-30246 — Fiber is a web framework for Go. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28510/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-28510 — eLabFTW is an open source electronic lab notebook. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-302</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27694/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-27694 — Traccar is an open source GPS tracking system. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27693/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-27693 — Traccar is an open source GPS tracking system. In</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-91</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27644/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-27644 — Traccar is an open source GPS tracking system. In versions</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1236</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8879/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:15:01+03:00</news:publication_date>
      <news:title>Google Chrome Bugs Found by AI Earn $57,000 Bug Bounty</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8878/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:08:56+03:00</news:publication_date>
      <news:title>Taiwan High Speed Rail Emergency Stop Caused by SDR Attack</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vimeo-data-breach-exposes-personal-information-of-119-000-pe-1dxfn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:03:46+03:00</news:publication_date>
      <news:title>Vimeo Data Breach Exposes Personal Information of 119,000</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/australia-launches-cyber-review-board-modeled-on-version-dis-lvyr7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:45:00+03:00</news:publication_date>
      <news:title>Australia Establishes Cyber Incident Review Board</news:title><news:keywords>threat-intel, data-breach, government, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6261/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:21+03:00</news:publication_date>
      <news:title>Betheme WordPress Arbitrary File Upload RCE (CVE-2026-6261)</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43571/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-43571: OpenClaw Plugin Trust Bypass Opens Attack Vectors</news:title><news:keywords>vulnerability, cve, high-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43569/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:20+03:00</news:publication_date>
      <news:title>OpenClaw Authentication Bypass (CVE-2026-43569) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43566/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-43566: OpenClaw Privilege Escalation via Untrusted Webhook Events</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43534/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:19+03:00</news:publication_date>
      <news:title>OpenClaw Input Validation Flaw (CVE-2026-43534) Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-345</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43533/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-43533: OpenClaw QQBot Arbitrary File Read Vulnerability Uncovered</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43530/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:19+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability CVE-2026-43530 Undermines Exec Approval</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-43526/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-43526: OpenClaw QQBot SSRF Flaw Exposes Content Fetching</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42439/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:18+03:00</news:publication_date>
      <news:title>OpenClaw Server-Side Request Forgery Policy Bypass (CVE-2026-42439)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42435/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:17+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42435: Shell Wrapper Vulnerability Allows Environment Variable Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42434/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:17+03:00</news:publication_date>
      <news:title>OpenClaw Sandbox Escape (CVE-2026-42434) Allows Remote Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54348/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:17+03:00</news:publication_date>
      <news:title>ERPGo SaaS 3.9 CSV Injection Allows RCE via Vendor Fields</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1236</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54345/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:16+03:00</news:publication_date>
      <news:title>Frappe Framework ERPNext Sandbox Escape Allows RCE via CVE-2023-54345</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54344/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:16+03:00</news:publication_date>
      <news:title>Eclipse Equinox OSGi RCE: Critical Vulnerability Exposes Consoles to Unauthenticated Attackers</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-54342/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:16:15+03:00</news:publication_date>
      <news:title>Eclipse Equinox OSGi RCE: Critical Vulnerability Allows Unauthenticated Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-remote-code-execution-vulnerability-patched-in-andr-lhq61/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:58:44+03:00</news:publication_date>
      <news:title>Android Critical RCE Vulnerability Patched in System Component</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-back-door-attackers-know-about-and-most-security-teams-7alcq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:58:00+03:00</news:publication_date>
      <news:title>OAuth Tokens: The Persistent Backdoor Most Teams Miss</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/metinfo-cms-cve-2026-29014-exploited-for-remote-code-executi-tppez/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:56:00+03:00</news:publication_date>
      <news:title>MetInfo CMS CVE-2026-29014 Exploited for RCE Attacks</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url></urlset>
