<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 13, 2026 at 3:38 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/modern-password-tips-based-on-nist-guidelines/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/modern-password-tips-based-on-nist-guidelines/]]></link>
			<title>Modern password tips based on NIST guidelines</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 12:59:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39856-osslsigncode-has-an-out-of-bounds-read-via-unvalidated-section-bounds-in-pe-page-hash-calculation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39856-osslsigncode-has-an-out-of-bounds-read-via-unvalidated-section-bounds-in-pe-page-hash-calculation/]]></link>
			<title>CVE-2026-39856 osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39855-osslsigncode-has-an-integer-underflow-in-pe-page-hash-calculation-can-cause-out-of-bounds-read/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39855-osslsigncode-has-an-integer-underflow-in-pe-page-hash-calculation-can-cause-out-of-bounds-read/]]></link>
			<title>CVE-2026-39855 osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39853-osslsigncode-has-a-stack-buffer-overflow-via-unbounded-digest-copy-during-signature-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39853-osslsigncode-has-a-stack-buffer-overflow-via-unbounded-digest-copy-during-signature-verification/]]></link>
			<title>CVE-2026-39853 osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28390-possible-null-dereference-when-processing-cms-keytransportrecipientinfo/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28390-possible-null-dereference-when-processing-cms-keytransportrecipientinfo/]]></link>
			<title>CVE-2026-28390 Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28389-possible-null-dereference-when-processing-cms-keyagreerecipientinfo/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28389-possible-null-dereference-when-processing-cms-keyagreerecipientinfo/]]></link>
			<title>CVE-2026-28389 Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40226/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40226/]]></link>
			<title>CVE-2026-40226</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34757-libpng-has-a-yse-after-free-in-png_set_plte-png_set_trns-and-png_set_hist-leading-to-corrupted-chunk-data-and-potential-heap-information-disclosure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34757-libpng-has-a-yse-after-free-in-png_set_plte-png_set_trns-and-png_set_hist-leading-to-corrupted-chunk-data-and-potential-heap-information-disclosure/]]></link>
			<title>CVE-2026-34757 LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35206-helm-chart-extraction-output-directory-collapse-via-chart-yaml-name-dot-segment/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35206-helm-chart-extraction-output-directory-collapse-via-chart-yaml-name-dot-segment/]]></link>
			<title>CVE-2026-35206 Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34743-xz-utils-buffer-overflow-in-lzma_index_append/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34743-xz-utils-buffer-overflow-in-lzma_index_append/]]></link>
			<title>CVE-2026-34743 XZ Utils: Buffer overflow in lzma_index_append()</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35535/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35535/]]></link>
			<title>CVE-2026-35535</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35385/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35385/]]></link>
			<title>CVE-2026-35385</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35386/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35386/]]></link>
			<title>CVE-2026-35386</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35388/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35388/]]></link>
			<title>CVE-2026-35388</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4878-libcap-libcap-privilege-escalation-via-toctou-race-condition-in-cap_set_file/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4878-libcap-libcap-privilege-escalation-via-toctou-race-condition-in-cap_set_file/]]></link>
			<title>CVE-2026-4878 Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33810-case-sensitive-excludedsubtrees-name-constraints-cause-auth-bypass-in-crypto-x509/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33810-case-sensitive-excludedsubtrees-name-constraints-cause-auth-bypass-in-crypto-x509/]]></link>
			<title>CVE-2026-33810 Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27140-code-execution-vulnerability-in-swig-code-generation-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-27140-code-execution-vulnerability-in-swig-code-generation-in-cmd-go/]]></link>
			<title>CVE-2026-27140 Code execution vulnerability in SWIG code generation in cmd/go</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/cut-it-costs-without-cutting-corners-the-case-for-thin-and-zero-clients/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/cut-it-costs-without-cutting-corners-the-case-for-thin-and-zero-clients/]]></link>
			<title>Cut IT costs without cutting corners: The case for thin and zero clients</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/2026-guide-to-choosing-the-best-voip-headset-for-peak-productivity/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/2026-guide-to-choosing-the-best-voip-headset-for-peak-productivity/]]></link>
			<title>2026 guide to choosing the best VoIP headset for peak productivity</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/6-simple-ways-to-recover-lost-excel-files/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/6-simple-ways-to-recover-lost-excel-files/]]></link>
			<title>6 Simple ways to recover lost Excel files</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23411-apparmor-fix-race-between-freeing-data-and-fs-accessing-it/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23411-apparmor-fix-race-between-freeing-data-and-fs-accessing-it/]]></link>
			<title>CVE-2026-23411 apparmor: fix race between freeing data and fs accessing it</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23410-apparmor-fix-race-on-rawdata-dereference/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23410-apparmor-fix-race-on-rawdata-dereference/]]></link>
			<title>CVE-2026-23410 apparmor: fix race on rawdata dereference</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23409-apparmor-fix-differential-encoding-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23409-apparmor-fix-differential-encoding-verification/]]></link>
			<title>CVE-2026-23409 apparmor: fix differential encoding verification</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23407-apparmor-fix-missing-bounds-check-on-default-table-in-verify_dfa/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23407-apparmor-fix-missing-bounds-check-on-default-table-in-verify_dfa/]]></link>
			<title>CVE-2026-23407 apparmor: fix missing bounds check on DEFAULT table in verify_dfa()</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23406-apparmor-fix-side-effect-bug-in-match_char-macro-usage/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23406-apparmor-fix-side-effect-bug-in-match_char-macro-usage/]]></link>
			<title>CVE-2026-23406 apparmor: fix side-effect bug in match_char() macro usage</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23405-apparmor-fix-limit-the-number-of-levels-of-policy-namespaces/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23405-apparmor-fix-limit-the-number-of-levels-of-policy-namespaces/]]></link>
			<title>CVE-2026-23405 apparmor: fix: limit the number of levels of policy namespaces</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23404-apparmor-replace-recursive-profile-removal-with-iterative-approach/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23404-apparmor-replace-recursive-profile-removal-with-iterative-approach/]]></link>
			<title>CVE-2026-23404 apparmor: replace recursive profile removal with iterative approach</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23403-apparmor-fix-memory-leak-in-verify_header/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23403-apparmor-fix-memory-leak-in-verify_header/]]></link>
			<title>CVE-2026-23403 apparmor: fix memory leak in verify_header</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39881-vim-ex-command-injection-in-vims-netbeans-integration/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39881-vim-ex-command-injection-in-vims-netbeans-integration/]]></link>
			<title>CVE-2026-39881 Vim Ex command injection in Vims NetBeans integration</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40024-sleuth-kit-tsk_recover-path-traversal/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40024-sleuth-kit-tsk_recover-path-traversal/]]></link>
			<title>CVE-2026-40024 Sleuth Kit tsk_recover Path Traversal</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40025-sleuth-kit-apfs-keybag-parser-out-of-bounds-read/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40025-sleuth-kit-apfs-keybag-parser-out-of-bounds-read/]]></link>
			<title>CVE-2026-40025 Sleuth Kit APFS Keybag Parser Out-of-Bounds Read</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40026-sleuth-kit-iso9660-susp-extension-reference-out-of-bounds-read/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40026-sleuth-kit-iso9660-susp-extension-reference-out-of-bounds-read/]]></link>
			<title>CVE-2026-40026 Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32241-flannel-vulnerable-to-cross-node-remote-code-execution-via-extension-backend-backenddata-injection/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32241-flannel-vulnerable-to-cross-node-remote-code-execution-via-extension-backend-backenddata-injection/]]></link>
			<title>CVE-2026-32241 Flannel vulnerable to cross-node remote code execution via extension backend BackendData injection</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/master-your-gmail-inbox-combat-email-overload-for-better-productivity/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/master-your-gmail-inbox-combat-email-overload-for-better-productivity/]]></link>
			<title>Master your Gmail inbox: Combat email overload for better productivity</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21715/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21715/]]></link>
			<title>CVE-2026-21715</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21710/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21710/]]></link>
			<title>CVE-2026-21710</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21717/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21717/]]></link>
			<title>CVE-2026-21717</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66038-opensc-sc_compacttlv_find_tag-can-return-out-of-bounds-pointers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66038-opensc-sc_compacttlv_find_tag-can-return-out-of-bounds-pointers/]]></link>
			<title>CVE-2025-66038 OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66037-opensc-out-of-bounds-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66037-opensc-out-of-bounds-vulnerability/]]></link>
			<title>CVE-2025-66037 OpenSC: Out of Bounds vulnerability</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66215-opensc-stack-buffer-overflow-write-in-card-oberthur/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66215-opensc-stack-buffer-overflow-write-in-card-oberthur/]]></link>
			<title>CVE-2025-66215 OpenSC: Stack-buffer-overflow WRITE in card-oberthur</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-49010-opensc-stack-buffer-overflow-write-in-get-response/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-49010-opensc-stack-buffer-overflow-write-in-get-response/]]></link>
			<title>CVE-2025-49010 OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34445-onnx-malicious-onnx-models-can-crash-servers-by-exploiting-unprotected-object-settings/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34445-onnx-malicious-onnx-models-can-crash-servers-by-exploiting-unprotected-object-settings/]]></link>
			<title>CVE-2026-34445 ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34446-onnx-arbitrary-file-read-via-externaldata-hardlink-bypass-in-onnx-load/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34446-onnx-arbitrary-file-read-via-externaldata-hardlink-bypass-in-onnx-load/]]></link>
			<title>CVE-2026-34446 ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35177-path-traversal-issue-with-zip-vim-in-vim/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35177-path-traversal-issue-with-zip-vim-in-vim/]]></link>
			<title>CVE-2026-35177 Path traversal issue with zip.vim in Vim</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34982-vim-modeline-bypass-via-various-options-affects-vim-9-2-0276/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34982-vim-modeline-bypass-via-various-options-affects-vim-9-2-0276/]]></link>
			<title>CVE-2026-34982 Vim modeline bypass via various options affects Vim &lt; 9.2.0276</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35093-libinput-libinput-unauthorized-code-execution-and-information-disclosure-through-lua-bytecode-plugins/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35093-libinput-libinput-unauthorized-code-execution-and-information-disclosure-through-lua-bytecode-plugins/]]></link>
			<title>CVE-2026-35093 Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></link>
			<title>Unlock business growth with email automation</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23408-apparmor-fix-double-free-of-ns_name-in-aa_replace_profiles/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23408-apparmor-fix-double-free-of-ns_name-in-aa_replace_profiles/]]></link>
			<title>CVE-2026-23408 apparmor: Fix double free of ns_name in aa_replace_profiles()</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
				</channel>
</rss>
