<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 11, 2026 at 4:52 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/choosing-the-right-vpn-for-your-business/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/choosing-the-right-vpn-for-your-business/]]></link>
			<title>Choosing the right VPN for your business</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/simple-fixes-for-better-home-wi-fi/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/simple-fixes-for-better-home-wi-fi/]]></link>
			<title>Simple fixes for better home Wi-Fi</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31575-mm-userfaultfd-fix-hugetlb-fault-mutex-hash-calculation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31575-mm-userfaultfd-fix-hugetlb-fault-mutex-hash-calculation/]]></link>
			<title>CVE-2026-31575 mm/userfaultfd: fix hugetlb fault mutex hash calculation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39779-btrfs-subpage-keep-towrite-tag-until-folio-is-cleaned/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39779-btrfs-subpage-keep-towrite-tag-until-folio-is-cleaned/]]></link>
			<title>CVE-2025-39779 btrfs: subpage: keep TOWRITE tag until folio is cleaned</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43311-soc-tegra-pmc-fix-unsafe-generic_handle_irq-call/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43311-soc-tegra-pmc-fix-unsafe-generic_handle_irq-call/]]></link>
			<title>CVE-2026-43311 soc/tegra: pmc: Fix unsafe generic_handle_irq() call</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21634-cgroup-cpuset-remove-kernfs-active-break/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21634-cgroup-cpuset-remove-kernfs-active-break/]]></link>
			<title>CVE-2025-21634 cgroup/cpuset: remove kernfs active break</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31568-s390-mm-add-missing-secure-storage-access-fixups-for-donated-memory/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31568-s390-mm-add-missing-secure-storage-access-fixups-for-donated-memory/]]></link>
			<title>CVE-2026-31568 s390/mm: Add missing secure storage access fixups for donated memory</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39707-drm-amdgpu-check-if-hubbub-is-null-in-debugfs-amdgpu_dm_capabilities/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39707-drm-amdgpu-check-if-hubbub-is-null-in-debugfs-amdgpu_dm_capabilities/]]></link>
			<title>CVE-2025-39707 drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43398-drm-amdgpu-add-upper-bound-check-on-user-inputs-in-wait-ioctl/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43398-drm-amdgpu-add-upper-bound-check-on-user-inputs-in-wait-ioctl/]]></link>
			<title>CVE-2026-43398 drm/amdgpu: add upper bound check on user inputs in wait ioctl</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/why-voip-scams-keep-spreading-and-why-theyre-hard-to-stop/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/why-voip-scams-keep-spreading-and-why-theyre-hard-to-stop/]]></link>
			<title>Why VoIP scams keep spreading, and why they’re hard to stop</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21635-rds-sysctl-rds_tcp_rcvsndbuf-avoid-using-current-nsproxy/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21635-rds-sysctl-rds_tcp_rcvsndbuf-avoid-using-current-nsproxy/]]></link>
			<title>CVE-2025-21635 rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current-&gt;nsproxy</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52586-drm-msm-dpu-add-mutex-lock-in-control-vblank-irq/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52586-drm-msm-dpu-add-mutex-lock-in-control-vblank-irq/]]></link>
			<title>CVE-2023-52586 drm/msm/dpu: Add mutex lock in control vblank irq</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39746-wifi-ath10k-shutdown-driver-when-hardware-is-unreliable/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39746-wifi-ath10k-shutdown-driver-when-hardware-is-unreliable/]]></link>
			<title>CVE-2025-39746 wifi: ath10k: shutdown driver when hardware is unreliable</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31579-wireguard-device-use-exit_rtnl-callback-instead-of-manual-rtnl_lock-in-pre_exit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31579-wireguard-device-use-exit_rtnl-callback-instead-of-manual-rtnl_lock-in-pre_exit/]]></link>
			<title>CVE-2026-31579 wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21696-mm-clear-uffd-wp-pte-pmd-state-on-mremap/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21696-mm-clear-uffd-wp-pte-pmd-state-on-mremap/]]></link>
			<title>CVE-2025-21696 mm: clear uffd-wp PTE/PMD state on mremap()</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39762-drm-amd-display-add-null-check/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39762-drm-amd-display-add-null-check/]]></link>
			<title>CVE-2025-39762 drm/amd/display: add null check</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43308-btrfs-dont-bug-on-unexpected-delayed-ref-type-in-run_one_delayed_ref/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43308-btrfs-dont-bug-on-unexpected-delayed-ref-type-in-run_one_delayed_ref/]]></link>
			<title>CVE-2026-43308 btrfs: don&#039;t BUG() on unexpected delayed ref type in run_one_delayed_ref()</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21672-afs-fix-merge-preference-rule-failure-condition/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-21672-afs-fix-merge-preference-rule-failure-condition/]]></link>
			<title>CVE-2025-21672 afs: Fix merge preference rule failure condition</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39754-mm-smaps-fix-race-between-smaps_hugetlb_range-and-migration/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39754-mm-smaps-fix-race-between-smaps_hugetlb_range-and-migration/]]></link>
			<title>CVE-2025-39754 mm/smaps: fix race between smaps_hugetlb_range and migration</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43421-usb-gadget-f_ncm-fix-net_device-lifecycle-with-device_move/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43421-usb-gadget-f_ncm-fix-net_device-lifecycle-with-device_move/]]></link>
			<title>CVE-2026-43421 usb: gadget: f_ncm: Fix net_device lifecycle with device_move</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42501-malicious-module-proxy-can-bypass-checksum-database-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42501-malicious-module-proxy-can-bypass-checksum-database-in-cmd-go/]]></link>
			<title>CVE-2026-42501 Malicious module proxy can bypass checksum database in cmd/go</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42499-quadratic-string-concatenation-in-consumephrase-in-net-mail/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42499-quadratic-string-concatenation-in-consumephrase-in-net-mail/]]></link>
			<title>CVE-2026-42499 Quadratic string concatenation in consumePhrase in net/mail</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39747-drm-msm-add-error-handling-for-krealloc-in-metadata-setup/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-39747-drm-msm-add-error-handling-for-krealloc-in-metadata-setup/]]></link>
			<title>CVE-2025-39747 drm/msm: Add error handling for krealloc in metadata setup</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:35:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39836-panic-in-dial-and-lookupport-when-handling-nul-byte-on-windows-in-net/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39836-panic-in-dial-and-lookupport-when-handling-nul-byte-on-windows-in-net/]]></link>
			<title>CVE-2026-39836 Panic in Dial and LookupPort when handling NUL byte on Windows in net</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39826-escaper-bypass-leads-to-xss-in-html-template/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39826-escaper-bypass-leads-to-xss-in-html-template/]]></link>
			<title>CVE-2026-39826 Escaper bypass leads to XSS in html/template</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39825-reverseproxy-forwards-queries-with-more-than-urlmaxqueryparams-parameters-in-net-http-httputil/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39825-reverseproxy-forwards-queries-with-more-than-urlmaxqueryparams-parameters-in-net-http-httputil/]]></link>
			<title>CVE-2026-39825 ReverseProxy forwards queries with more than urlmaxqueryparams parameters in net/http/httputil</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39823-bypass-of-meta-content-url-escaping-causes-xss-in-html-template/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39823-bypass-of-meta-content-url-escaping-causes-xss-in-html-template/]]></link>
			<title>CVE-2026-39823 Bypass of meta content URL escaping causes XSS in html/template</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39820-quadratic-string-concatentation-in-consumecomment-in-net-mail/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39820-quadratic-string-concatentation-in-consumecomment-in-net-mail/]]></link>
			<title>CVE-2026-39820 Quadratic string concatentation in consumeComment in net/mail</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39819-invoking-go-bug-follows-symlinks-in-predictable-temporary-filenames-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39819-invoking-go-bug-follows-symlinks-in-predictable-temporary-filenames-in-cmd-go/]]></link>
			<title>CVE-2026-39819 Invoking &quot;go bug&quot; follows symlinks in predictable temporary filenames in cmd/go</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39817-invoking-go-tool-pack-does-not-sanitize-output-paths-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39817-invoking-go-tool-pack-does-not-sanitize-output-paths-in-cmd-go/]]></link>
			<title>CVE-2026-39817 Invoking &quot;go tool pack&quot; does not sanitize output paths in cmd/go</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33814-infinite-loop-in-http-2-transport-when-given-bad-settings_max_frame_size-in-net-http-internal-http2-in-golang-org-x-net/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33814-infinite-loop-in-http-2-transport-when-given-bad-settings_max_frame_size-in-net-http-internal-http2-in-golang-org-x-net/]]></link>
			<title>CVE-2026-33814 Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33811-crash-when-handling-long-cname-response-in-net/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33811-crash-when-handling-long-cname-response-in-net/]]></link>
			<title>CVE-2026-33811 Crash when handling long CNAME response in net</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44656-vim-os-command-injection-via-path-completion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44656-vim-os-command-injection-via-path-completion/]]></link>
			<title>CVE-2026-44656 Vim: OS Command Injection via &#039;path&#039; completion</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-45130-vim-heap-buffer-overflow-in-spell-file-loading/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-45130-vim-heap-buffer-overflow-in-spell-file-loading/]]></link>
			<title>CVE-2026-45130 Vim: Heap Buffer Overflow in spell file loading</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6666-pgbouncer-crash-in-kill_pool_logins_server_error/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6666-pgbouncer-crash-in-kill_pool_logins_server_error/]]></link>
			<title>CVE-2026-6666 PgBouncer crash in kill_pool_logins_server_error</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6667-pgbouncer-missing-authorization-check-in-kill_client-admin-command/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6667-pgbouncer-missing-authorization-check-in-kill_client-admin-command/]]></link>
			<title>CVE-2026-6667 PgBouncer missing authorization check in KILL_CLIENT admin command</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6665-pgbouncer-buffer-overflow-in-scram/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6665-pgbouncer-buffer-overflow-in-scram/]]></link>
			<title>CVE-2026-6665 PgBouncer buffer overflow in SCRAM</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37457/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37457/]]></link>
			<title>CVE-2026-37457</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:04:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40170-ngtcp2-has-a-qlog-transport-parameter-serialization-stack-buffer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40170-ngtcp2-has-a-qlog-transport-parameter-serialization-stack-buffer-overflow/]]></link>
			<title>CVE-2026-40170 ngtcp2 has a qlog transport parameter serialization stack buffer overflow</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:04:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42798/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42798/]]></link>
			<title>CVE-2026-42798</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:04:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6664-pgbouncer-integer-overflow-in-pgbouncer-network-packet-parsing/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6664-pgbouncer-integer-overflow-in-pgbouncer-network-packet-parsing/]]></link>
			<title>CVE-2026-6664 PgBouncer integer overflow in PgBouncer network packet parsing</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3832-gnutls-gnutls-security-bypass-allows-acceptance-of-revoked-server-certificates-via-crafted-ocsp-response/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3832-gnutls-gnutls-security-bypass-allows-acceptance-of-revoked-server-certificates-via-crafted-ocsp-response/]]></link>
			<title>CVE-2026-3832 Gnutls: gnutls: security bypass allows acceptance of revoked server certificates via crafted ocsp response</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41889-pgx-sql-injection-via-placeholder-confusion-with-dollar-quoted-string-literals/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41889-pgx-sql-injection-via-placeholder-confusion-with-dollar-quoted-string-literals/]]></link>
			<title>CVE-2026-41889 pgx: SQL Injection via placeholder confusion with dollar quoted string literals</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33079-mistune-redos-in-link_title_re-allows-denial-of-service-with-crafted-markdown-titles/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33079-mistune-redos-in-link_title_re-allows-denial-of-service-with-crafted-markdown-titles/]]></link>
			<title>CVE-2026-33079 Mistune ReDoS in LINK_TITLE_RE allows denial of service with crafted Markdown titles</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/elevate-your-business-data-analysis-with-key-excel-tools/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/elevate-your-business-data-analysis-with-key-excel-tools/]]></link>
			<title>Elevate your business data analysis with key Excel tools</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41080/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41080/]]></link>
			<title>CVE-2026-41080</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28532-frrouting-10-5-3-integer-overflow-in-ospf-tlv-parser-functions/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28532-frrouting-10-5-3-integer-overflow-in-ospf-tlv-parser-functions/]]></link>
			<title>CVE-2026-28532 FRRouting &lt; 10.5.3 Integer Overflow in OSPF TLV Parser Functions</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32148-lockfile-checksums-not-verified-in-hex-allows-dependency-integrity-bypass/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32148-lockfile-checksums-not-verified-in-hex-allows-dependency-integrity-bypass/]]></link>
			<title>CVE-2026-32148 Lockfile checksums not verified in Hex allows dependency integrity bypass</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
				</channel>
</rss>
