<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 17, 2026 at 11:13 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35201-discount-has-an-out-of-bounds-read-in-rdiscount/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35201-discount-has-an-out-of-bounds-read-in-rdiscount/]]></link>
			<title>CVE-2026-35201 Discount has an Out-of-bounds Read in rdiscount</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40179-prometheus-stored-xss-via-metric-names-and-label-values-in-web-ui-tooltips-and-metrics-explorer/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40179-prometheus-stored-xss-via-metric-names-and-label-values-in-web-ui-tooltips-and-metrics-explorer/]]></link>
			<title>CVE-2026-40179 Prometheus: Stored XSS via metric names and label values in web UI tooltips and metrics explorer</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-14821-libssh-libssh-insecure-default-configuration-leads-to-local-man-in-the-middle-attacks-on-windows/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-14821-libssh-libssh-insecure-default-configuration-leads-to-local-man-in-the-middle-attacks-on-windows/]]></link>
			<title>CVE-2025-14821 Libssh: libssh: insecure default configuration leads to local man-in-the-middle attacks on windows</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39956-jq-missing-runtime-type-checks-for-_strindices-lead-to-crash-and-limited-memory-disclosure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39956-jq-missing-runtime-type-checks-for-_strindices-lead-to-crash-and-limited-memory-disclosure/]]></link>
			<title>CVE-2026-39956 jq: Missing runtime type checks for _strindices lead to crash and limited memory disclosure</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35199-symcrypt-symcryptxmsssign-function-heap-overflow-via-64-32-bit-leaf-count-truncation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35199-symcrypt-symcryptxmsssign-function-heap-overflow-via-64-32-bit-leaf-count-truncation/]]></link>
			<title>CVE-2026-35199 SymCrypt SymCryptXmssSign function &#8211; Heap overflow via 64-&gt;32-bit leaf-count truncation</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41035/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41035/]]></link>
			<title>CVE-2026-41035</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35469-spdystream-dos-on-cri/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35469-spdystream-dos-on-cri/]]></link>
			<title>CVE-2026-35469 SpdyStream: DOS on CRI</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40164-jq-algorithmic-complexity-dos-via-hardcoded-murmurhash3-seed/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40164-jq-algorithmic-complexity-dos-via-hardcoded-murmurhash3-seed/]]></link>
			<title>CVE-2026-40164 jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31418-netfilter-ipset-drop-logically-empty-buckets-in-mtype_del/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31418-netfilter-ipset-drop-logically-empty-buckets-in-mtype_del/]]></link>
			<title>CVE-2026-31418 netfilter: ipset: drop logically empty buckets in mtype_del</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39979-jq-out-of-bounds-read-in-jv_parse_sized-error-formatting-for-non-nul-terminated-counted-buffers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39979-jq-out-of-bounds-read-in-jv_parse_sized-error-formatting-for-non-nul-terminated-counted-buffers/]]></link>
			<title>CVE-2026-39979 jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted Buffers</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32316-jq-integer-overflow-in-jvp_string_append-allows-heap-based-buffer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32316-jq-integer-overflow-in-jvp_string_append-allows-heap-based-buffer-overflow/]]></link>
			<title>CVE-2026-32316 jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32223-windows-usb-printing-stack-usbprint-sys-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32223-windows-usb-printing-stack-usbprint-sys-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-32223 Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-64669-windows-admin-center-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-64669-windows-admin-center-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2025-64669 Windows Admin Center Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23666-net-framework-denial-of-service-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23666-net-framework-denial-of-service-vulnerability/]]></link>
			<title>CVE-2026-23666 .NET Framework Denial of Service Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27143-missing-bound-checks-can-lead-to-memory-corruption-in-safe-go-in-cmd-compile/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27143-missing-bound-checks-can-lead-to-memory-corruption-in-safe-go-in-cmd-compile/]]></link>
			<title>CVE-2026-27143 Missing bound checks can lead to memory corruption in safe Go in cmd/compile</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32282-toctou-permits-root-escape-on-linux-via-root-chmod-in-os-in-internal-syscall-unix/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32282-toctou-permits-root-escape-on-linux-via-root-chmod-in-os-in-internal-syscall-unix/]]></link>
			<title>CVE-2026-32282 TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3184-util-linux-util-linux-access-control-bypass-due-to-improper-hostname-canonicalization/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3184-util-linux-util-linux-access-control-bypass-due-to-improper-hostname-canonicalization/]]></link>
			<title>CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27456-util-linux-toctou-race-condition-in-util-linux-mount8-loop-device-setup/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27456-util-linux-toctou-race-condition-in-util-linux-mount8-loop-device-setup/]]></link>
			<title>CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) &#8211; Loop Device Setup</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4647-binutils-out-of-bounds-read-in-xcoff-relocation-processing-in-gnu-binutils-bfd-library/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4647-binutils-out-of-bounds-read-in-xcoff-relocation-processing-in-gnu-binutils-bfd-library/]]></link>
			<title>CVE-2026-4647 Binutils: out-of-bounds read in xcoff relocation processing in gnu binutils bfd library</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:22:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33948-jq-embedded-nul-truncation-in-cli-json-input-path-causes-prefix-only-validation-of-malformed-input/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33948-jq-embedded-nul-truncation-in-cli-json-input-path-causes-prefix-only-validation-of-malformed-input/]]></link>
			<title>CVE-2026-33948 jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malformed Input</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/modern-password-tips-based-on-nist-guidelines/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/modern-password-tips-based-on-nist-guidelines/]]></link>
			<title>Modern password tips based on NIST guidelines</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 12:59:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39856-osslsigncode-has-an-out-of-bounds-read-via-unvalidated-section-bounds-in-pe-page-hash-calculation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39856-osslsigncode-has-an-out-of-bounds-read-via-unvalidated-section-bounds-in-pe-page-hash-calculation/]]></link>
			<title>CVE-2026-39856 osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33947-jq-unbounded-recursion-in-jv_setpath-jv_getpath-and-delpaths_sorted/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33947-jq-unbounded-recursion-in-jv_setpath-jv_getpath-and-delpaths_sorted/]]></link>
			<title>CVE-2026-33947 jq: Unbounded Recursion in jv_setpath(), jv_getpath() and delpaths_sorted()</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39855-osslsigncode-has-an-integer-underflow-in-pe-page-hash-calculation-can-cause-out-of-bounds-read/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39855-osslsigncode-has-an-integer-underflow-in-pe-page-hash-calculation-can-cause-out-of-bounds-read/]]></link>
			<title>CVE-2026-39855 osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39853-osslsigncode-has-a-stack-buffer-overflow-via-unbounded-digest-copy-during-signature-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39853-osslsigncode-has-a-stack-buffer-overflow-via-unbounded-digest-copy-during-signature-verification/]]></link>
			<title>CVE-2026-39853 osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28390-possible-null-dereference-when-processing-cms-keytransportrecipientinfo/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28390-possible-null-dereference-when-processing-cms-keytransportrecipientinfo/]]></link>
			<title>CVE-2026-28390 Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28389-possible-null-dereference-when-processing-cms-keyagreerecipientinfo/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28389-possible-null-dereference-when-processing-cms-keyagreerecipientinfo/]]></link>
			<title>CVE-2026-28389 Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40226/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40226/]]></link>
			<title>CVE-2026-40226</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34757-libpng-has-a-yse-after-free-in-png_set_plte-png_set_trns-and-png_set_hist-leading-to-corrupted-chunk-data-and-potential-heap-information-disclosure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34757-libpng-has-a-yse-after-free-in-png_set_plte-png_set_trns-and-png_set_hist-leading-to-corrupted-chunk-data-and-potential-heap-information-disclosure/]]></link>
			<title>CVE-2026-34757 LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35206-helm-chart-extraction-output-directory-collapse-via-chart-yaml-name-dot-segment/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35206-helm-chart-extraction-output-directory-collapse-via-chart-yaml-name-dot-segment/]]></link>
			<title>CVE-2026-35206 Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34743-xz-utils-buffer-overflow-in-lzma_index_append/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34743-xz-utils-buffer-overflow-in-lzma_index_append/]]></link>
			<title>CVE-2026-34743 XZ Utils: Buffer overflow in lzma_index_append()</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35535/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35535/]]></link>
			<title>CVE-2026-35535</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35385/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35385/]]></link>
			<title>CVE-2026-35385</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35386/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35386/]]></link>
			<title>CVE-2026-35386</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35388/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35388/]]></link>
			<title>CVE-2026-35388</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4878-libcap-libcap-privilege-escalation-via-toctou-race-condition-in-cap_set_file/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4878-libcap-libcap-privilege-escalation-via-toctou-race-condition-in-cap_set_file/]]></link>
			<title>CVE-2026-4878 Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33810-case-sensitive-excludedsubtrees-name-constraints-cause-auth-bypass-in-crypto-x509/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33810-case-sensitive-excludedsubtrees-name-constraints-cause-auth-bypass-in-crypto-x509/]]></link>
			<title>CVE-2026-33810 Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27140-code-execution-vulnerability-in-swig-code-generation-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27140-code-execution-vulnerability-in-swig-code-generation-in-cmd-go/]]></link>
			<title>CVE-2026-27140 Code execution vulnerability in SWIG code generation in cmd/go</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/cut-it-costs-without-cutting-corners-the-case-for-thin-and-zero-clients/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/cut-it-costs-without-cutting-corners-the-case-for-thin-and-zero-clients/]]></link>
			<title>Cut IT costs without cutting corners: The case for thin and zero clients</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/2026-guide-to-choosing-the-best-voip-headset-for-peak-productivity/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/2026-guide-to-choosing-the-best-voip-headset-for-peak-productivity/]]></link>
			<title>2026 guide to choosing the best VoIP headset for peak productivity</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/6-simple-ways-to-recover-lost-excel-files/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/6-simple-ways-to-recover-lost-excel-files/]]></link>
			<title>6 Simple ways to recover lost Excel files</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23411-apparmor-fix-race-between-freeing-data-and-fs-accessing-it/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23411-apparmor-fix-race-between-freeing-data-and-fs-accessing-it/]]></link>
			<title>CVE-2026-23411 apparmor: fix race between freeing data and fs accessing it</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23410-apparmor-fix-race-on-rawdata-dereference/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23410-apparmor-fix-race-on-rawdata-dereference/]]></link>
			<title>CVE-2026-23410 apparmor: fix race on rawdata dereference</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23409-apparmor-fix-differential-encoding-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23409-apparmor-fix-differential-encoding-verification/]]></link>
			<title>CVE-2026-23409 apparmor: fix differential encoding verification</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23408-apparmor-fix-double-free-of-ns_name-in-aa_replace_profiles/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23408-apparmor-fix-double-free-of-ns_name-in-aa_replace_profiles/]]></link>
			<title>CVE-2026-23408 apparmor: Fix double free of ns_name in aa_replace_profiles()</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23407-apparmor-fix-missing-bounds-check-on-default-table-in-verify_dfa/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23407-apparmor-fix-missing-bounds-check-on-default-table-in-verify_dfa/]]></link>
			<title>CVE-2026-23407 apparmor: fix missing bounds check on DEFAULT table in verify_dfa()</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23406-apparmor-fix-side-effect-bug-in-match_char-macro-usage/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23406-apparmor-fix-side-effect-bug-in-match_char-macro-usage/]]></link>
			<title>CVE-2026-23406 apparmor: fix side-effect bug in match_char() macro usage</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23405-apparmor-fix-limit-the-number-of-levels-of-policy-namespaces/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23405-apparmor-fix-limit-the-number-of-levels-of-policy-namespaces/]]></link>
			<title>CVE-2026-23405 apparmor: fix: limit the number of levels of policy namespaces</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
				</channel>
</rss>
