<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4998/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:40:29+03:00</news:publication_date>
      <news:title>Legal Sector Under Siege: 31 Ransomware Attacks in Seven Days</news:title><news:keywords>darkweb, threat-intel, ransomware, malware, data-breach, darkfeed</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4997/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:26:55+03:00</news:publication_date>
      <news:title>Global Payment Provider, Government Entity Hit in Major Data Leaks</news:title><news:keywords>darkweb, threat-intel, ransomware, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6982/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6982 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6981/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6981 — IhateCreatingUserNames2 AiraHub2 Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4539/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T17:30:15+03:00</news:publication_date>
      <news:title>UK&apos;s NCSC Releases SilentGlass to Block Malicious Display Traffic</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6980/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T17:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6980: Divyanshu-hash GitPilot-MCP Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6979/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T15:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-6979 — Devlikeapro WAHA Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T15:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-6978 — JiZhiCMS SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6977/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T14:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-6977: Vanna-AI Legacy Flask API Improper Authorization</news:title><news:keywords>vulnerability, cve, high-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/researchers-uncover-pre-stuxnet-fast16-malware-targeting-e-xp1qr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T12:26:00+03:00</news:publication_date>
      <news:title>Pre-Stuxnet &apos;fast16&apos; Malware Targeted Engineering Software in 2005</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T09:16:16+03:00</news:publication_date>
      <news:title>simple-git RCE: Incomplete Fix Leaves Critical Vulnerability Open</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/adt-confirms-data-breach-after-shinyhunters-leak-threat-thhhr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T01:53:14+03:00</news:publication_date>
      <news:title>ADT Confirms Data Breach After ShinyHunters Extortion Threat</news:title><news:keywords>threat-intel, data-breach, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42171/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T01:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-42171: NSIS Privilege Escalation Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-npm-threat-landscape-attack-surface-and-mitigations-8o65q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:40:33+03:00</news:publication_date>
      <news:title>npm Supply Chain Evolves: Wormable Malware, CI/CD Persistence Detected</news:title><news:keywords>threat-intel, apt, malware, research</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41481/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-41481 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41478/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:16:19+03:00</news:publication_date>
      <news:title>Saltcorn SQL Injection (CVE-2026-41478) Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-41248: Clerk Auth Bypass Exposes Critical Web Applications</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-436, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/firestarter-malware-survives-cisco-firewall-updates-securit-jd7v0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:34:08+03:00</news:publication_date>
      <news:title>Cisco Firestarter Malware Persists Through Updates</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tgr-sta-1030-new-activity-in-central-and-south-america-26fh7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:30:19+03:00</news:publication_date>
      <news:title>TGR-STA-1030: Persistent Threat to Central and South America</news:title><news:keywords>threat-intel, apt, malware, research, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-update-gets-new-controls-to-reduce-forced-restarts-1g7ek/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:08:26+03:00</news:publication_date>
      <news:title>Microsoft Windows Update Gets New Controls to Reduce Forced Restarts</news:title><news:keywords>threat-intel, data-breach, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-24</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-1321, cwe-113, cwe-183, cwe-441, cwe-918, critical</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41492/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:14+03:00</news:publication_date>
      <news:title>Dgraph CVE-2026-41492: Unauthenticated Admin Token Exposure Via /debug/vars</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41421/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>CVE-2026-41421: SiYuan Desktop RCE via HTML Notification Abuse</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-78, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41419/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>4ga Boards Path Traversal Vulnerability Exposes Local Files (CVE-2026-41419)</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41418/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>CVE-2026-41418 — 4ga Boards is a boards system for realtime project</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41414/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>CVE-2026-41414: Skim Fuzzy Finder Vulnerability Exposes GitHub Tokens</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41328/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:12+03:00</news:publication_date>
      <news:title>Dgraph CVE-2026-41328: Unauthenticated Data Read Access Critical Flaw</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-943</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41327/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:12+03:00</news:publication_date>
      <news:title>CVE-2026-41327: Dgraph GraphQL Database Critical Unauthenticated Data Read</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-943</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33666/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:10+03:00</news:publication_date>
      <news:title>CVE-2026-33666: Zserio BitStreamReader Overflow Bypasses Bounds Check</news:title><news:keywords>vulnerability, cve, high-severity, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33662/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:09+03:00</news:publication_date>
      <news:title>CVE-2026-33662: OP-TEE RSA Padding Underflow Leads to Crash</news:title><news:keywords>vulnerability, cve, high-severity, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33524/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:09+03:00</news:publication_date>
      <news:title>Zserio DoS: Crafted Payload Triggers Massive Memory Allocation</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/iran-s-cyber-threat-may-be-less-shock-and-awe-than-low-an-fpsjf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:15:00+03:00</news:publication_date>
      <news:title>Iran Cyber Threat: Low-and-Slow Opportunism, Not &apos;Shock and Awe&apos;</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/adt-says-customer-data-stolen-in-cyber-intrusion-jcwup/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:45:00+03:00</news:publication_date>
      <news:title>ADT Customer Data Stolen in Cyber Intrusion</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42044/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42044 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-915, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42043/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>Axios CVE-2026-42043: NO_PROXY Bypass Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-183, cwe-441, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42042/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42042 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-183, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42041/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42041 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42038/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42038 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42037/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42037 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42036/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42036 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42035/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>Axios CVE-2026-42035: Prototype Pollution Leads to Header Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-113, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42034/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42034 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42033/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42033: Axios Prototype Pollution Allows Response Tampering, HTTP Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41322/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41322 — @astrojs/node allows Astro to deploy your SSR site to Node</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-525</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-apri-luumc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:13:55+03:00</news:publication_date>
      <news:title>Microsoft Entra Passkeys Roll Out to Windows Devices</news:title><news:keywords>threat-intel, data-breach, malware, microsoft, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6912/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:22+03:00</news:publication_date>
      <news:title>AWS Cognito Flaw Grants Deployment Admin Privileges</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:22+03:00</news:publication_date>
      <news:title>Critical JWT Bypass in AWS Ops Wheel Grants Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-41411 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41079/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-41079 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41067/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-41067 — Astro is a web framework. Prior to 6.1.6, the</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41066/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:20+03:00</news:publication_date>
      <news:title>lxml XML Parsing Vulnerability Exposes Local Files</news:title><news:keywords>vulnerability, cve, high-severity, cwe-611</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40897/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:20+03:00</news:publication_date>
      <news:title>Critical RCE in Math.js Expression Parser (CVE-2026-40897)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pentagon-grapples-with-securing-ai-as-it-moves-toward-autono-34zqn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:14:00+03:00</news:publication_date>
      <news:title>Pentagon Grapples with Securing AI in Autonomous Warfare</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39920/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:16:36+03:00</news:publication_date>
      <news:title>Critical RCE in BridgeHead FileStore via Default Axis2 Credentials</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-1188, cwe-1391</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42095/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-42095 — bookserver in KDE Arianna before 26.04.1 allows attackers</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/norway-s-prime-minister-proposes-ban-on-social-media-access-k0yg1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:41:00+03:00</news:publication_date>
      <news:title>Norway Proposes Social Media Ban for Young Teens</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-unauthorized-mythos-access-plankey-cisa-nomi-90z3p/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:31:51+03:00</news:publication_date>
      <news:title>Mythos Unauthorized Access, CISA Nom Withdrawal, New Display Security</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-j2hj6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:13:00+03:00</news:publication_date>
      <news:title>China Targets NASA with Phishing for Defense Software</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/toronto-police-arrest-three-in-canada-s-first-mobile-sms-bla-3lai4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:45:00+03:00</news:publication_date>
      <news:title>Canada&apos;s First SMS Blaster Arrests: A Shift in Phishing Tactics</news:title><news:keywords>threat-intel, data-breach, government, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5367/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:16:21+03:00</news:publication_date>
      <news:title>OVN Out-of-Bounds Read Exposes Heap Memory via DHCPv6</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5265/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-5265 — When generating an ICMP Destination Unreachable or Packet</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21515/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:16:03+03:00</news:publication_date>
      <news:title>Critical Azure IoT Central Flaw Exposes Sensitive Data, Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-korea-s-lazarus-targets-macos-users-via-clickfix-jr0ng/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:00:00+03:00</news:publication_date>
      <news:title>Lazarus Targets macOS via ClickFix: North Korea&apos;s New Attack Vector</news:title><news:keywords>threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2291/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:57:25+03:00</news:publication_date>
      <news:title>Ransomware Costs Spike: VPNs and SonicWall Exploited</news:title><news:keywords>israel, malware, ransomware, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-7399/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-7399 — Samsung MagicINFO 9 Server: Samsung MagicINFO 9 Server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-57728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-57728 — SimpleHelp  SimpleHelp: SimpleHelp Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-57726/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-57726 — SimpleHelp  SimpleHelp: SimpleHelp Missing Authorization Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/bridging-the-ai-agent-authority-gap-continuous-observabilit-tw3co/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:49:00+03:00</news:publication_date>
      <news:title>AI Agents: The Delegated Risk Gap Defenders Must Close</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-vskn6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:48:00+03:00</news:publication_date>
      <news:title>Fake Crypto Wallets Flood App Store, Targeting User Seed Phrases</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vulnerabilities-patched-in-crowdstrike-tenable-products-qo8nt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:49:27+03:00</news:publication_date>
      <news:title>Critical Flaws Hit CrowdStrike, Tenable Products; Patches Released</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-depl-xft8b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:29:00+03:00</news:publication_date>
      <news:title>Tropic Trooper Exploits SumatraPDF and VS Code Tunnels for Espionage</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:16:03+03:00</news:publication_date>
      <news:title>Tempo Vulnerability: High-Severity Flaw Risks Service Availability</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4078/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-4078 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3569/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-3569 — The Liaison Site Prober plugin for WordPress is vulnerable</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3565/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-3565 — The Taqnix plugin for WordPress is vulnerable to Cross-Site</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-11762/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:29+03:00</news:publication_date>
      <news:title>CVE-2025-11762 — The HubSpot All-In-One Marketing - Forms, Popups, Live Chat</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:16:09+03:00</news:publication_date>
      <news:title>Delta Electronics AS320T Plagued by Critical DoS Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, denial-of-service, cwe-912</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:16:09+03:00</news:publication_date>
      <news:title>Critical Buffer Overflow in Delta Electronics AS320T PLC</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:16:08+03:00</news:publication_date>
      <news:title>Critical Buffer Overflow Hits Delta Electronics AS320T</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-6810 — The Booking Calendar Contact Form plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5428/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-5428 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5364/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:08+03:00</news:publication_date>
      <news:title>WordPress Plugin Flaw Exposes Sites to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5347/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-5347 — The HM Books Gallery plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1949/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:03+03:00</news:publication_date>
      <news:title>Critical RCE in Delta Electronics AS320T Industrial Controllers</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-131</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4536/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:03:39+03:00</news:publication_date>
      <news:title>AI-Generated &apos;Books&apos; Exploit Amazon&apos;s Kindle Unlimited, Generate Millions</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6947/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:23+03:00</news:publication_date>
      <news:title>D-Link DWM-222W Wi-Fi Adapter Vulnerable to Brute-Force Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-6393 — The BetterDocs plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5488/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-5488 — The ExactMetrics – Google Analytics Dashboard for WordPress</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41485/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:21+03:00</news:publication_date>
      <news:title>Kyverno Policy Engine Flaw: Cluster Crash and Admission Controller Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-617</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41324/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>Node.js FTP Clients Exposed to DoS via Malicious Listings</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41323/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>Kyverno API Call Vulnerability Exposes Kubernetes Clusters</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41319/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-41319 — Versions Prior To Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-41318 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79, cwe-116, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41068/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:19+03:00</news:publication_date>
      <news:title>Kyverno Privilege Escalation: RBAC Bypass in Multi-Tenant Clusters</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2028/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-2028 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>Ruby ERB Deserialization Flaw Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>OSSN Resource Exhaustion: DoS Risk from Malicious Image Uploads</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41305 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40254/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-40254 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-193</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>Actual Finance Tool: Local Admin Escalation via OIDC Migration Flaw</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-284, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>OP-TEE Vulnerability Exposes TrustZone to OOB Reads, Crashes</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-32952 — go-ntlmssp is a Go package that provides NTLM/Negotiate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/carnival-7-531-359-breached-accounts-se1n8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:58:19+03:00</news:publication_date>
      <news:title>Carnival Breach: ShinyHunters Exposes 7.5M Loyalty Program Accounts</news:title><news:keywords>data-breach, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31956/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-31956 — Xibo is an open source digital signage platform with a web</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31955/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-31955 — Versions Prior To Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31953/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T04:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-31953 — Versions Prior To Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40630/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:29+03:00</news:publication_date>
      <news:title>Critical Flaw in SenseLive X3050 Exposes Sensitive Configurations</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-288</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40623/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:28+03:00</news:publication_date>
      <news:title>SenseLive X3050 Vulnerability: Critical Configuration Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40620/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:28+03:00</news:publication_date>
      <news:title>SenseLive X3050: Critical Unauthenticated Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-40431 — A vulnerability exists in SenseLive X3050’s web management</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-319</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39462/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:28+03:00</news:publication_date>
      <news:title>SenseLive X3050: Password Changes Failing After Reset</news:title><news:keywords>vulnerability, cve, high-severity, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:28+03:00</news:publication_date>
      <news:title>SenseLive X3050 Critical Vulnerability: Client-Side Auth Bypass</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35064/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:27+03:00</news:publication_date>
      <news:title>SenseLive X3050 Vulnerability Exposes Management Interfaces Unauthenticated</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:27+03:00</news:publication_date>
      <news:title>Xibo Digital Signage Platform Hit with Critical SQL Injection</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89, cwe-184</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29051/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-29051 — Deployments That Explicitly Pass `--Persist-Lint-Results`; T Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-29050/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-29050 — melange allows users to build apk packages using</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27843/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:27+03:00</news:publication_date>
      <news:title>SenseLive X3050 Critical Vulnerability: Persistent Lockout, No Physical Reset</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27841/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:26+03:00</news:publication_date>
      <news:title>SenseLive X3050 CSRF Vulnerability: High Risk Remote Configuration Abuse</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25775/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:26+03:00</news:publication_date>
      <news:title>Critical Unauthenticated Firmware Flaws in SenseLive X3050</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25720/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-25720 — A vulnerability exists in SenseLive  X3050’s web management</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1789/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T03:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-1789 — A vulnerability in the browser-based remote management</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-807</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6732/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T02:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6732 — Libxml2 Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-843</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41355/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:42+03:00</news:publication_date>
      <news:title>OpenShell Mirror Mode Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41353/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:42+03:00</news:publication_date>
      <news:title>OpenClaw: High-Severity Access Control Bypass Looms</news:title><news:keywords>vulnerability, cve, high-severity, cwe-472</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41352/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:42+03:00</news:publication_date>
      <news:title>OpenClaw RCE: Paired Nodes Bypass Auth, Allow Arbitrary Commands</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:41+03:00</news:publication_date>
      <news:title>OpenClaw LLM Agent Bypass: Silent Execution Approval Disabled</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41347/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:41+03:00</news:publication_date>
      <news:title>OpenClaw CSRF Vulnerability: High-Severity Risk in Trusted-Proxy Deployments</news:title><news:keywords>vulnerability, cve, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41342/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:40+03:00</news:publication_date>
      <news:title>OpenClaw Authentication Bypass Poses Remote Onboarding Risk</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41336/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:39+03:00</news:publication_date>
      <news:title>OpenClaw Vulnerability: Arbitrary Code Execution via .env File Override</news:title><news:keywords>vulnerability, cve, high-severity, cwe-829</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:38+03:00</news:publication_date>
      <news:title>Critical SSRF in Microsoft Entra ID Entitlement Management</news:title><news:keywords>vulnerability, cve, critical, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33819/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:37+03:00</news:publication_date>
      <news:title>Critical Deserialization RCE in Microsoft Bing (CVE-2026-33819)</news:title><news:keywords>vulnerability, cve, critical, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33102/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:37+03:00</news:publication_date>
      <news:title>M365 Copilot Critical Open Redirect Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, critical, high-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:35+03:00</news:publication_date>
      <news:title>Critical SSRF in Microsoft Dynamics 365 Poses Spoofing Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32172/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:33+03:00</news:publication_date>
      <news:title>Microsoft Power Apps Vulnerability Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:26+03:00</news:publication_date>
      <news:title>Critical KTransformers Unsafe Deserialization Vulnerability (CVE-2026-26210)</news:title><news:keywords>vulnerability, cve, critical, high-severity, insecure-deserialization, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26150/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:23+03:00</news:publication_date>
      <news:title>Microsoft Purview SSRF: Privilege Escalation Risk</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24303/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T01:16:22+03:00</news:publication_date>
      <news:title>Critical Privilege Escalation in Microsoft Partner Center</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-pl-htqmk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:33:45+03:00</news:publication_date>
      <news:title>Breeze Cache Plugin Exploit: Unauthenticated File Upload Hits WordPress</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6942/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:06+03:00</news:publication_date>
      <news:title>Critical RCE Flaw in radare2-mcp: Command Injection via JSON-RPC</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6941/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-6941 — Its Project Notes Handling That Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:06+03:00</news:publication_date>
      <news:title>Radare2 Path Traversal Flaw: Local Attackers Can Delete Arbitrary Directories</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28525/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T00:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-28525 — The Multipart Upload Parser In Mongoose_multipart.C That Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-125, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/frontier-ai-and-the-future-of-defense-your-top-questions-an-1z8qk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:45:50+03:00</news:publication_date>
      <news:title>Frontier AI: CISO Questions and Defensive Realities</news:title><news:keywords>threat-intel, apt, malware, research</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41272/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise SSRF Bypass: DNS Rebinding Opens LLM Flows to Attackers</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41271/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise SSRF Vulnerability Exposes Internal Systems</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41270/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise SSRF Bypass: Internal Network at Risk</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-284, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41269/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise RCE via Malicious JavaScript Uploads</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41268/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise RCE: Unauthenticated Command Execution</news:title><news:keywords>vulnerability, cve, high-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41267/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:15+03:00</news:publication_date>
      <news:title>Flowise Cloud Vulnerability Exposes Multi-Tenant Environments</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41138/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:16:14+03:00</news:publication_date>
      <news:title>Flowise RCE: Unchecked Input Leads to Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/us-sanctions-cambodian-senator-for-millions-earned-through-s-h3to2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:07:00+03:00</news:publication_date>
      <news:title>US Sanctions Cambodian Senator for Massive Scam Compound Operations</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-23</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, cwe-20, cwe-190, cwe-345, cwe-1284, cwe-617</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>Contour Kubernetes Ingress: Lua Code Injection Leads to Envoy RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>Pretalx XSS: Organizer Search Exposes User Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>CVE-2026-41213 — @node-oauth/oauth2-server is a module for implementing an</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307, cwe-1289</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41173/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:29+03:00</news:publication_date>
      <news:title>CVE-2026-41173 — The AWS X-Ray Remote Sampler package provides a sampler</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41078/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:28+03:00</news:publication_date>
      <news:title>CVE-2026-41078 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40894/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:28+03:00</news:publication_date>
      <news:title>CVE-2026-40894 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40886/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:28+03:00</news:publication_date>
      <news:title>Argo Workflows Crash Loop: Malformed Annotation Halts Processing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-129</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31173/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:25+03:00</news:publication_date>
      <news:title>CVE-2026-31173 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31169/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:25+03:00</news:publication_date>
      <news:title>CVE-2026-31169 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31168/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31168 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31167 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31163/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31163 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31162/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:17:24+03:00</news:publication_date>
      <news:title>CVE-2026-31162 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-us-agency-breached-through-cisco-vulnerability-firest-imlfx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:03:00+03:00</news:publication_date>
      <news:title>CISA Breach: Cisco Vulnerability Led to Persistent Backdoor</news:title><news:keywords>threat-intel, data-breach, government, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4535/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T22:01:18+03:00</news:publication_date>
      <news:title>Firefox and Tor Browser Uniquely Vulnerable to Stable Identifier Leak</news:title><news:keywords>identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-s-g4igl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:59:39+03:00</news:publication_date>
      <news:title>Trigona Ransomware Leverages Custom Data Exfiltration Tool</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/surveillance-companies-exploiting-telecom-system-to-spy-on-t-69gpn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:43:00+03:00</news:publication_date>
      <news:title>Surveillance Firms Weaponize Telecom Flaws for Location Tracking</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6921/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-6921 — Race in GPU in Google Chrome on Windows prior to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-362, cwe-362</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6920/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:30+03:00</news:publication_date>
      <news:title>Chrome on Android GPU Vulnerability Allows Sandbox Escape</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41909/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41909 — Paired-Device Pairing Management That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41908/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-41908 — The Assistant-Media Route That Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40891/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-40891 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40182/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-40182 — OpenTelemetry dotnet is a dotnet telemetry framework. From</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31179/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-31179 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31176/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-31176 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31159/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-31159 — ToToLink A3300R Firmware Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-depl-khwgm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:16:00+03:00</news:publication_date>
      <news:title>UNC6692 Impersonates IT Helpdesk via Microsoft Teams with SNOW Malware</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8813/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:31:51+03:00</news:publication_date>
      <news:title>Bitwarden CLI npm Package Briefly Compromised in Supply Chain Attack</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41239 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79, cwe-1289</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41238/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-41238 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40472/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:25+03:00</news:publication_date>
      <news:title>Critical XSS in hackage-server via Malicious .cabal Metadata</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40471/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:25+03:00</news:publication_date>
      <news:title>Critical CSRF Flaw in hackage-server Poses Supply Chain Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:25+03:00</news:publication_date>
      <news:title>Critical XSS in Hackage Server Exposes User Sessions</news:title><news:keywords>vulnerability, cve, critical, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34003/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>X.Org X Server Flaw: Local Attackers Exploit OOB Memory Access</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>X.Org Server Flaw: Use-After-Free Threatens Linux Desktops</news:title><news:keywords>vulnerability, cve, high-severity, use-after-free, cwe-825</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33999/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>X.Org Server Underflow: Local RCE and DoS Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23751/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>Critical Kofax Capture RCE Vulnerability: Unauthenticated Access to Files and NTLMv2 Coercion</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-306, cwe-441</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62373/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:16:24+03:00</news:publication_date>
      <news:title>Critical RCE in Pipecat Python Framework: CVE-2025-62373</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool-g75f0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:05:12+03:00</news:publication_date>
      <news:title>Checkmarx KICS Supply Chain Compromise Exposes Developer Data</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-linked-hackers-targeted-mongolian-government-using-sla-5p8mn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:03:00+03:00</news:publication_date>
      <news:title>China-Linked GopherWhisper APT Targets Mongolian Government via Slack, Discord</news:title><news:keywords>threat-intel, data-breach, government, malware</news:keywords>
    </news:news>
  </url></urlset>
