<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2025-64718 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-64718/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sat, 18 Apr 2026 18:12:39 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2025-64718</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-64718/#post-19930</link>
                        <pubDate>Tue, 18 Nov 2025 10:42:27 +0000</pubDate>
                        <description><![CDATA[Description
js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it&#039;s possible for an attacker to modify the prototype of the result of a parsed yaml document via pro...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using `node --disable-proto=delete` or `deno` (in Deno, pollution protection is on by default).</p>
<h3>References</h3>
<p><a class="external" href="https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879" target="_blank" rel="noopener noreferrer">https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879</a></p>
<p><a class="external" href="https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m" target="_blank" rel="noopener noreferrer">https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m</a></p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>Rinki Singh</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-64718/#post-19930</guid>
                    </item>
							        </channel>
        </rss>
		