<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 28, 2026 at 8:13 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32288-unbounded-allocation-for-old-gnu-sparse-in-archive-tar/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32288-unbounded-allocation-for-old-gnu-sparse-in-archive-tar/]]></link>
			<title>CVE-2026-32288 Unbounded allocation for old GNU sparse in archive/tar</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41254/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41254/]]></link>
			<title>CVE-2026-41254</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/how-a-small-business-can-get-real-returns-from-ai/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/how-a-small-business-can-get-real-returns-from-ai/]]></link>
			<title>How a small business can get real returns from AI</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/a-hidden-android-flaw-that-breaks-the-lock-screen-in-seconds/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/a-hidden-android-flaw-that-breaks-the-lock-screen-in-seconds/]]></link>
			<title>A hidden Android flaw that breaks the lock screen in seconds</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32077-windows-upnp-device-host-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32077-windows-upnp-device-host-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-32077 Windows UPnP Device Host Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/m5-macbook-air-vs-macbook-neo-which-apple-laptop-is-right-for-you/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/m5-macbook-air-vs-macbook-neo-which-apple-laptop-is-right-for-you/]]></link>
			<title>M5 MacBook Air vs. MacBook Neo: Which Apple laptop is right for you?</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32202-windows-shell-spoofing-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32202-windows-shell-spoofing-vulnerability/]]></link>
			<title>CVE-2026-32202 Windows Shell Spoofing Vulnerability</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0734-timing-attack-against-dsa/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0734-timing-attack-against-dsa/]]></link>
			<title>CVE-2018-0734 Timing attack against DSA</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21523-github-copilot-and-visual-studio-code-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21523-github-copilot-and-visual-studio-code-remote-code-execution-vulnerability/]]></link>
			<title>CVE-2026-21523 GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0735-timing-attack-against-ecdsa-signature-generation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0735-timing-attack-against-ecdsa-signature-generation/]]></link>
			<title>CVE-2018-0735 Timing attack against ECDSA signature generation</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/why-internet-based-calling-is-becoming-the-backbone-of-modern-business-operations/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/why-internet-based-calling-is-becoming-the-backbone-of-modern-business-operations/]]></link>
			<title>Why internet-based calling is becoming the backbone of modern business operations</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40372-asp-net-core-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40372-asp-net-core-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-40372 ASP.NET Core Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-26168-windows-ancillary-function-driver-for-winsock-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-26168-windows-ancillary-function-driver-for-winsock-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-26168 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23372-nfc-rawsock-cancel-tx_work-before-socket-teardown/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23372-nfc-rawsock-cancel-tx_work-before-socket-teardown/]]></link>
			<title>CVE-2026-23372 nfc: rawsock: cancel tx_work before socket teardown</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23371-sched-deadline-fix-missing-enqueue_replenish-during-pi-de-boosting/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23371-sched-deadline-fix-missing-enqueue_replenish-during-pi-de-boosting/]]></link>
			<title>CVE-2026-23371 sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23370-platform-x86-dell-wmi-sysman-dont-hex-dump-plaintext-password-data/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23370-platform-x86-dell-wmi-sysman-dont-hex-dump-plaintext-password-data/]]></link>
			<title>CVE-2026-23370 platform/x86: dell-wmi-sysman: Don&#039;t hex dump plaintext password data</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23368-net-phy-register-phy-led_triggers-during-probe-to-avoid-ab-ba-deadlock/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23368-net-phy-register-phy-led_triggers-during-probe-to-avoid-ab-ba-deadlock/]]></link>
			<title>CVE-2026-23368 net: phy: register phy led_triggers during probe to avoid AB-BA deadlock</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23364-ksmbd-compare-macs-in-constant-time/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23364-ksmbd-compare-macs-in-constant-time/]]></link>
			<title>CVE-2026-23364 ksmbd: Compare MACs in constant time</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23362-can-bcm-fix-locking-for-bcm_op-runtime-updates/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23362-can-bcm-fix-locking-for-bcm_op-runtime-updates/]]></link>
			<title>CVE-2026-23362 can: bcm: fix locking for bcm_op runtime updates</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31656-drm-i915-gt-fix-refcount-underflow-in-intel_engine_park_heartbeat/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31656-drm-i915-gt-fix-refcount-underflow-in-intel_engine_park_heartbeat/]]></link>
			<title>CVE-2026-31656 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23361-pci-dwc-ep-flush-msi-x-write-before-unmapping-its-atu-entry/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23361-pci-dwc-ep-flush-msi-x-write-before-unmapping-its-atu-entry/]]></link>
			<title>CVE-2026-23361 PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23359-bpf-fix-stack-out-of-bounds-write-in-devmap/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23359-bpf-fix-stack-out-of-bounds-write-in-devmap/]]></link>
			<title>CVE-2026-23359 bpf: Fix stack-out-of-bounds write in devmap</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23357-can-mcp251x-fix-deadlock-in-error-path-of-mcp251x_open/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23357-can-mcp251x-fix-deadlock-in-error-path-of-mcp251x_open/]]></link>
			<title>CVE-2026-23357 can: mcp251x: fix deadlock in error path of mcp251x_open</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23356-drbd-fix-logic-bug-in-drbd_al_begin_io_nonblock/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23356-drbd-fix-logic-bug-in-drbd_al_begin_io_nonblock/]]></link>
			<title>CVE-2026-23356 drbd: fix &quot;LOGIC BUG&quot; in drbd_al_begin_io_nonblock()</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23352-x86-efi-defer-freeing-of-boot-services-memory/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23352-x86-efi-defer-freeing-of-boot-services-memory/]]></link>
			<title>CVE-2026-23352 x86/efi: defer freeing of boot services memory</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31658-net-altera-tse-fix-skb-leak-on-dma-mapping-error-in-tse_start_xmit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31658-net-altera-tse-fix-skb-leak-on-dma-mapping-error-in-tse_start_xmit/]]></link>
			<title>CVE-2026-31658 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit()</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23351-netfilter-nft_set_pipapo-split-gc-into-unlink-and-reclaim-phase/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23351-netfilter-nft_set_pipapo-split-gc-into-unlink-and-reclaim-phase/]]></link>
			<title>CVE-2026-23351 netfilter: nft_set_pipapo: split gc into unlink and reclaim phase</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/microsoft-halts-automatic-copilot-rollout-for-windows/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/microsoft-halts-automatic-copilot-rollout-for-windows/]]></link>
			<title>Microsoft halts automatic Copilot rollout for Windows</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 00:40:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6297-use-after-free-in-proxy/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6297-use-after-free-in-proxy/]]></link>
			<title>Chromium: CVE-2026-6297 Use after free in Proxy</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6296-heap-buffer-overflow-in-angle/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6296-heap-buffer-overflow-in-angle/]]></link>
			<title>Chromium: CVE-2026-6296 Heap buffer overflow in ANGLE</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6364-out-of-bounds-read-in-skia/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6364-out-of-bounds-read-in-skia/]]></link>
			<title>Chromium: CVE-2026-6364 Out of bounds read in Skia</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6363-type-confusion-in-v8/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6363-type-confusion-in-v8/]]></link>
			<title>Chromium: CVE-2026-6363 Type Confusion in V8</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6362-use-after-free-in-codecs/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6362-use-after-free-in-codecs/]]></link>
			<title>Chromium: CVE-2026-6362 Use after free in Codecs</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4786-incomplete-mitigation-of-cve-2026-4519-�tion-expansion-for-command-injection-to-webbrowser-open/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4786-incomplete-mitigation-of-cve-2026-4519-�tion-expansion-for-command-injection-to-webbrowser-open/]]></link>
			<title>CVE-2026-4786 Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6100-use-after-free-in-lzma-lzmadecompressor-bz2-bz2decompressor-and-gzip-gzipfile-after-re-use-under-memory-pressure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6100-use-after-free-in-lzma-lzmadecompressor-bz2-bz2decompressor-and-gzip-gzipfile-after-re-use-under-memory-pressure/]]></link>
			<title>CVE-2026-6100 Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5160/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5160/]]></link>
			<title>CVE-2026-5160</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33056-tar-rs-unpack_in-can-chmod-arbitrary-directories-by-following-symlinks/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33056-tar-rs-unpack_in-can-chmod-arbitrary-directories-by-following-symlinks/]]></link>
			<title>CVE-2026-33056 tar-rs: unpack_in can chmod arbitrary directories by following symlinks</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33055-tar-rs-incorrectly-ignores-pax-size-headers-if-header-size-is-nonzero/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33055-tar-rs-incorrectly-ignores-pax-size-headers-if-header-size-is-nonzero/]]></link>
			<title>CVE-2026-33055 tar-rs incorrectly ignores PAX size headers if header size is nonzero</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6307-type-confusion-in-turbofan/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6307-type-confusion-in-turbofan/]]></link>
			<title>Chromium: CVE-2026-6307 Type Confusion in Turbofan</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6306-heap-buffer-overflow-in-pdfium/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6306-heap-buffer-overflow-in-pdfium/]]></link>
			<title>Chromium: CVE-2026-6306 Heap buffer overflow in PDFium</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6305-heap-buffer-overflow-in-pdfium/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6305-heap-buffer-overflow-in-pdfium/]]></link>
			<title>Chromium: CVE-2026-6305 Heap buffer overflow in PDFium</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6304-use-after-free-in-graphite/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6304-use-after-free-in-graphite/]]></link>
			<title>Chromium: CVE-2026-6304 Use after free in Graphite</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6303-use-after-free-in-codecs/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6303-use-after-free-in-codecs/]]></link>
			<title>Chromium: CVE-2026-6303 Use after free in Codecs</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6302-use-after-free-in-video/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6302-use-after-free-in-video/]]></link>
			<title>Chromium: CVE-2026-6302 Use after free in Video</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6301-type-confusion-in-turbofan/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6301-type-confusion-in-turbofan/]]></link>
			<title>Chromium: CVE-2026-6301 Type Confusion in Turbofan</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6300-use-after-free-in-css/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6300-use-after-free-in-css/]]></link>
			<title>Chromium: CVE-2026-6300 Use after free in CSS</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6299-use-after-free-in-prerender/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6299-use-after-free-in-prerender/]]></link>
			<title>Chromium: CVE-2026-6299 Use after free in Prerender</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6298-heap-buffer-overflow-in-skia/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6298-heap-buffer-overflow-in-skia/]]></link>
			<title>Chromium: CVE-2026-6298 Heap buffer overflow in Skia</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
				</channel>
</rss>
