Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7725 | Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected. |
Github GHSA |
GHSA-qv4q-mr5r-qprj | Unchecked return value from xmlTextReaderExpand |
Wed, 23 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T16:31:18.189Z
Reserved: 2022-01-19T21:23:53.758Z
Link: CVE-2022-23476
Updated: 2024-08-03T03:43:46.006Z
Status : Modified
Published: 2022-12-08T04:15:09.043
Modified: 2024-11-21T06:48:38.397
Link: CVE-2022-23476
OpenCVE Enrichment
No data.
EUVD
Github GHSA