<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 4, 2026 at 5:01 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31629-nfc-llcp-add-missing-return-after-llcp_closed-checks/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31629-nfc-llcp-add-missing-return-after-llcp_closed-checks/]]></link>
			<title>CVE-2026-31629 nfc: llcp: add missing return after LLCP_CLOSED checks</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41080/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41080/]]></link>
			<title>CVE-2026-41080</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28532-frrouting-10-5-3-integer-overflow-in-ospf-tlv-parser-functions/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28532-frrouting-10-5-3-integer-overflow-in-ospf-tlv-parser-functions/]]></link>
			<title>CVE-2026-28532 FRRouting &lt; 10.5.3 Integer Overflow in OSPF TLV Parser Functions</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32148-lockfile-checksums-not-verified-in-hex-allows-dependency-integrity-bypass/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32148-lockfile-checksums-not-verified-in-hex-allows-dependency-integrity-bypass/]]></link>
			<title>CVE-2026-32148 Lockfile checksums not verified in Hex allows dependency integrity bypass</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-9403-jqlang-jq-json-jq_test-c-run_jq_tests-assertion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-9403-jqlang-jq-json-jq_test-c-run_jq_tests-assertion/]]></link>
			<title>CVE-2025-9403 jqlang jq JSON jq_test.c run_jq_tests assertion</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2017-20230-storable-versions-before-3-05-for-perl-has-a-stack-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2017-20230-storable-versions-before-3-05-for-perl-has-a-stack-overflow/]]></link>
			<title>CVE-2017-20230 Storable versions before 3.05 for Perl has a stack overflow</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6843-nano-nano-format-string-vulnerability-leads-to-denial-of-service/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6843-nano-nano-format-string-vulnerability-leads-to-denial-of-service/]]></link>
			<title>CVE-2026-6843 Nano: nano: format string vulnerability leads to denial of service</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6842-nano-nano-local-attacker-can-inject-malicious-desktop-launcher-due-to-insecure-directory-permissions/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6842-nano-nano-local-attacker-can-inject-malicious-desktop-launcher-due-to-insecure-directory-permissions/]]></link>
			<title>CVE-2026-6842 Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissions</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-30656/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-30656/]]></link>
			<title>CVE-2026-30656</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-11083-gnu-binutils-linker-elfcode-h-elf_swap_shdr-heap-based-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-11083-gnu-binutils-linker-elfcode-h-elf_swap_shdr-heap-based-overflow/]]></link>
			<title>CVE-2025-11083 GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-8224-gnu-binutils-bfd-library-elf-c-bfd_elf_get_str_section-null-pointer-dereference/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-8224-gnu-binutils-bfd-library-elf-c-bfd_elf_get_str_section-null-pointer-dereference/]]></link>
			<title>CVE-2025-8224 GNU Binutils BFD Library elf.c bfd_elf_get_str_section null pointer dereference</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6846-binutils-binutils-arbitrary-code-execution-via-malformed-xcoff-object-file-processing/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6846-binutils-binutils-arbitrary-code-execution-via-malformed-xcoff-object-file-processing/]]></link>
			<title>CVE-2026-6846 Binutils: binutils: arbitrary code execution via malformed xcoff object file processing</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6845-binutils-binutils-denial-of-service-via-crafted-elf-file/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6845-binutils-binutils-denial-of-service-via-crafted-elf-file/]]></link>
			<title>CVE-2026-6845 Binutils: binutils: denial of service via crafted elf file</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/website-design-in-2026-what-actually-drives-results-for-small-businesses/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/website-design-in-2026-what-actually-drives-results-for-small-businesses/]]></link>
			<title>Website design in 2026: What actually drives results for small businesses</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 23:46:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33825-microsoft-defender-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33825-microsoft-defender-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-33825 Microsoft Defender Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-24051-opentelemetry-go-affected-by-arbitrary-code-execution-via-path-hijacking/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-24051-opentelemetry-go-affected-by-arbitrary-code-execution-via-path-hijacking/]]></link>
			<title>CVE-2026-24051 OpenTelemetry-Go Affected by Arbitrary Code Execution via PATH Hijacking</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6019-basecookie-js_output-does-not-neutralize-embedded-characters/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6019-basecookie-js_output-does-not-neutralize-embedded-characters/]]></link>
			<title>CVE-2026-6019 BaseCookie.js_output() does not neutralize embedded characters</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43058-media-vidtv-fix-pass-by-value-structs-causing-msan-warnings/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43058-media-vidtv-fix-pass-by-value-structs-causing-msan-warnings/]]></link>
			<title>CVE-2026-43058 media: vidtv: fix pass-by-value structs causing MSAN warnings</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31431-crypto-algif_aead-revert-to-operating-out-of-place/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31431-crypto-algif_aead-revert-to-operating-out-of-place/]]></link>
			<title>CVE-2026-31431 crypto: algif_aead &#8211; Revert to operating out-of-place</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37555/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37555/]]></link>
			<title>CVE-2026-37555</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7598-libssh2-userauth-c-userauth_password-integer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7598-libssh2-userauth-c-userauth_password-integer-overflow/]]></link>
			<title>CVE-2026-7598 libssh2 userauth.c userauth_password integer overflow</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31608-smb-server-avoid-double-free-in-smb_direct_free_sendmsg-after-smb_direct_flush_send_list/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31608-smb-server-avoid-double-free-in-smb_direct_free_sendmsg-after-smb_direct_flush_send_list/]]></link>
			<title>CVE-2026-31608 smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31598-ocfs2-fix-possible-deadlock-between-unlink-and-dio_end_io_write/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31598-ocfs2-fix-possible-deadlock-between-unlink-and-dio_end_io_write/]]></link>
			<title>CVE-2026-31598 ocfs2: fix possible deadlock between unlink and dio_end_io_write</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31602-alsa-ctxfi-limit-ptp-to-a-single-page/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31602-alsa-ctxfi-limit-ptp-to-a-single-page/]]></link>
			<title>CVE-2026-31602 ALSA: ctxfi: Limit PTP to a single page</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41898-rust-openssl-unchecked-callback-returned-length-in-psk-and-cookie-generate-trampolines-can-cause-openssl-to-leak-adjacent-memory-to-the-network-peer/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41898-rust-openssl-unchecked-callback-returned-length-in-psk-and-cookie-generate-trampolines-can-cause-openssl-to-leak-adjacent-memory-to-the-network-peer/]]></link>
			<title>CVE-2026-41898 rust-openssl: Unchecked callback-returned length in PSK and cookie generate trampolines can cause OpenSSL to leak adjacent memory to the network peer</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/elevate-your-business-data-analysis-with-key-excel-tools/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/elevate-your-business-data-analysis-with-key-excel-tools/]]></link>
			<title>Elevate your business data analysis with key Excel tools</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6732-libxml2-libxml2-denial-of-service-via-crafted-xsd-validated-document/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6732-libxml2-libxml2-denial-of-service-via-crafted-xsd-validated-document/]]></link>
			<title>CVE-2026-6732 Libxml2: libxml2: denial of service via crafted xsd-validated document</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2708-libsoup-libsoup-http-request-smuggling-via-duplicate-content-length-headers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2708-libsoup-libsoup-http-request-smuggling-via-duplicate-content-length-headers/]]></link>
			<title>CVE-2026-2708 Libsoup: libsoup: http request smuggling via duplicate content-length headers</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1547-ecdsa-remote-timing-attack/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1547-ecdsa-remote-timing-attack/]]></link>
			<title>CVE-2019-1547 ECDSA remote timing attack</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5778-integer-underflow-leads-to-out-of-bounds-access-in-sniffer-chacha-decrypt-path/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5778-integer-underflow-leads-to-out-of-bounds-access-in-sniffer-chacha-decrypt-path/]]></link>
			<title>CVE-2026-5778 Integer underflow leads to out-of-bounds access in sniffer ChaCha decrypt path.</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5188-integer-underflow-in-x-509-san-parsing-in-wolfssl/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5188-integer-underflow-in-x-509-san-parsing-in-wolfssl/]]></link>
			<title>CVE-2026-5188 Integer underflow in X.509 SAN parsing in wolfSSL</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1543-chacha20-poly1305-with-long-nonces/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1543-chacha20-poly1305-with-long-nonces/]]></link>
			<title>CVE-2019-1543 ChaCha20-Poly1305 with long nonces</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5295-stack-buffer-overflow-in-wolfssl-pkcs7-wc_pkcs7_decryptori-via-oversized-oid/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5295-stack-buffer-overflow-in-wolfssl-pkcs7-wc_pkcs7_decryptori-via-oversized-oid/]]></link>
			<title>CVE-2026-5295 Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5503-out-of-bounds-write-in-tlsx_echchangesni-via-attacker-controlled-publicname/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5503-out-of-bounds-write-in-tlsx_echchangesni-via-attacker-controlled-publicname/]]></link>
			<title>CVE-2026-5503 out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1563-padding-oracle-in-pkcs7_datadecode-and-cms_decrypt_set1_pkey/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1563-padding-oracle-in-pkcs7_datadecode-and-cms_decrypt_set1_pkey/]]></link>
			<title>CVE-2019-1563 Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5507-session-cache-restore-arbitrary-free-via-deserialized-pointer/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5507-session-cache-restore-arbitrary-free-via-deserialized-pointer/]]></link>
			<title>CVE-2026-5507 Session Cache Restore — Arbitrary Free via Deserialized Pointer</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1551-rsaz_512_sqr-overflow-bug-on-x86_64/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2019-1551-rsaz_512_sqr-overflow-bug-on-x86_64/]]></link>
			<title>CVE-2019-1551 rsaz_512_sqr overflow bug on x86_64</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5504-pkcs7-cbc-padding-oracle-plaintext-recovery/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5504-pkcs7-cbc-padding-oracle-plaintext-recovery/]]></link>
			<title>CVE-2026-5504 PKCS7 CBC Padding Oracle — Plaintext Recovery</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5393-oob-read-in-dotls13certificateverify-with-wolfssl_dual_alg_certs/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5393-oob-read-in-dotls13certificateverify-with-wolfssl_dual_alg_certs/]]></link>
			<title>CVE-2026-5393 OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31588-kvm-x86-use-scratch-field-in-mmio-fragment-to-hold-small-write-values/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31588-kvm-x86-use-scratch-field-in-mmio-fragment-to-hold-small-write-values/]]></link>
			<title>CVE-2026-31588 KVM: x86: Use scratch field in MMIO fragment to hold small write values</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31649-net-stmmac-fix-integer-underflow-in-chain-mode/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31649-net-stmmac-fix-integer-underflow-in-chain-mode/]]></link>
			<title>CVE-2026-31649 net: stmmac: fix integer underflow in chain mode</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31582-hwmon-powerz-fix-use-after-free-on-usb-disconnect/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31582-hwmon-powerz-fix-use-after-free-on-usb-disconnect/]]></link>
			<title>CVE-2026-31582 hwmon: (powerz) Fix use-after-free on USB disconnect</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31669-mptcp-fix-slab-use-after-free-in-__inet_lookup_established/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31669-mptcp-fix-slab-use-after-free-in-__inet_lookup_established/]]></link>
			<title>CVE-2026-31669 mptcp: fix slab-use-after-free in __inet_lookup_established</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31628-x86-cpu-fix-fpdss-on-zen1/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31628-x86-cpu-fix-fpdss-on-zen1/]]></link>
			<title>CVE-2026-31628 x86/CPU: Fix FPDSS on Zen1</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31630-rxrpc-proc-size-address-buffers-for-pispc-output/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31630-rxrpc-proc-size-address-buffers-for-pispc-output/]]></link>
			<title>CVE-2026-31630 rxrpc: proc: size address buffers for %pISpc output</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31420-bridge-mrp-reject-zero-test-interval-to-avoid-oom-panic/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31420-bridge-mrp-reject-zero-test-interval-to-avoid-oom-panic/]]></link>
			<title>CVE-2026-31420 bridge: mrp: reject zero test interval to avoid OOM panic</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34477-apache-log4j-core-verifyhostname-attribute-silently-ignored-in-tls-configuration-allowing-hostname-verification-bypass/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34477-apache-log4j-core-verifyhostname-attribute-silently-ignored-in-tls-configuration-allowing-hostname-verification-bypass/]]></link>
			<title>CVE-2026-34477 Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31584-media-mediatek-vcodec-fix-use-after-free-in-encoder-release-path/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31584-media-mediatek-vcodec-fix-use-after-free-in-encoder-release-path/]]></link>
			<title>CVE-2026-31584 media: mediatek: vcodec: fix use-after-free in encoder release path</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
				</channel>
</rss>
