<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 30, 2026 at 10:01 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31588-kvm-x86-use-scratch-field-in-mmio-fragment-to-hold-small-write-values/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31588-kvm-x86-use-scratch-field-in-mmio-fragment-to-hold-small-write-values/]]></link>
			<title>CVE-2026-31588 KVM: x86: Use scratch field in MMIO fragment to hold small write values</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31649-net-stmmac-fix-integer-underflow-in-chain-mode/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31649-net-stmmac-fix-integer-underflow-in-chain-mode/]]></link>
			<title>CVE-2026-31649 net: stmmac: fix integer underflow in chain mode</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31582-hwmon-powerz-fix-use-after-free-on-usb-disconnect/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31582-hwmon-powerz-fix-use-after-free-on-usb-disconnect/]]></link>
			<title>CVE-2026-31582 hwmon: (powerz) Fix use-after-free on USB disconnect</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31669-mptcp-fix-slab-use-after-free-in-__inet_lookup_established/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31669-mptcp-fix-slab-use-after-free-in-__inet_lookup_established/]]></link>
			<title>CVE-2026-31669 mptcp: fix slab-use-after-free in __inet_lookup_established</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31628-x86-cpu-fix-fpdss-on-zen1/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31628-x86-cpu-fix-fpdss-on-zen1/]]></link>
			<title>CVE-2026-31628 x86/CPU: Fix FPDSS on Zen1</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31630-rxrpc-proc-size-address-buffers-for-pispc-output/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31630-rxrpc-proc-size-address-buffers-for-pispc-output/]]></link>
			<title>CVE-2026-31630 rxrpc: proc: size address buffers for %pISpc output</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31629-nfc-llcp-add-missing-return-after-llcp_closed-checks/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31629-nfc-llcp-add-missing-return-after-llcp_closed-checks/]]></link>
			<title>CVE-2026-31629 nfc: llcp: add missing return after LLCP_CLOSED checks</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31657-batman-adv-hold-claim-backbone-gateways-by-reference/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31657-batman-adv-hold-claim-backbone-gateways-by-reference/]]></link>
			<title>CVE-2026-31657 batman-adv: hold claim backbone gateways by reference</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31616-usb-gadget-f_phonet-fix-skb-frags-overflow-in-pn_rx_complete/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31616-usb-gadget-f_phonet-fix-skb-frags-overflow-in-pn_rx_complete/]]></link>
			<title>CVE-2026-31616 usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31576-media-hackrf-fix-to-not-free-memory-after-the-device-is-registered-in-hackrf_probe/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31576-media-hackrf-fix-to-not-free-memory-after-the-device-is-registered-in-hackrf_probe/]]></link>
			<title>CVE-2026-31576 media: hackrf: fix to not free memory after the device is registered in hackrf_probe()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34591-poetry-has-wheel-path-traversal-which-can-lead-to-arbitrary-file-write/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34591-poetry-has-wheel-path-traversal-which-can-lead-to-arbitrary-file-write/]]></link>
			<title>CVE-2026-34591 Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23388-squashfs-check-metadata-block-offset-is-within-range/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23388-squashfs-check-metadata-block-offset-is-within-range/]]></link>
			<title>CVE-2026-23388 Squashfs: check metadata block offset is within range</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31619-alsa-fireworks-bound-device-supplied-status-before-string-array-lookup/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31619-alsa-fireworks-bound-device-supplied-status-before-string-array-lookup/]]></link>
			<title>CVE-2026-31619 ALSA: fireworks: bound device-supplied status before string array lookup</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31592-kvm-sev-protect-all-of-sev_mem_enc_register_region-with-kvm-lock/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31592-kvm-sev-protect-all-of-sev_mem_enc_register_region-with-kvm-lock/]]></link>
			<title>CVE-2026-31592 KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm-&gt;lock</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31597-ocfs2-fix-use-after-free-in-ocfs2_fault-when-vm_fault_retry/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31597-ocfs2-fix-use-after-free-in-ocfs2_fault-when-vm_fault_retry/]]></link>
			<title>CVE-2026-31597 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31578-media-as102-fix-to-not-free-memory-after-the-device-is-registered-in-as102_usb_probe/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31578-media-as102-fix-to-not-free-memory-after-the-device-is-registered-in-as102_usb_probe/]]></link>
			<title>CVE-2026-31578 media: as102: fix to not free memory after the device is registered in as102_usb_probe()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31586-mm-blk-cgroup-fix-use-after-free-in-cgwb_release_workfn/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31586-mm-blk-cgroup-fix-use-after-free-in-cgwb_release_workfn/]]></link>
			<title>CVE-2026-31586 mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/how-a-small-business-can-get-real-returns-from-ai/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/how-a-small-business-can-get-real-returns-from-ai/]]></link>
			<title>How a small business can get real returns from AI</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/a-hidden-android-flaw-that-breaks-the-lock-screen-in-seconds/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/a-hidden-android-flaw-that-breaks-the-lock-screen-in-seconds/]]></link>
			<title>A hidden Android flaw that breaks the lock screen in seconds</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/m5-macbook-air-vs-macbook-neo-which-apple-laptop-is-right-for-you/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/m5-macbook-air-vs-macbook-neo-which-apple-laptop-is-right-for-you/]]></link>
			<title>M5 MacBook Air vs. MacBook Neo: Which Apple laptop is right for you?</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:42:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32202-windows-shell-spoofing-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32202-windows-shell-spoofing-vulnerability/]]></link>
			<title>CVE-2026-32202 Windows Shell Spoofing Vulnerability</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0734-timing-attack-against-dsa/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0734-timing-attack-against-dsa/]]></link>
			<title>CVE-2018-0734 Timing attack against DSA</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0735-timing-attack-against-ecdsa-signature-generation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2018-0735-timing-attack-against-ecdsa-signature-generation/]]></link>
			<title>CVE-2018-0735 Timing attack against ECDSA signature generation</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23372-nfc-rawsock-cancel-tx_work-before-socket-teardown/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23372-nfc-rawsock-cancel-tx_work-before-socket-teardown/]]></link>
			<title>CVE-2026-23372 nfc: rawsock: cancel tx_work before socket teardown</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32077-windows-upnp-device-host-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32077-windows-upnp-device-host-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-32077 Windows UPnP Device Host Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23371-sched-deadline-fix-missing-enqueue_replenish-during-pi-de-boosting/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23371-sched-deadline-fix-missing-enqueue_replenish-during-pi-de-boosting/]]></link>
			<title>CVE-2026-23371 sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21523-github-copilot-and-visual-studio-code-remote-code-execution-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21523-github-copilot-and-visual-studio-code-remote-code-execution-vulnerability/]]></link>
			<title>CVE-2026-21523 GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23370-platform-x86-dell-wmi-sysman-dont-hex-dump-plaintext-password-data/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23370-platform-x86-dell-wmi-sysman-dont-hex-dump-plaintext-password-data/]]></link>
			<title>CVE-2026-23370 platform/x86: dell-wmi-sysman: Don&#039;t hex dump plaintext password data</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23368-net-phy-register-phy-led_triggers-during-probe-to-avoid-ab-ba-deadlock/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23368-net-phy-register-phy-led_triggers-during-probe-to-avoid-ab-ba-deadlock/]]></link>
			<title>CVE-2026-23368 net: phy: register phy led_triggers during probe to avoid AB-BA deadlock</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23364-ksmbd-compare-macs-in-constant-time/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23364-ksmbd-compare-macs-in-constant-time/]]></link>
			<title>CVE-2026-23364 ksmbd: Compare MACs in constant time</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23362-can-bcm-fix-locking-for-bcm_op-runtime-updates/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23362-can-bcm-fix-locking-for-bcm_op-runtime-updates/]]></link>
			<title>CVE-2026-23362 can: bcm: fix locking for bcm_op runtime updates</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31656-drm-i915-gt-fix-refcount-underflow-in-intel_engine_park_heartbeat/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31656-drm-i915-gt-fix-refcount-underflow-in-intel_engine_park_heartbeat/]]></link>
			<title>CVE-2026-31656 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23361-pci-dwc-ep-flush-msi-x-write-before-unmapping-its-atu-entry/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23361-pci-dwc-ep-flush-msi-x-write-before-unmapping-its-atu-entry/]]></link>
			<title>CVE-2026-23361 PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23359-bpf-fix-stack-out-of-bounds-write-in-devmap/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23359-bpf-fix-stack-out-of-bounds-write-in-devmap/]]></link>
			<title>CVE-2026-23359 bpf: Fix stack-out-of-bounds write in devmap</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23357-can-mcp251x-fix-deadlock-in-error-path-of-mcp251x_open/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23357-can-mcp251x-fix-deadlock-in-error-path-of-mcp251x_open/]]></link>
			<title>CVE-2026-23357 can: mcp251x: fix deadlock in error path of mcp251x_open</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23356-drbd-fix-logic-bug-in-drbd_al_begin_io_nonblock/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23356-drbd-fix-logic-bug-in-drbd_al_begin_io_nonblock/]]></link>
			<title>CVE-2026-23356 drbd: fix &quot;LOGIC BUG&quot; in drbd_al_begin_io_nonblock()</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/why-internet-based-calling-is-becoming-the-backbone-of-modern-business-operations/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/why-internet-based-calling-is-becoming-the-backbone-of-modern-business-operations/]]></link>
			<title>Why internet-based calling is becoming the backbone of modern business operations</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23352-x86-efi-defer-freeing-of-boot-services-memory/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23352-x86-efi-defer-freeing-of-boot-services-memory/]]></link>
			<title>CVE-2026-23352 x86/efi: defer freeing of boot services memory</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40372-asp-net-core-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-40372-asp-net-core-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-40372 ASP.NET Core Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-26168-windows-ancillary-function-driver-for-winsock-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-26168-windows-ancillary-function-driver-for-winsock-elevation-of-privilege-vulnerability/]]></link>
			<title>CVE-2026-26168 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32288-unbounded-allocation-for-old-gnu-sparse-in-archive-tar/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32288-unbounded-allocation-for-old-gnu-sparse-in-archive-tar/]]></link>
			<title>CVE-2026-32288 Unbounded allocation for old GNU sparse in archive/tar</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41254/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-41254/]]></link>
			<title>CVE-2026-41254</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:41:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31658-net-altera-tse-fix-skb-leak-on-dma-mapping-error-in-tse_start_xmit/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-31658-net-altera-tse-fix-skb-leak-on-dma-mapping-error-in-tse_start_xmit/]]></link>
			<title>CVE-2026-31658 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit()</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23351-netfilter-nft_set_pipapo-split-gc-into-unlink-and-reclaim-phase/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23351-netfilter-nft_set_pipapo-split-gc-into-unlink-and-reclaim-phase/]]></link>
			<title>CVE-2026-23351 netfilter: nft_set_pipapo: split gc into unlink and reclaim phase</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:39:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6297-use-after-free-in-proxy/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6297-use-after-free-in-proxy/]]></link>
			<title>Chromium: CVE-2026-6297 Use after free in Proxy</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6296-heap-buffer-overflow-in-angle/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6296-heap-buffer-overflow-in-angle/]]></link>
			<title>Chromium: CVE-2026-6296 Heap buffer overflow in ANGLE</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6364-out-of-bounds-read-in-skia/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/chromium-cve-2026-6364-out-of-bounds-read-in-skia/]]></link>
			<title>Chromium: CVE-2026-6364 Out of bounds read in Skia</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 13:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/microsoft-halts-automatic-copilot-rollout-for-windows/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/microsoft-halts-automatic-copilot-rollout-for-windows/]]></link>
			<title>Microsoft halts automatic Copilot rollout for Windows</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 00:40:40 +0000]]></pubDate>
		</item>
				</channel>
</rss>
