<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 2:25 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/3-reasons-you-should-turn-off-location-services-on-your-android-right-now/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/3-reasons-you-should-turn-off-location-services-on-your-android-right-now/]]></link>
			<title>3 Reasons you should turn off location services on your Android right now</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:23:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33750-brace-expansion-zero-step-sequence-causes-process-hang-and-memory-exhaustion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33750-brace-expansion-zero-step-sequence-causes-process-hang-and-memory-exhaustion/]]></link>
			<title>CVE-2026-33750 brace-expansion: Zero-step sequence causes process hang and memory exhaustion</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></link>
			<title>Unlock business growth with email automation</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32287-infinite-loop-in-github-com-antchfx-xpath/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32287-infinite-loop-in-github-com-antchfx-xpath/]]></link>
			<title>CVE-2026-32287 Infinite loop in github.com/antchfx/xpath</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29785-nats-server-panic-via-malicious-compression-on-leafnode-port/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29785-nats-server-panic-via-malicious-compression-on-leafnode-port/]]></link>
			<title>CVE-2026-29785 NATS Server panic via malicious compression on leafnode port</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33216-nats-has-mqtt-plaintext-password-disclosure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33216-nats-has-mqtt-plaintext-password-disclosure/]]></link>
			<title>CVE-2026-33216 NATS has MQTT plaintext password disclosure</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33416-libpng-has-use-after-free-via-pointer-aliasing-in-png_set_trns-and-png_set_plte/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33416-libpng-has-use-after-free-via-pointer-aliasing-in-png_set_trns-and-png_set_plte/]]></link>
			<title>CVE-2026-33416 LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2436-libsoup-libsoup-denial-of-service-via-use-after-free-in-soupserver-during-tls-handshake/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2436-libsoup-libsoup-denial-of-service-via-use-after-free-in-soupserver-during-tls-handshake/]]></link>
			<title>CVE-2026-2436 Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4732-out-of-bounds-read-overflow-in-tildearrow-furnace/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4732-out-of-bounds-read-overflow-in-tildearrow-furnace/]]></link>
			<title>CVE-2026-4732 Out-of-bounds Read Overflow in tildearrow/furnace</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4897-polkit-polkit-denial-of-service-via-unbounded-input-processing-through-standard-input/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4897-polkit-polkit-denial-of-service-via-unbounded-input-processing-through-standard-input/]]></link>
			<title>CVE-2026-4897 Polkit: polkit: denial of service via unbounded input processing through standard input</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34714/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34714/]]></link>
			<title>CVE-2026-34714</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33636-libpng-has-arm-neon-palette-expansion-out-of-bounds-read-on-aarch64/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33636-libpng-has-arm-neon-palette-expansion-out-of-bounds-read-on-aarch64/]]></link>
			<title>CVE-2026-33636 LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33542-incus-does-not-verify-combined-fingerprint-when-downloading-images-from-simplestreams-servers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33542-incus-does-not-verify-combined-fingerprint-when-downloading-images-from-simplestreams-servers/]]></link>
			<title>CVE-2026-33542 Incus does not verify combined fingerprint when downloading images from simplestreams servers</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34353/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34353/]]></link>
			<title>CVE-2026-34353</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21712/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21712/]]></link>
			<title>CVE-2026-21712</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0964-libssh-improper-sanitation-of-paths-received-from-scp-servers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0964-libssh-improper-sanitation-of-paths-received-from-scp-servers/]]></link>
			<title>CVE-2026-0964 Libssh: improper sanitation of paths received from scp servers</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34043-serialize-javascript-has-cpu-exhaustion-denial-of-service-via-crafted-array-like-objects/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34043-serialize-javascript-has-cpu-exhaustion-denial-of-service-via-crafted-array-like-objects/]]></link>
			<title>CVE-2026-34043 Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0966-libssh-buffer-underflow-in-ssh_get_hexa-on-invalid-input/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0966-libssh-buffer-underflow-in-ssh_get_hexa-on-invalid-input/]]></link>
			<title>CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0967-libssh-libssh-denial-of-service-via-inefficient-regular-expression-processing/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0967-libssh-libssh-denial-of-service-via-inefficient-regular-expression-processing/]]></link>
			<title>CVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processing</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33936-python-ecdsa-denial-of-service-via-improper-der-length-validation-in-crafted-private-keys/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33936-python-ecdsa-denial-of-service-via-improper-der-length-validation-in-crafted-private-keys/]]></link>
			<title>CVE-2026-33936 python-ecdsa: Denial of Service via improper DER length validation in crafted private keys</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0965-libssh-libssh-denial-of-service-via-improper-configuration-file-handling/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0965-libssh-libssh-denial-of-service-via-improper-configuration-file-handling/]]></link>
			<title>CVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handling</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-67030/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-67030/]]></link>
			<title>CVE-2025-67030</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5107-frrouting-frr-evpn-type-2-route-bgp_evpn-c-process_type2_route-access-control/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5107-frrouting-frr-evpn-type-2-route-bgp_evpn-c-process_type2_route-access-control/]]></link>
			<title>CVE-2026-5107 FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4645-github-com-antchfx-xpath-xpath-denial-of-service-via-crafted-boolean-xpath-expressions/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4645-github-com-antchfx-xpath-xpath-denial-of-service-via-crafted-boolean-xpath-expressions/]]></link>
			<title>CVE-2026-4645 Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4746-heap-buffer-over-write-vulenrabilty-in-timeplus-io-proton/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4746-heap-buffer-over-write-vulenrabilty-in-timeplus-io-proton/]]></link>
			<title>CVE-2026-4746 Heap Buffer Over-Write Vulenrabilty in timeplus-io/proton</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-41013-xfs-dont-walk-off-the-end-of-a-directory-data-block/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-41013-xfs-dont-walk-off-the-end-of-a-directory-data-block/]]></link>
			<title>CVE-2024-41013 xfs: don&#039;t walk off the end of a directory data block</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-35839-netfilter-bridge-replace-physindev-with-physinif-in-nf_bridge_info/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-35839-netfilter-bridge-replace-physindev-with-physinif-in-nf_bridge_info/]]></link>
			<title>CVE-2024-35839 netfilter: bridge: replace physindev with physinif in nf_bridge_info</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52676-bpf-guard-stack-limits-against-32bit-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52676-bpf-guard-stack-limits-against-32bit-overflow/]]></link>
			<title>CVE-2023-52676 bpf: Guard stack limits against 32bit overflow</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29111-systemd-local-unprivileged-user-can-trigger-an-assert/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29111-systemd-local-unprivileged-user-can-trigger-an-assert/]]></link>
			<title>CVE-2026-29111 systemd: Local unprivileged user can trigger an assert</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21711/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21711/]]></link>
			<title>CVE-2026-21711</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21713/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21713/]]></link>
			<title>CVE-2026-21713</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21716/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21716/]]></link>
			<title>CVE-2026-21716</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21714/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21714/]]></link>
			<title>CVE-2026-21714</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33937-handlebars-js-has-javascript-injection-via-ast-type-confusion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33937-handlebars-js-has-javascript-injection-via-ast-type-confusion/]]></link>
			<title>CVE-2026-33937 Handlebars.js has JavaScript Injection via AST Type Confusion</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23367-wifi-radiotap-reject-radiotap-with-unknown-bits/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23367-wifi-radiotap-reject-radiotap-with-unknown-bits/]]></link>
			<title>CVE-2026-23367 wifi: radiotap: reject radiotap with unknown bits</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23389-ice-fix-memory-leak-in-ice_set_ringparam/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23389-ice-fix-memory-leak-in-ice_set_ringparam/]]></link>
			<title>CVE-2026-23389 ice: Fix memory leak in ice_set_ringparam()</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23327-cxl-mbox-validate-payload-size-before-accessing-contents-in-cxl_payload_from_user_allowed/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23327-cxl-mbox-validate-payload-size-before-accessing-contents-in-cxl_payload_from_user_allowed/]]></link>
			<title>CVE-2026-23327 cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed()</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23343-xdp-produce-a-warning-when-calculated-tailroom-is-negative/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23343-xdp-produce-a-warning-when-calculated-tailroom-is-negative/]]></link>
			<title>CVE-2026-23343 xdp: produce a warning when calculated tailroom is negative</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66413-git-for-windows-leaks-ntlm-hash-when-cloning-from-an-attacker-controlled-server/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66413-git-for-windows-leaks-ntlm-hash-when-cloning-from-an-attacker-controlled-server/]]></link>
			<title>CVE-2025-66413 Git for Windows leaks NTLM hash when cloning from an attacker-controlled server</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2297-sourcelessfileloader-does-not-use-io-open_code/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2297-sourcelessfileloader-does-not-use-io-open_code/]]></link>
			<title>CVE-2026-2297 SourcelessFileLoader does not use io.open_code()</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-68357-iomap-allocate-s_dio_done_wq-for-async-reads-as-well/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-68357-iomap-allocate-s_dio_done_wq-for-async-reads-as-well/]]></link>
			<title>CVE-2025-68357 iomap: allocate s_dio_done_wq for async reads as well</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-45336-sensitive-headers-incorrectly-sent-after-cross-domain-redirect-in-net-http/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-45336-sensitive-headers-incorrectly-sent-after-cross-domain-redirect-in-net-http/]]></link>
			<title>CVE-2024-45336 Sensitive headers incorrectly sent after cross-domain redirect in net/http</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23324-can-usb-etas_es58x-correctly-anchor-the-urb-in-the-read-bulk-callback/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23324-can-usb-etas_es58x-correctly-anchor-the-urb-in-the-read-bulk-callback/]]></link>
			<title>CVE-2026-23324 can: usb: etas_es58x: correctly anchor the urb in the read bulk callback</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 14:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-45341-usage-of-ipv6-zone-ids-can-bypass-uri-name-constraints-in-crypto-x509/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-45341-usage-of-ipv6-zone-ids-can-bypass-uri-name-constraints-in-crypto-x509/]]></link>
			<title>CVE-2024-45341 Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/windows-11-update-new-features-you-need-to-know-about/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/windows-11-update-new-features-you-need-to-know-about/]]></link>
			<title>Windows 11 update: New features you need to know about</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 18:34:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23393-bridge-cfm-fix-race-condition-in-peer_mep-deletion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23393-bridge-cfm-fix-race-condition-in-peer_mep-deletion/]]></link>
			<title>CVE-2026-23393 bridge: cfm: Fix race condition in peer_mep deletion</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23284-net-ethernet-mtk_eth_soc-reset-prog-ptr-to-old_prog-in-case-of-error-in-mtk_xdp_setup/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23284-net-ethernet-mtk_eth_soc-reset-prog-ptr-to-old_prog-in-case-of-error-in-mtk_xdp_setup/]]></link>
			<title>CVE-2026-23284 net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup()</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/unmistakable-signs-that-you-should-get-a-new-mac-in-2026/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/unmistakable-signs-that-you-should-get-a-new-mac-in-2026/]]></link>
			<title>Unmistakable signs that you should get a new Mac in 2026</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 01:33:12 +0000]]></pubDate>
		</item>
				</channel>
</rss>
