<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 24, 2026 at 5:33 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41636-apache-thrift-node-js-skip-recursion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41636-apache-thrift-node-js-skip-recursion/]]></link>
			<title>CVE-2026-41636 Apache Thrift: Node.js skip() recursion</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43619-rsync-3-4-3-symlink-race-condition-via-path-based-syscalls/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43619-rsync-3-4-3-symlink-race-condition-via-path-based-syscalls/]]></link>
			<title>CVE-2026-43619 Rsync &lt; 3.4.3 Symlink Race Condition via Path-Based Syscalls</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:44:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44673-libyang-lyb_read_string-integer-overflow-→-heap-buffer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44673-libyang-lyb_read_string-integer-overflow-→-heap-buffer-overflow/]]></link>
			<title>CVE-2026-44673 libyang: lyb_read_string() integer overflow → heap buffer overflow</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-68768-inet-frags-flush-pending-skbs-in-fqdir_pre_exit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-68768-inet-frags-flush-pending-skbs-in-fqdir_pre_exit/]]></link>
			<title>CVE-2025-68768 inet: frags: flush pending skbs in fqdir_pre_exit()</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:42:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44390-unbounded-name-compression-in-certain-cases-causes-degradation-of-service/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44390-unbounded-name-compression-in-certain-cases-causes-degradation-of-service/]]></link>
			<title>CVE-2026-44390 Unbounded name compression in certain cases causes degradation of service</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-51480-path-traversal-vulnerability-in-onnx-external_data_helper-save_external_data-in-onnx-1-17-0-allows-attackers-to-overwrite-arbitrary-files-by-supplying-crafted-external_data-location-pat/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-51480-path-traversal-vulnerability-in-onnx-external_data_helper-save_external_data-in-onnx-1-17-0-allows-attackers-to-overwrite-arbitrary-files-by-supplying-crafted-external_data-location-pat/]]></link>
			<title>CVE-2025-51480 Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences, bypassing intended directory restrictions.</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42944-heap-overflow-with-multiple-nsid-cookie-padding-edns-options/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42944-heap-overflow-with-multiple-nsid-cookie-padding-edns-options/]]></link>
			<title>CVE-2026-42944 Heap overflow with multiple NSID, COOKIE, PADDING EDNS options</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42923-degradation-of-service-with-unbounded-nsec3-hash-calculations/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42923-degradation-of-service-with-unbounded-nsec3-hash-calculations/]]></link>
			<title>CVE-2026-42923 Degradation of service with unbounded NSEC3 hash calculations</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-38096-wifi-iwlwifi-dont-warn-when-if-there-is-a-fw-error/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-38096-wifi-iwlwifi-dont-warn-when-if-there-is-a-fw-error/]]></link>
			<title>CVE-2025-38096 wifi: iwlwifi: don&#039;t warn when if there is a FW error</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40622-another-ghost-domain-names-attack-variant/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40622-another-ghost-domain-names-attack-variant/]]></link>
			<title>CVE-2026-40622 Another &#039;ghost domain names&#039; attack variant</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-38140-dm-limit-swapping-tables-for-devices-with-zone-write-plugs/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-38140-dm-limit-swapping-tables-for-devices-with-zone-write-plugs/]]></link>
			<title>CVE-2025-38140 dm: limit swapping tables for devices with zone write plugs</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42534-jostle-logic-bypass-degrades-resolution-performance/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42534-jostle-logic-bypass-degrades-resolution-performance/]]></link>
			<title>CVE-2026-42534 Jostle logic bypass degrades resolution performance</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:40:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41292-long-list-of-incoming-edns-options-degrades-performance/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41292-long-list-of-incoming-edns-options-degrades-performance/]]></link>
			<title>CVE-2026-41292 Long list of incoming EDNS options degrades performance</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:39:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/7-windows-11-features-smbs-should-use/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/7-windows-11-features-smbs-should-use/]]></link>
			<title>7 Windows 11 features SMBs should use</title>
			<pubDate><![CDATA[Tue, 19 May 2026 19:26:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/elevating-search-rankings-through-smart-image-optimization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/elevating-search-rankings-through-smart-image-optimization/]]></link>
			<title>Elevating search rankings through smart image optimization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25833-mbed-tls-3-5-0-to-3-6-5-fixed-in-3-6-6-and-4-1-0-has-a-buffer-overflow-in-the-x509_inet_pton_ipv6-function/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25833-mbed-tls-3-5-0-to-3-6-5-fixed-in-3-6-6-and-4-1-0-has-a-buffer-overflow-in-the-x509_inet_pton_ipv6-function/]]></link>
			<title>CVE-2026-25833 Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x509_inet_pton_ipv6() function</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25834-mbed-tls-v3-3-0-up-to-3-6-5-and-4-0-0-allows-algorithm-downgrade/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-25834-mbed-tls-v3-3-0-up-to-3-6-5-and-4-0-0-allows-algorithm-downgrade/]]></link>
			<title>CVE-2026-25834 Mbed TLS v3.3.0 up to 3.6.5 and 4.0.0 allows Algorithm Downgrade.</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33278-possible-arbitrary-code-execution-during-dnssec-validation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33278-possible-arbitrary-code-execution-during-dnssec-validation/]]></link>
			<title>CVE-2026-33278 Possible arbitrary code execution during DNSSEC validation</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:39:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/5-ways-softphones-help-businesses-work-smarter/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/5-ways-softphones-help-businesses-work-smarter/]]></link>
			<title>5 Ways softphones help businesses work smarter</title>
			<pubDate><![CDATA[Tue, 19 May 2026 19:26:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41035-in-rsync-3-0-1-through-3-4-1-receive_xattr-relies-on-an-untrusted-length-value-during-a-qsort-call-leading-to-a-receiver-use-after-free-the-victim-must-run-rsync-with-x-aka-xattr/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41035-in-rsync-3-0-1-through-3-4-1-receive_xattr-relies-on-an-untrusted-length-value-during-a-qsort-call-leading-to-a-receiver-use-after-free-the-victim-must-run-rsync-with-x-aka-xattr/]]></link>
			<title>CVE-2026-41035 In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka &#8211;xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:39:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44608-use-after-free-and-crash-under-special-conditions-in-rpz-code/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44608-use-after-free-and-crash-under-special-conditions-in-rpz-code/]]></link>
			<title>CVE-2026-44608 Use after free and crash under special conditions in RPZ code</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:39:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42959-crash-during-dnssec-validation-of-malicious-content/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42959-crash-during-dnssec-validation-of-malicious-content/]]></link>
			<title>CVE-2026-42959 Crash during DNSSEC validation of malicious content</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:39:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42960-possible-cache-poisoning-via-promiscuous-records-for-the-authority-section/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42960-possible-cache-poisoning-via-promiscuous-records-for-the-authority-section/]]></link>
			<title>CVE-2026-42960 Possible cache poisoning via promiscuous records for the authority section</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:39:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32792-packet-of-death-with-dnscrypt/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32792-packet-of-death-with-dnscrypt/]]></link>
			<title>CVE-2026-32792 Packet of death with DNSCrypt</title>
			<pubDate><![CDATA[Sat, 23 May 2026 13:39:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34872-an-issue-was-discovered-in-mbed-tls-3-5-x-and-3-6-x-through-3-6-5-and-tf-psa-crypto-1-0-there-is-a-lack-of-contributory-behavior-in-ffdh-due-to-improper-input-validation-using-finite/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34872-an-issue-was-discovered-in-mbed-tls-3-5-x-and-3-6-x-through-3-6-5-and-tf-psa-crypto-1-0-there-is-a-lack-of-contributory-behavior-in-ffdh-due-to-improper-input-validation-using-finite/]]></link>
			<title>CVE-2026-34872 An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using finite-field Diffie-Hellman, the other party can force the shared secret into a small set of values (lack of contributory behavior). This is a problem for protocols that depend on contributory behavior (which is not the case for TLS). The attack can be carried by the peer, or depending on the protocol by an active network attacker (person in the middle).</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41054-missing-exit-out-of-permission-check-in-haveged-could-lead-to-root-exploit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41054-missing-exit-out-of-permission-check-in-haveged-could-lead-to-root-exploit/]]></link>
			<title>CVE-2026-41054 Missing exit out of permission check in haveged could lead to root exploit</title>
			<pubDate><![CDATA[Sun, 24 May 2026 13:42:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34871-an-issue-was-discovered-in-mbed-tls-before-3-6-6-and-4-x-before-4-1-0-and-tf-psa-crypto-before-1-1-0-there-is-a-predictable-seed-in-a-pseudo-random-number-generator-prng/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34871-an-issue-was-discovered-in-mbed-tls-before-3-6-6-and-4-x-before-4-1-0-and-tf-psa-crypto-before-1-1-0-there-is-a-predictable-seed-in-a-pseudo-random-number-generator-prng/]]></link>
			<title>CVE-2026-34871 An issue was discovered in Mbed TLS before 3.6.6 and 4.x before 4.1.0 and TF-PSA-Crypto before 1.1.0. There is a Predictable Seed in a Pseudo-Random Number Generator (PRNG).</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7210-the-expat-and-elementtree-parsers-use-insufficient-entropy-for-xml-hash-flooding-protection/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7210-the-expat-and-elementtree-parsers-use-insufficient-entropy-for-xml-hash-flooding-protection/]]></link>
			<title>CVE-2026-7210 The expat and elementtree parsers use insufficient entropy for XML hash-flooding protection</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34873-an-issue-was-discovered-in-mbed-tls-3-5-0-through-4-0-0-client-impersonation-can-occur-while-resuming-a-tls-1-3-session/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34873-an-issue-was-discovered-in-mbed-tls-3-5-0-through-4-0-0-client-impersonation-can-occur-while-resuming-a-tls-1-3-session/]]></link>
			<title>CVE-2026-34873 An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation can occur while resuming a TLS 1.3 session.</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43352-i3c-mipi-i3c-hci-correct-ring_ctrl_abort-handling-in-dma-dequeue/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43352-i3c-mipi-i3c-hci-correct-ring_ctrl_abort-handling-in-dma-dequeue/]]></link>
			<title>CVE-2026-43352 i3c: mipi-i3c-hci: Correct RING_CTRL_ABORT handling in DMA dequeue</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31717-ksmbd-validate-owner-of-durable-handle-on-reconnect/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31717-ksmbd-validate-owner-of-durable-handle-on-reconnect/]]></link>
			<title>CVE-2026-31717 ksmbd: validate owner of durable handle on reconnect</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41673-xmldom-denial-of-service-via-uncontrolled-recursion-in-xml-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41673-xmldom-denial-of-service-via-uncontrolled-recursion-in-xml-serialization/]]></link>
			<title>CVE-2026-41673 xmldom: Denial of service via uncontrolled recursion in XML serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41675-xmldom-xml-node-injection-through-unvalidated-processing-instruction-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41675-xmldom-xml-node-injection-through-unvalidated-processing-instruction-serialization/]]></link>
			<title>CVE-2026-41675 xmldom: XML node injection through unvalidated processing instruction serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41674-xmldom-xml-injection-through-unvalidated-documenttype-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41674-xmldom-xml-injection-through-unvalidated-documenttype-serialization/]]></link>
			<title>CVE-2026-41674 xmldom: XML injection through unvalidated DocumentType serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41672-xmldom-xml-node-injection-through-unvalidated-comment-serialization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41672-xmldom-xml-node-injection-through-unvalidated-comment-serialization/]]></link>
			<title>CVE-2026-41672 xmldom: XML node injection through unvalidated comment serialization</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43869-apache-thrift-tssltransportfactory-java-hostname-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43869-apache-thrift-tssltransportfactory-java-hostname-verification/]]></link>
			<title>CVE-2026-43869 Apache Thrift: TSSLTransportFactory.java hostname verification</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43870-apache-thrift-node-js-web_server-js-multi-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43870-apache-thrift-node-js-web_server-js-multi-vulnerability/]]></link>
			<title>CVE-2026-43870 Apache Thrift: Node.js web_server.js multi-vulnerability</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43868-apache-thrift-rust-implementation-vulnerable-to-cve-2020-13949-pattern/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43868-apache-thrift-rust-implementation-vulnerable-to-cve-2020-13949-pattern/]]></link>
			<title>CVE-2026-43868 Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41082-in-ocaml-opam-before-2-5-1-a-install-field-containing-a-destination-filepath-can-use-to-reach-a-parent-directory/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41082-in-ocaml-opam-before-2-5-1-a-install-field-containing-a-destination-filepath-can-use-to-reach-a-parent-directory/]]></link>
			<title>CVE-2026-41082 In OCaml opam before 2.5.1, a .install field containing a destination filepath can use ../ to reach a parent directory.</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/how-to-pick-an-emr-system-that-actually-works-for-your-practice/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/how-to-pick-an-emr-system-that-actually-works-for-your-practice/]]></link>
			<title>How to pick an EMR system that actually works for your practice</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:21:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42154-prometheus-remote-read-endpoint-allows-denial-of-service-via-crafted-snappy-payload/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42154-prometheus-remote-read-endpoint-allows-denial-of-service-via-crafted-snappy-payload/]]></link>
			<title>CVE-2026-42154 Prometheus: remote read endpoint allows denial of service via crafted snappy payload</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6210-type-confusion-and-heap-buffer-overflow-in-qt-svg-marker-handling-causing-application-crash/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6210-type-confusion-and-heap-buffer-overflow-in-qt-svg-marker-handling-causing-application-crash/]]></link>
			<title>CVE-2026-6210 Type confusion and heap-buffer-overflow in Qt SVG marker handling causing application crash</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42898-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42898-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></link>
			<title>CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42833-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42833-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerability/]]></link>
			<title>CVE-2026-42833 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-8328-ftp-pasv-ssrf-ftpcp-does-not-use-actual-peer-address-trusts-server-supplied-pasv-host-address/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-8328-ftp-pasv-ssrf-ftpcp-does-not-use-actual-peer-address-trusts-server-supplied-pasv-host-address/]]></link>
			<title>CVE-2026-8328 FTP PASV SSRF, ftpcp() does not use actual peer address, trusts server-supplied PASV host address</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7246-pallets-click-contains-a-command-injection-via-unsanitized-filename-click-edit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7246-pallets-click-contains-a-command-injection-via-unsanitized-filename-click-edit/]]></link>
			<title>CVE-2026-7246 Pallets Click contains a command injection via Unsanitized Filename &quot;click.edit()&quot;</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43443-asoc-amd-acp-mach-common-add-missing-error-check-for-clock-acquisition/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43443-asoc-amd-acp-mach-common-add-missing-error-check-for-clock-acquisition/]]></link>
			<title>CVE-2026-43443 ASoC: amd: acp-mach-common: Add missing error check for clock acquisition</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44662-rust-openssl-heap-buffer-overflow-when-encrypting-with-aes-key-wrap-with-padding/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44662-rust-openssl-heap-buffer-overflow-when-encrypting-with-aes-key-wrap-with-padding/]]></link>
			<title>CVE-2026-44662 rust-openssl: Heap buffer overflow when encrypting with AES key-wrap-with-padding</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:10:32 +0000]]></pubDate>
		</item>
				</channel>
</rss>
