<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with vm2]]></title><description><![CDATA[A list of topics that have been tagged with vm2]]></description><link>https://board.circlewithadot.net/tags/vm2</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 06:13:39 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/vm2.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[#vm2 NodeJS Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution - patch now]]></title><description><![CDATA[#vm2 NodeJS Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution - patch now!Vm2 is used by 900+ #NPM packages:https://thehackernews.com/2026/05/vm2-nodejs-library-vulnerabilities.html]]></description><link>https://board.circlewithadot.net/topic/2953dcb8-9366-43bb-94fd-b07f5e0d776c/vm2-nodejs-library-vulnerabilities-enable-sandbox-escape-and-arbitrary-code-execution-patch-now</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/2953dcb8-9366-43bb-94fd-b07f5e0d776c/vm2-nodejs-library-vulnerabilities-enable-sandbox-escape-and-arbitrary-code-execution-patch-now</guid><dc:creator><![CDATA[securestep9@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>