<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 10, 2026 at 6:37 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37457/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37457/]]></link>
			<title>CVE-2026-37457</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:04:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/why-voip-scams-keep-spreading-and-why-theyre-hard-to-stop/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/why-voip-scams-keep-spreading-and-why-theyre-hard-to-stop/]]></link>
			<title>Why VoIP scams keep spreading, and why they’re hard to stop</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42501-malicious-module-proxy-can-bypass-checksum-database-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42501-malicious-module-proxy-can-bypass-checksum-database-in-cmd-go/]]></link>
			<title>CVE-2026-42501 Malicious module proxy can bypass checksum database in cmd/go</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42499-quadratic-string-concatenation-in-consumephrase-in-net-mail/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42499-quadratic-string-concatenation-in-consumephrase-in-net-mail/]]></link>
			<title>CVE-2026-42499 Quadratic string concatenation in consumePhrase in net/mail</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39836-panic-in-dial-and-lookupport-when-handling-nul-byte-on-windows-in-net/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39836-panic-in-dial-and-lookupport-when-handling-nul-byte-on-windows-in-net/]]></link>
			<title>CVE-2026-39836 Panic in Dial and LookupPort when handling NUL byte on Windows in net</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39826-escaper-bypass-leads-to-xss-in-html-template/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39826-escaper-bypass-leads-to-xss-in-html-template/]]></link>
			<title>CVE-2026-39826 Escaper bypass leads to XSS in html/template</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39825-reverseproxy-forwards-queries-with-more-than-urlmaxqueryparams-parameters-in-net-http-httputil/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39825-reverseproxy-forwards-queries-with-more-than-urlmaxqueryparams-parameters-in-net-http-httputil/]]></link>
			<title>CVE-2026-39825 ReverseProxy forwards queries with more than urlmaxqueryparams parameters in net/http/httputil</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39823-bypass-of-meta-content-url-escaping-causes-xss-in-html-template/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39823-bypass-of-meta-content-url-escaping-causes-xss-in-html-template/]]></link>
			<title>CVE-2026-39823 Bypass of meta content URL escaping causes XSS in html/template</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39820-quadratic-string-concatentation-in-consumecomment-in-net-mail/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39820-quadratic-string-concatentation-in-consumecomment-in-net-mail/]]></link>
			<title>CVE-2026-39820 Quadratic string concatentation in consumeComment in net/mail</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39819-invoking-go-bug-follows-symlinks-in-predictable-temporary-filenames-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39819-invoking-go-bug-follows-symlinks-in-predictable-temporary-filenames-in-cmd-go/]]></link>
			<title>CVE-2026-39819 Invoking &quot;go bug&quot; follows symlinks in predictable temporary filenames in cmd/go</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39817-invoking-go-tool-pack-does-not-sanitize-output-paths-in-cmd-go/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-39817-invoking-go-tool-pack-does-not-sanitize-output-paths-in-cmd-go/]]></link>
			<title>CVE-2026-39817 Invoking &quot;go tool pack&quot; does not sanitize output paths in cmd/go</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33811-crash-when-handling-long-cname-response-in-net/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33811-crash-when-handling-long-cname-response-in-net/]]></link>
			<title>CVE-2026-33811 Crash when handling long CNAME response in net</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44656-vim-os-command-injection-via-path-completion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-44656-vim-os-command-injection-via-path-completion/]]></link>
			<title>CVE-2026-44656 Vim: OS Command Injection via &#039;path&#039; completion</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-45130-vim-heap-buffer-overflow-in-spell-file-loading/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-45130-vim-heap-buffer-overflow-in-spell-file-loading/]]></link>
			<title>CVE-2026-45130 Vim: Heap Buffer Overflow in spell file loading</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6666-pgbouncer-crash-in-kill_pool_logins_server_error/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6666-pgbouncer-crash-in-kill_pool_logins_server_error/]]></link>
			<title>CVE-2026-6666 PgBouncer crash in kill_pool_logins_server_error</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6667-pgbouncer-missing-authorization-check-in-kill_client-admin-command/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6667-pgbouncer-missing-authorization-check-in-kill_client-admin-command/]]></link>
			<title>CVE-2026-6667 PgBouncer missing authorization check in KILL_CLIENT admin command</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6665-pgbouncer-buffer-overflow-in-scram/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6665-pgbouncer-buffer-overflow-in-scram/]]></link>
			<title>CVE-2026-6665 PgBouncer buffer overflow in SCRAM</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6664-pgbouncer-integer-overflow-in-pgbouncer-network-packet-parsing/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6664-pgbouncer-integer-overflow-in-pgbouncer-network-packet-parsing/]]></link>
			<title>CVE-2026-6664 PgBouncer integer overflow in PgBouncer network packet parsing</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3832-gnutls-gnutls-security-bypass-allows-acceptance-of-revoked-server-certificates-via-crafted-ocsp-response/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-3832-gnutls-gnutls-security-bypass-allows-acceptance-of-revoked-server-certificates-via-crafted-ocsp-response/]]></link>
			<title>CVE-2026-3832 Gnutls: gnutls: security bypass allows acceptance of revoked server certificates via crafted ocsp response</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41889-pgx-sql-injection-via-placeholder-confusion-with-dollar-quoted-string-literals/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41889-pgx-sql-injection-via-placeholder-confusion-with-dollar-quoted-string-literals/]]></link>
			<title>CVE-2026-41889 pgx: SQL Injection via placeholder confusion with dollar quoted string literals</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33079-mistune-redos-in-link_title_re-allows-denial-of-service-with-crafted-markdown-titles/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33079-mistune-redos-in-link_title_re-allows-denial-of-service-with-crafted-markdown-titles/]]></link>
			<title>CVE-2026-33079 Mistune ReDoS in LINK_TITLE_RE allows denial of service with crafted Markdown titles</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40170-ngtcp2-has-a-qlog-transport-parameter-serialization-stack-buffer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40170-ngtcp2-has-a-qlog-transport-parameter-serialization-stack-buffer-overflow/]]></link>
			<title>CVE-2026-40170 ngtcp2 has a qlog transport parameter serialization stack buffer overflow</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:04:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33814-infinite-loop-in-http-2-transport-when-given-bad-settings_max_frame_size-in-net-http-internal-http2-in-golang-org-x-net/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33814-infinite-loop-in-http-2-transport-when-given-bad-settings_max_frame_size-in-net-http-internal-http2-in-golang-org-x-net/]]></link>
			<title>CVE-2026-33814 Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net</title>
			<pubDate><![CDATA[Sun, 10 May 2026 11:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42798/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-42798/]]></link>
			<title>CVE-2026-42798</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:04:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6019-basecookie-js_output-does-not-neutralize-embedded-characters/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6019-basecookie-js_output-does-not-neutralize-embedded-characters/]]></link>
			<title>CVE-2026-6019 BaseCookie.js_output() does not neutralize embedded characters</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/elevate-your-business-data-analysis-with-key-excel-tools/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/elevate-your-business-data-analysis-with-key-excel-tools/]]></link>
			<title>Elevate your business data analysis with key Excel tools</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41080/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41080/]]></link>
			<title>CVE-2026-41080</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28532-frrouting-10-5-3-integer-overflow-in-ospf-tlv-parser-functions/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-28532-frrouting-10-5-3-integer-overflow-in-ospf-tlv-parser-functions/]]></link>
			<title>CVE-2026-28532 FRRouting &lt; 10.5.3 Integer Overflow in OSPF TLV Parser Functions</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32148-lockfile-checksums-not-verified-in-hex-allows-dependency-integrity-bypass/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32148-lockfile-checksums-not-verified-in-hex-allows-dependency-integrity-bypass/]]></link>
			<title>CVE-2026-32148 Lockfile checksums not verified in Hex allows dependency integrity bypass</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-9403-jqlang-jq-json-jq_test-c-run_jq_tests-assertion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-9403-jqlang-jq-json-jq_test-c-run_jq_tests-assertion/]]></link>
			<title>CVE-2025-9403 jqlang jq JSON jq_test.c run_jq_tests assertion</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2017-20230-storable-versions-before-3-05-for-perl-has-a-stack-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2017-20230-storable-versions-before-3-05-for-perl-has-a-stack-overflow/]]></link>
			<title>CVE-2017-20230 Storable versions before 3.05 for Perl has a stack overflow</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6843-nano-nano-format-string-vulnerability-leads-to-denial-of-service/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6843-nano-nano-format-string-vulnerability-leads-to-denial-of-service/]]></link>
			<title>CVE-2026-6843 Nano: nano: format string vulnerability leads to denial of service</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6842-nano-nano-local-attacker-can-inject-malicious-desktop-launcher-due-to-insecure-directory-permissions/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6842-nano-nano-local-attacker-can-inject-malicious-desktop-launcher-due-to-insecure-directory-permissions/]]></link>
			<title>CVE-2026-6842 Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissions</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-30656/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-30656/]]></link>
			<title>CVE-2026-30656</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-11083-gnu-binutils-linker-elfcode-h-elf_swap_shdr-heap-based-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-11083-gnu-binutils-linker-elfcode-h-elf_swap_shdr-heap-based-overflow/]]></link>
			<title>CVE-2025-11083 GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-8224-gnu-binutils-bfd-library-elf-c-bfd_elf_get_str_section-null-pointer-dereference/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-8224-gnu-binutils-bfd-library-elf-c-bfd_elf_get_str_section-null-pointer-dereference/]]></link>
			<title>CVE-2025-8224 GNU Binutils BFD Library elf.c bfd_elf_get_str_section null pointer dereference</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6846-binutils-binutils-arbitrary-code-execution-via-malformed-xcoff-object-file-processing/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6846-binutils-binutils-arbitrary-code-execution-via-malformed-xcoff-object-file-processing/]]></link>
			<title>CVE-2026-6846 Binutils: binutils: arbitrary code execution via malformed xcoff object file processing</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6845-binutils-binutils-denial-of-service-via-crafted-elf-file/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-6845-binutils-binutils-denial-of-service-via-crafted-elf-file/]]></link>
			<title>CVE-2026-6845 Binutils: binutils: denial of service via crafted elf file</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43058-media-vidtv-fix-pass-by-value-structs-causing-msan-warnings/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-43058-media-vidtv-fix-pass-by-value-structs-causing-msan-warnings/]]></link>
			<title>CVE-2026-43058 media: vidtv: fix pass-by-value structs causing MSAN warnings</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33825-microsoft-defender-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33825-microsoft-defender-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-33825 Microsoft Defender Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-24051-opentelemetry-go-affected-by-arbitrary-code-execution-via-path-hijacking/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-24051-opentelemetry-go-affected-by-arbitrary-code-execution-via-path-hijacking/]]></link>
			<title>CVE-2026-24051 OpenTelemetry-Go Affected by Arbitrary Code Execution via PATH Hijacking</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 21:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31431-crypto-algif_aead-revert-to-operating-out-of-place/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31431-crypto-algif_aead-revert-to-operating-out-of-place/]]></link>
			<title>CVE-2026-31431 crypto: algif_aead &#8211; Revert to operating out-of-place</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/website-design-in-2026-what-actually-drives-results-for-small-businesses/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/website-design-in-2026-what-actually-drives-results-for-small-businesses/]]></link>
			<title>Website design in 2026: What actually drives results for small businesses</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 23:46:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37555/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-37555/]]></link>
			<title>CVE-2026-37555</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7598-libssh2-userauth-c-userauth_password-integer-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-7598-libssh2-userauth-c-userauth_password-integer-overflow/]]></link>
			<title>CVE-2026-7598 libssh2 userauth.c userauth_password integer overflow</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31608-smb-server-avoid-double-free-in-smb_direct_free_sendmsg-after-smb_direct_flush_send_list/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31608-smb-server-avoid-double-free-in-smb_direct_free_sendmsg-after-smb_direct_flush_send_list/]]></link>
			<title>CVE-2026-31608 smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31598-ocfs2-fix-possible-deadlock-between-unlink-and-dio_end_io_write/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31598-ocfs2-fix-possible-deadlock-between-unlink-and-dio_end_io_write/]]></link>
			<title>CVE-2026-31598 ocfs2: fix possible deadlock between unlink and dio_end_io_write</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31602-alsa-ctxfi-limit-ptp-to-a-single-page/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31602-alsa-ctxfi-limit-ptp-to-a-single-page/]]></link>
			<title>CVE-2026-31602 ALSA: ctxfi: Limit PTP to a single page</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:16:02 +0000]]></pubDate>
		</item>
				</channel>
</rss>
