<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 20, 2026 at 12:31 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6297-use-after-free-in-proxy/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6297-use-after-free-in-proxy/]]></link>
			<title>Chromium: CVE-2026-6297 Use after free in Proxy</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6296-heap-buffer-overflow-in-angle/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6296-heap-buffer-overflow-in-angle/]]></link>
			<title>Chromium: CVE-2026-6296 Heap buffer overflow in ANGLE</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6364-out-of-bounds-read-in-skia/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6364-out-of-bounds-read-in-skia/]]></link>
			<title>Chromium: CVE-2026-6364 Out of bounds read in Skia</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6363-type-confusion-in-v8/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6363-type-confusion-in-v8/]]></link>
			<title>Chromium: CVE-2026-6363 Type Confusion in V8</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6362-use-after-free-in-codecs/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6362-use-after-free-in-codecs/]]></link>
			<title>Chromium: CVE-2026-6362 Use after free in Codecs</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4786-incomplete-mitigation-of-cve-2026-4519-�tion-expansion-for-command-injection-to-webbrowser-open/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4786-incomplete-mitigation-of-cve-2026-4519-�tion-expansion-for-command-injection-to-webbrowser-open/]]></link>
			<title>CVE-2026-4786 Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6100-use-after-free-in-lzma-lzmadecompressor-bz2-bz2decompressor-and-gzip-gzipfile-after-re-use-under-memory-pressure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6100-use-after-free-in-lzma-lzmadecompressor-bz2-bz2decompressor-and-gzip-gzipfile-after-re-use-under-memory-pressure/]]></link>
			<title>CVE-2026-6100 Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5160/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5160/]]></link>
			<title>CVE-2026-5160</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33056-tar-rs-unpack_in-can-chmod-arbitrary-directories-by-following-symlinks/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33056-tar-rs-unpack_in-can-chmod-arbitrary-directories-by-following-symlinks/]]></link>
			<title>CVE-2026-33056 tar-rs: unpack_in can chmod arbitrary directories by following symlinks</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/microsoft-halts-automatic-copilot-rollout-for-windows/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/microsoft-halts-automatic-copilot-rollout-for-windows/]]></link>
			<title>Microsoft halts automatic Copilot rollout for Windows</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 00:40:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33055-tar-rs-incorrectly-ignores-pax-size-headers-if-header-size-is-nonzero/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33055-tar-rs-incorrectly-ignores-pax-size-headers-if-header-size-is-nonzero/]]></link>
			<title>CVE-2026-33055 tar-rs incorrectly ignores PAX size headers if header size is nonzero</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6307-type-confusion-in-turbofan/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6307-type-confusion-in-turbofan/]]></link>
			<title>Chromium: CVE-2026-6307 Type Confusion in Turbofan</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6306-heap-buffer-overflow-in-pdfium/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6306-heap-buffer-overflow-in-pdfium/]]></link>
			<title>Chromium: CVE-2026-6306 Heap buffer overflow in PDFium</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6305-heap-buffer-overflow-in-pdfium/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6305-heap-buffer-overflow-in-pdfium/]]></link>
			<title>Chromium: CVE-2026-6305 Heap buffer overflow in PDFium</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6304-use-after-free-in-graphite/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6304-use-after-free-in-graphite/]]></link>
			<title>Chromium: CVE-2026-6304 Use after free in Graphite</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6303-use-after-free-in-codecs/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6303-use-after-free-in-codecs/]]></link>
			<title>Chromium: CVE-2026-6303 Use after free in Codecs</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6302-use-after-free-in-video/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6302-use-after-free-in-video/]]></link>
			<title>Chromium: CVE-2026-6302 Use after free in Video</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6301-type-confusion-in-turbofan/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6301-type-confusion-in-turbofan/]]></link>
			<title>Chromium: CVE-2026-6301 Type Confusion in Turbofan</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6300-use-after-free-in-css/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6300-use-after-free-in-css/]]></link>
			<title>Chromium: CVE-2026-6300 Use after free in CSS</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6299-use-after-free-in-prerender/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6299-use-after-free-in-prerender/]]></link>
			<title>Chromium: CVE-2026-6299 Use after free in Prerender</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6298-heap-buffer-overflow-in-skia/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6298-heap-buffer-overflow-in-skia/]]></link>
			<title>Chromium: CVE-2026-6298 Heap buffer overflow in Skia</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/scaling-internet-of-things-networks-with-infrastructure-as-code/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/scaling-internet-of-things-networks-with-infrastructure-as-code/]]></link>
			<title>Scaling Internet of Things networks with Infrastructure-as-Code</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:24:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/phi-security-best-practices-for-healthcare-organizations/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/phi-security-best-practices-for-healthcare-organizations/]]></link>
			<title>PHI security best practices for healthcare organizations</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:24:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-14821-libssh-libssh-insecure-default-configuration-leads-to-local-man-in-the-middle-attacks-on-windows/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-14821-libssh-libssh-insecure-default-configuration-leads-to-local-man-in-the-middle-attacks-on-windows/]]></link>
			<title>CVE-2025-14821 Libssh: libssh: insecure default configuration leads to local man-in-the-middle attacks on windows</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39956-jq-missing-runtime-type-checks-for-_strindices-lead-to-crash-and-limited-memory-disclosure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39956-jq-missing-runtime-type-checks-for-_strindices-lead-to-crash-and-limited-memory-disclosure/]]></link>
			<title>CVE-2026-39956 jq: Missing runtime type checks for _strindices lead to crash and limited memory disclosure</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35199-symcrypt-symcryptxmsssign-function-heap-overflow-via-64-32-bit-leaf-count-truncation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35199-symcrypt-symcryptxmsssign-function-heap-overflow-via-64-32-bit-leaf-count-truncation/]]></link>
			<title>CVE-2026-35199 SymCrypt SymCryptXmssSign function &#8211; Heap overflow via 64-&gt;32-bit leaf-count truncation</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41035/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41035/]]></link>
			<title>CVE-2026-41035</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35469-spdystream-dos-on-cri/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35469-spdystream-dos-on-cri/]]></link>
			<title>CVE-2026-35469 SpdyStream: DOS on CRI</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40164-jq-algorithmic-complexity-dos-via-hardcoded-murmurhash3-seed/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40164-jq-algorithmic-complexity-dos-via-hardcoded-murmurhash3-seed/]]></link>
			<title>CVE-2026-40164 jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39979-jq-out-of-bounds-read-in-jv_parse_sized-error-formatting-for-non-nul-terminated-counted-buffers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39979-jq-out-of-bounds-read-in-jv_parse_sized-error-formatting-for-non-nul-terminated-counted-buffers/]]></link>
			<title>CVE-2026-39979 jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted Buffers</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33948-jq-embedded-nul-truncation-in-cli-json-input-path-causes-prefix-only-validation-of-malformed-input/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33948-jq-embedded-nul-truncation-in-cli-json-input-path-causes-prefix-only-validation-of-malformed-input/]]></link>
			<title>CVE-2026-33948 jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malformed Input</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31418-netfilter-ipset-drop-logically-empty-buckets-in-mtype_del/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31418-netfilter-ipset-drop-logically-empty-buckets-in-mtype_del/]]></link>
			<title>CVE-2026-31418 netfilter: ipset: drop logically empty buckets in mtype_del</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40179-prometheus-stored-xss-via-metric-names-and-label-values-in-web-ui-tooltips-and-metrics-explorer/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40179-prometheus-stored-xss-via-metric-names-and-label-values-in-web-ui-tooltips-and-metrics-explorer/]]></link>
			<title>CVE-2026-40179 Prometheus: Stored XSS via metric names and label values in web UI tooltips and metrics explorer</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33947-jq-unbounded-recursion-in-jv_setpath-jv_getpath-and-delpaths_sorted/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33947-jq-unbounded-recursion-in-jv_setpath-jv_getpath-and-delpaths_sorted/]]></link>
			<title>CVE-2026-33947 jq: Unbounded Recursion in jv_setpath(), jv_getpath() and delpaths_sorted()</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32223-windows-usb-printing-stack-usbprint-sys-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32223-windows-usb-printing-stack-usbprint-sys-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-32223 Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-64669-windows-admin-center-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-64669-windows-admin-center-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2025-64669 Windows Admin Center Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23666-net-framework-denial-of-service-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23666-net-framework-denial-of-service-vulnerability/]]></link>
			<title>CVE-2026-23666 .NET Framework Denial of Service Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27143-missing-bound-checks-can-lead-to-memory-corruption-in-safe-go-in-cmd-compile/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27143-missing-bound-checks-can-lead-to-memory-corruption-in-safe-go-in-cmd-compile/]]></link>
			<title>CVE-2026-27143 Missing bound checks can lead to memory corruption in safe Go in cmd/compile</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32282-toctou-permits-root-escape-on-linux-via-root-chmod-in-os-in-internal-syscall-unix/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32282-toctou-permits-root-escape-on-linux-via-root-chmod-in-os-in-internal-syscall-unix/]]></link>
			<title>CVE-2026-32282 TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3184-util-linux-util-linux-access-control-bypass-due-to-improper-hostname-canonicalization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3184-util-linux-util-linux-access-control-bypass-due-to-improper-hostname-canonicalization/]]></link>
			<title>CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27456-util-linux-toctou-race-condition-in-util-linux-mount8-loop-device-setup/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27456-util-linux-toctou-race-condition-in-util-linux-mount8-loop-device-setup/]]></link>
			<title>CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) &#8211; Loop Device Setup</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4647-binutils-out-of-bounds-read-in-xcoff-relocation-processing-in-gnu-binutils-bfd-library/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4647-binutils-out-of-bounds-read-in-xcoff-relocation-processing-in-gnu-binutils-bfd-library/]]></link>
			<title>CVE-2026-4647 Binutils: out-of-bounds read in xcoff relocation processing in gnu binutils bfd library</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32316-jq-integer-overflow-in-jvp_string_append-allows-heap-based-buffer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32316-jq-integer-overflow-in-jvp_string_append-allows-heap-based-buffer-overflow/]]></link>
			<title>CVE-2026-32316 jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/modern-password-tips-based-on-nist-guidelines/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/modern-password-tips-based-on-nist-guidelines/]]></link>
			<title>Modern password tips based on NIST guidelines</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 12:59:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39856-osslsigncode-has-an-out-of-bounds-read-via-unvalidated-section-bounds-in-pe-page-hash-calculation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39856-osslsigncode-has-an-out-of-bounds-read-via-unvalidated-section-bounds-in-pe-page-hash-calculation/]]></link>
			<title>CVE-2026-39856 osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39855-osslsigncode-has-an-integer-underflow-in-pe-page-hash-calculation-can-cause-out-of-bounds-read/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39855-osslsigncode-has-an-integer-underflow-in-pe-page-hash-calculation-can-cause-out-of-bounds-read/]]></link>
			<title>CVE-2026-39855 osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39853-osslsigncode-has-a-stack-buffer-overflow-via-unbounded-digest-copy-during-signature-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39853-osslsigncode-has-a-stack-buffer-overflow-via-unbounded-digest-copy-during-signature-verification/]]></link>
			<title>CVE-2026-39853 osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35201-discount-has-an-out-of-bounds-read-in-rdiscount/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35201-discount-has-an-out-of-bounds-read-in-rdiscount/]]></link>
			<title>CVE-2026-35201 Discount has an Out-of-bounds Read in rdiscount</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
