<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 10, 2026 at 5:29 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/cut-it-costs-without-cutting-corners-the-case-for-thin-and-zero-clients/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/cut-it-costs-without-cutting-corners-the-case-for-thin-and-zero-clients/]]></link>
			<title>Cut IT costs without cutting corners: The case for thin and zero clients</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/2026-guide-to-choosing-the-best-voip-headset-for-peak-productivity/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/2026-guide-to-choosing-the-best-voip-headset-for-peak-productivity/]]></link>
			<title>2026 guide to choosing the best VoIP headset for peak productivity</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/6-simple-ways-to-recover-lost-excel-files/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/6-simple-ways-to-recover-lost-excel-files/]]></link>
			<title>6 Simple ways to recover lost Excel files</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23411-apparmor-fix-race-between-freeing-data-and-fs-accessing-it/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23411-apparmor-fix-race-between-freeing-data-and-fs-accessing-it/]]></link>
			<title>CVE-2026-23411 apparmor: fix race between freeing data and fs accessing it</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23410-apparmor-fix-race-on-rawdata-dereference/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23410-apparmor-fix-race-on-rawdata-dereference/]]></link>
			<title>CVE-2026-23410 apparmor: fix race on rawdata dereference</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23409-apparmor-fix-differential-encoding-verification/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23409-apparmor-fix-differential-encoding-verification/]]></link>
			<title>CVE-2026-23409 apparmor: fix differential encoding verification</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23408-apparmor-fix-double-free-of-ns_name-in-aa_replace_profiles/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23408-apparmor-fix-double-free-of-ns_name-in-aa_replace_profiles/]]></link>
			<title>CVE-2026-23408 apparmor: Fix double free of ns_name in aa_replace_profiles()</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23407-apparmor-fix-missing-bounds-check-on-default-table-in-verify_dfa/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23407-apparmor-fix-missing-bounds-check-on-default-table-in-verify_dfa/]]></link>
			<title>CVE-2026-23407 apparmor: fix missing bounds check on DEFAULT table in verify_dfa()</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23406-apparmor-fix-side-effect-bug-in-match_char-macro-usage/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23406-apparmor-fix-side-effect-bug-in-match_char-macro-usage/]]></link>
			<title>CVE-2026-23406 apparmor: fix side-effect bug in match_char() macro usage</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23405-apparmor-fix-limit-the-number-of-levels-of-policy-namespaces/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23405-apparmor-fix-limit-the-number-of-levels-of-policy-namespaces/]]></link>
			<title>CVE-2026-23405 apparmor: fix: limit the number of levels of policy namespaces</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23404-apparmor-replace-recursive-profile-removal-with-iterative-approach/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23404-apparmor-replace-recursive-profile-removal-with-iterative-approach/]]></link>
			<title>CVE-2026-23404 apparmor: replace recursive profile removal with iterative approach</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23403-apparmor-fix-memory-leak-in-verify_header/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23403-apparmor-fix-memory-leak-in-verify_header/]]></link>
			<title>CVE-2026-23403 apparmor: fix memory leak in verify_header</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39881-vim-ex-command-injection-in-vims-netbeans-integration/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39881-vim-ex-command-injection-in-vims-netbeans-integration/]]></link>
			<title>CVE-2026-39881 Vim Ex command injection in Vims NetBeans integration</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40024-sleuth-kit-tsk_recover-path-traversal/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40024-sleuth-kit-tsk_recover-path-traversal/]]></link>
			<title>CVE-2026-40024 Sleuth Kit tsk_recover Path Traversal</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></link>
			<title>Unlock business growth with email automation</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/3-reasons-you-should-turn-off-location-services-on-your-android-right-now/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/3-reasons-you-should-turn-off-location-services-on-your-android-right-now/]]></link>
			<title>3 Reasons you should turn off location services on your Android right now</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:23:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33542-incus-does-not-verify-combined-fingerprint-when-downloading-images-from-simplestreams-servers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33542-incus-does-not-verify-combined-fingerprint-when-downloading-images-from-simplestreams-servers/]]></link>
			<title>CVE-2026-33542 Incus does not verify combined fingerprint when downloading images from simplestreams servers</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32287-infinite-loop-in-github-com-antchfx-xpath/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32287-infinite-loop-in-github-com-antchfx-xpath/]]></link>
			<title>CVE-2026-32287 Infinite loop in github.com/antchfx/xpath</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29785-nats-server-panic-via-malicious-compression-on-leafnode-port/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29785-nats-server-panic-via-malicious-compression-on-leafnode-port/]]></link>
			<title>CVE-2026-29785 NATS Server panic via malicious compression on leafnode port</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40025-sleuth-kit-apfs-keybag-parser-out-of-bounds-read/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40025-sleuth-kit-apfs-keybag-parser-out-of-bounds-read/]]></link>
			<title>CVE-2026-40025 Sleuth Kit APFS Keybag Parser Out-of-Bounds Read</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40026-sleuth-kit-iso9660-susp-extension-reference-out-of-bounds-read/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40026-sleuth-kit-iso9660-susp-extension-reference-out-of-bounds-read/]]></link>
			<title>CVE-2026-40026 Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/master-your-gmail-inbox-combat-email-overload-for-better-productivity/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/master-your-gmail-inbox-combat-email-overload-for-better-productivity/]]></link>
			<title>Master your Gmail inbox: Combat email overload for better productivity</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66038-opensc-sc_compacttlv_find_tag-can-return-out-of-bounds-pointers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66038-opensc-sc_compacttlv_find_tag-can-return-out-of-bounds-pointers/]]></link>
			<title>CVE-2025-66038 OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-49010-opensc-stack-buffer-overflow-write-in-get-response/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-49010-opensc-stack-buffer-overflow-write-in-get-response/]]></link>
			<title>CVE-2025-49010 OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34445-onnx-malicious-onnx-models-can-crash-servers-by-exploiting-unprotected-object-settings/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34445-onnx-malicious-onnx-models-can-crash-servers-by-exploiting-unprotected-object-settings/]]></link>
			<title>CVE-2026-34445 ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34446-onnx-arbitrary-file-read-via-externaldata-hardlink-bypass-in-onnx-load/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34446-onnx-arbitrary-file-read-via-externaldata-hardlink-bypass-in-onnx-load/]]></link>
			<title>CVE-2026-34446 ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35177-path-traversal-issue-with-zip-vim-in-vim/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35177-path-traversal-issue-with-zip-vim-in-vim/]]></link>
			<title>CVE-2026-35177 Path traversal issue with zip.vim in Vim</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34982-vim-modeline-bypass-via-various-options-affects-vim-9-2-0276/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34982-vim-modeline-bypass-via-various-options-affects-vim-9-2-0276/]]></link>
			<title>CVE-2026-34982 Vim modeline bypass via various options affects Vim &lt; 9.2.0276</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35093-libinput-libinput-unauthorized-code-execution-and-information-disclosure-through-lua-bytecode-plugins/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35093-libinput-libinput-unauthorized-code-execution-and-information-disclosure-through-lua-bytecode-plugins/]]></link>
			<title>CVE-2026-35093 Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33216-nats-has-mqtt-plaintext-password-disclosure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33216-nats-has-mqtt-plaintext-password-disclosure/]]></link>
			<title>CVE-2026-33216 NATS has MQTT plaintext password disclosure</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32241-flannel-vulnerable-to-cross-node-remote-code-execution-via-extension-backend-backenddata-injection/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32241-flannel-vulnerable-to-cross-node-remote-code-execution-via-extension-backend-backenddata-injection/]]></link>
			<title>CVE-2026-32241 Flannel vulnerable to cross-node remote code execution via extension backend BackendData injection</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 14:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33416-libpng-has-use-after-free-via-pointer-aliasing-in-png_set_trns-and-png_set_plte/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33416-libpng-has-use-after-free-via-pointer-aliasing-in-png_set_trns-and-png_set_plte/]]></link>
			<title>CVE-2026-33416 LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2436-libsoup-libsoup-denial-of-service-via-use-after-free-in-soupserver-during-tls-handshake/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2436-libsoup-libsoup-denial-of-service-via-use-after-free-in-soupserver-during-tls-handshake/]]></link>
			<title>CVE-2026-2436 Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4732-out-of-bounds-read-overflow-in-tildearrow-furnace/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4732-out-of-bounds-read-overflow-in-tildearrow-furnace/]]></link>
			<title>CVE-2026-4732 Out-of-bounds Read Overflow in tildearrow/furnace</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4897-polkit-polkit-denial-of-service-via-unbounded-input-processing-through-standard-input/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4897-polkit-polkit-denial-of-service-via-unbounded-input-processing-through-standard-input/]]></link>
			<title>CVE-2026-4897 Polkit: polkit: denial of service via unbounded input processing through standard input</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34043-serialize-javascript-has-cpu-exhaustion-denial-of-service-via-crafted-array-like-objects/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34043-serialize-javascript-has-cpu-exhaustion-denial-of-service-via-crafted-array-like-objects/]]></link>
			<title>CVE-2026-34043 Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21715/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21715/]]></link>
			<title>CVE-2026-21715</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33936-python-ecdsa-denial-of-service-via-improper-der-length-validation-in-crafted-private-keys/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33936-python-ecdsa-denial-of-service-via-improper-der-length-validation-in-crafted-private-keys/]]></link>
			<title>CVE-2026-33936 python-ecdsa: Denial of Service via improper DER length validation in crafted private keys</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5107-frrouting-frr-evpn-type-2-route-bgp_evpn-c-process_type2_route-access-control/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5107-frrouting-frr-evpn-type-2-route-bgp_evpn-c-process_type2_route-access-control/]]></link>
			<title>CVE-2026-5107 FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21710/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21710/]]></link>
			<title>CVE-2026-21710</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34714/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34714/]]></link>
			<title>CVE-2026-34714</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33636-libpng-has-arm-neon-palette-expansion-out-of-bounds-read-on-aarch64/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33636-libpng-has-arm-neon-palette-expansion-out-of-bounds-read-on-aarch64/]]></link>
			<title>CVE-2026-33636 LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21717/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21717/]]></link>
			<title>CVE-2026-21717</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33750-brace-expansion-zero-step-sequence-causes-process-hang-and-memory-exhaustion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33750-brace-expansion-zero-step-sequence-causes-process-hang-and-memory-exhaustion/]]></link>
			<title>CVE-2026-33750 brace-expansion: Zero-step sequence causes process hang and memory exhaustion</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66037-opensc-out-of-bounds-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66037-opensc-out-of-bounds-vulnerability/]]></link>
			<title>CVE-2025-66037 OpenSC: Out of Bounds vulnerability</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34353/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34353/]]></link>
			<title>CVE-2026-34353</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21712/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21712/]]></link>
			<title>CVE-2026-21712</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66215-opensc-stack-buffer-overflow-write-in-card-oberthur/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66215-opensc-stack-buffer-overflow-write-in-card-oberthur/]]></link>
			<title>CVE-2025-66215 OpenSC: Stack-buffer-overflow WRITE in card-oberthur</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
				</channel>
</rss>
