<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 9, 2026 at 8:39 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.netservicesgroup.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Network Services Group</title>
		<link><![CDATA[https://www.netservicesgroup.com]]></link>
		<description><![CDATA[Network Services Group]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.netservicesgroup.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 01:29:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/]]></link>
			<title>Welcome to Network Services Group</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 20:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/unlock-business-growth-with-email-automation/]]></link>
			<title>Unlock business growth with email automation</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29785-nats-server-panic-via-malicious-compression-on-leafnode-port/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29785-nats-server-panic-via-malicious-compression-on-leafnode-port/]]></link>
			<title>CVE-2026-29785 NATS Server panic via malicious compression on leafnode port</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/master-your-gmail-inbox-combat-email-overload-for-better-productivity/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/master-your-gmail-inbox-combat-email-overload-for-better-productivity/]]></link>
			<title>Master your Gmail inbox: Combat email overload for better productivity</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21715/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21715/]]></link>
			<title>CVE-2026-21715</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21710/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21710/]]></link>
			<title>CVE-2026-21710</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21717/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21717/]]></link>
			<title>CVE-2026-21717</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66038-opensc-sc_compacttlv_find_tag-can-return-out-of-bounds-pointers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66038-opensc-sc_compacttlv_find_tag-can-return-out-of-bounds-pointers/]]></link>
			<title>CVE-2025-66038 OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66037-opensc-out-of-bounds-vulnerability/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66037-opensc-out-of-bounds-vulnerability/]]></link>
			<title>CVE-2025-66037 OpenSC: Out of Bounds vulnerability</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66215-opensc-stack-buffer-overflow-write-in-card-oberthur/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-66215-opensc-stack-buffer-overflow-write-in-card-oberthur/]]></link>
			<title>CVE-2025-66215 OpenSC: Stack-buffer-overflow WRITE in card-oberthur</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-49010-opensc-stack-buffer-overflow-write-in-get-response/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-49010-opensc-stack-buffer-overflow-write-in-get-response/]]></link>
			<title>CVE-2025-49010 OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34982-vim-modeline-bypass-via-various-options-affects-vim-9-2-0276/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34982-vim-modeline-bypass-via-various-options-affects-vim-9-2-0276/]]></link>
			<title>CVE-2026-34982 Vim modeline bypass via various options affects Vim &lt; 9.2.0276</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35093-libinput-libinput-unauthorized-code-execution-and-information-disclosure-through-lua-bytecode-plugins/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35093-libinput-libinput-unauthorized-code-execution-and-information-disclosure-through-lua-bytecode-plugins/]]></link>
			<title>CVE-2026-35093 Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32287-infinite-loop-in-github-com-antchfx-xpath/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-32287-infinite-loop-in-github-com-antchfx-xpath/]]></link>
			<title>CVE-2026-32287 Infinite loop in github.com/antchfx/xpath</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33216-nats-has-mqtt-plaintext-password-disclosure/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33216-nats-has-mqtt-plaintext-password-disclosure/]]></link>
			<title>CVE-2026-33216 NATS has MQTT plaintext password disclosure</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33416-libpng-has-use-after-free-via-pointer-aliasing-in-png_set_trns-and-png_set_plte/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33416-libpng-has-use-after-free-via-pointer-aliasing-in-png_set_trns-and-png_set_plte/]]></link>
			<title>CVE-2026-33416 LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2436-libsoup-libsoup-denial-of-service-via-use-after-free-in-soupserver-during-tls-handshake/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-2436-libsoup-libsoup-denial-of-service-via-use-after-free-in-soupserver-during-tls-handshake/]]></link>
			<title>CVE-2026-2436 Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34445-onnx-malicious-onnx-models-can-crash-servers-by-exploiting-unprotected-object-settings/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34445-onnx-malicious-onnx-models-can-crash-servers-by-exploiting-unprotected-object-settings/]]></link>
			<title>CVE-2026-34445 ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4732-out-of-bounds-read-overflow-in-tildearrow-furnace/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4732-out-of-bounds-read-overflow-in-tildearrow-furnace/]]></link>
			<title>CVE-2026-4732 Out-of-bounds Read Overflow in tildearrow/furnace</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4897-polkit-polkit-denial-of-service-via-unbounded-input-processing-through-standard-input/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4897-polkit-polkit-denial-of-service-via-unbounded-input-processing-through-standard-input/]]></link>
			<title>CVE-2026-4897 Polkit: polkit: denial of service via unbounded input processing through standard input</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34446-onnx-arbitrary-file-read-via-externaldata-hardlink-bypass-in-onnx-load/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34446-onnx-arbitrary-file-read-via-externaldata-hardlink-bypass-in-onnx-load/]]></link>
			<title>CVE-2026-34446 ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34043-serialize-javascript-has-cpu-exhaustion-denial-of-service-via-crafted-array-like-objects/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34043-serialize-javascript-has-cpu-exhaustion-denial-of-service-via-crafted-array-like-objects/]]></link>
			<title>CVE-2026-34043 Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33936-python-ecdsa-denial-of-service-via-improper-der-length-validation-in-crafted-private-keys/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33936-python-ecdsa-denial-of-service-via-improper-der-length-validation-in-crafted-private-keys/]]></link>
			<title>CVE-2026-33936 python-ecdsa: Denial of Service via improper DER length validation in crafted private keys</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35177-path-traversal-issue-with-zip-vim-in-vim/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-35177-path-traversal-issue-with-zip-vim-in-vim/]]></link>
			<title>CVE-2026-35177 Path traversal issue with zip.vim in Vim</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:54:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5107-frrouting-frr-evpn-type-2-route-bgp_evpn-c-process_type2_route-access-control/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-5107-frrouting-frr-evpn-type-2-route-bgp_evpn-c-process_type2_route-access-control/]]></link>
			<title>CVE-2026-5107 FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/blog/3-reasons-you-should-turn-off-location-services-on-your-android-right-now/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/blog/3-reasons-you-should-turn-off-location-services-on-your-android-right-now/]]></link>
			<title>3 Reasons you should turn off location services on your Android right now</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:23:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33542-incus-does-not-verify-combined-fingerprint-when-downloading-images-from-simplestreams-servers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33542-incus-does-not-verify-combined-fingerprint-when-downloading-images-from-simplestreams-servers/]]></link>
			<title>CVE-2026-33542 Incus does not verify combined fingerprint when downloading images from simplestreams servers</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33750-brace-expansion-zero-step-sequence-causes-process-hang-and-memory-exhaustion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33750-brace-expansion-zero-step-sequence-causes-process-hang-and-memory-exhaustion/]]></link>
			<title>CVE-2026-33750 brace-expansion: Zero-step sequence causes process hang and memory exhaustion</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34353/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34353/]]></link>
			<title>CVE-2026-34353</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21712/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21712/]]></link>
			<title>CVE-2026-21712</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0964-libssh-improper-sanitation-of-paths-received-from-scp-servers/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0964-libssh-improper-sanitation-of-paths-received-from-scp-servers/]]></link>
			<title>CVE-2026-0964 Libssh: improper sanitation of paths received from scp servers</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0966-libssh-buffer-underflow-in-ssh_get_hexa-on-invalid-input/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0966-libssh-buffer-underflow-in-ssh_get_hexa-on-invalid-input/]]></link>
			<title>CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0967-libssh-libssh-denial-of-service-via-inefficient-regular-expression-processing/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0967-libssh-libssh-denial-of-service-via-inefficient-regular-expression-processing/]]></link>
			<title>CVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processing</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0965-libssh-libssh-denial-of-service-via-improper-configuration-file-handling/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-0965-libssh-libssh-denial-of-service-via-improper-configuration-file-handling/]]></link>
			<title>CVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handling</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-67030/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2025-67030/]]></link>
			<title>CVE-2025-67030</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4645-github-com-antchfx-xpath-xpath-denial-of-service-via-crafted-boolean-xpath-expressions/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4645-github-com-antchfx-xpath-xpath-denial-of-service-via-crafted-boolean-xpath-expressions/]]></link>
			<title>CVE-2026-4645 Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34714/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-34714/]]></link>
			<title>CVE-2026-34714</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4746-heap-buffer-over-write-vulenrabilty-in-timeplus-io-proton/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-4746-heap-buffer-over-write-vulenrabilty-in-timeplus-io-proton/]]></link>
			<title>CVE-2026-4746 Heap Buffer Over-Write Vulenrabilty in timeplus-io/proton</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-41013-xfs-dont-walk-off-the-end-of-a-directory-data-block/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-41013-xfs-dont-walk-off-the-end-of-a-directory-data-block/]]></link>
			<title>CVE-2024-41013 xfs: don&#039;t walk off the end of a directory data block</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-35839-netfilter-bridge-replace-physindev-with-physinif-in-nf_bridge_info/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2024-35839-netfilter-bridge-replace-physindev-with-physinif-in-nf_bridge_info/]]></link>
			<title>CVE-2024-35839 netfilter: bridge: replace physindev with physinif in nf_bridge_info</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52676-bpf-guard-stack-limits-against-32bit-overflow/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2023-52676-bpf-guard-stack-limits-against-32bit-overflow/]]></link>
			<title>CVE-2023-52676 bpf: Guard stack limits against 32bit overflow</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29111-systemd-local-unprivileged-user-can-trigger-an-assert/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-29111-systemd-local-unprivileged-user-can-trigger-an-assert/]]></link>
			<title>CVE-2026-29111 systemd: Local unprivileged user can trigger an assert</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21711/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21711/]]></link>
			<title>CVE-2026-21711</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21713/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21713/]]></link>
			<title>CVE-2026-21713</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21716/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21716/]]></link>
			<title>CVE-2026-21716</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21714/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-21714/]]></link>
			<title>CVE-2026-21714</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33937-handlebars-js-has-javascript-injection-via-ast-type-confusion/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33937-handlebars-js-has-javascript-injection-via-ast-type-confusion/]]></link>
			<title>CVE-2026-33937 Handlebars.js has JavaScript Injection via AST Type Confusion</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 09:22:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33636-libpng-has-arm-neon-palette-expansion-out-of-bounds-read-on-aarch64/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-33636-libpng-has-arm-neon-palette-expansion-out-of-bounds-read-on-aarch64/]]></link>
			<title>CVE-2026-33636 LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:38:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23324-can-usb-etas_es58x-correctly-anchor-the-urb-in-the-read-bulk-callback/]]></guid>
			<link><![CDATA[https://www.netservicesgroup.com/msrc-blog-alerts/cve-2026-23324-can-usb-etas_es58x-correctly-anchor-the-urb-in-the-read-bulk-callback/]]></link>
			<title>CVE-2026-23324 can: usb: etas_es58x: correctly anchor the urb in the read bulk callback</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 14:02:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
