Sparklemotion Nokogiri vulnerabilities
7 known vulnerabilities affecting sparklemotion/nokogiri.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2025-6494MEDIUMCVSS 4.8vc29c920907366cb74af13b4dc2230e9c9e23b8332025-06-22
CVE-2025-6494 [MEDIUM] CWE-119 CVE-2025-6494: A vulnerability was found in sparklemotion nokogiri c29c920907366cb74af13b4dc2230e9c9e23b833. It has
A vulnerability was found in sparklemotion nokogiri c29c920907366cb74af13b4dc2230e9c9e23b833. It has been classified as problematic. This affects the function hashmap_get_with_hash of the file gumbo-parser/src/hashmap.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the
nvd
CVE-2025-6490MEDIUMCVSS 4.8vc29c920907366cb74af13b4dc2230e9c9e23b8332025-06-22
CVE-2025-6490 [MEDIUM] CWE-119 CVE-2025-6490: A vulnerability was found in sparklemotion nokogiri c29c920907366cb74af13b4dc2230e9c9e23b833 and cla
A vulnerability was found in sparklemotion nokogiri c29c920907366cb74af13b4dc2230e9c9e23b833 and classified as problematic. This issue affects the function hashmap_set_with_hash of the file gumbo-parser/src/hashmap.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the pub
nvd
CVE-2022-23476HIGHCVSS 7.5v>= 1.13.8, < 1.13.102022-12-08
CVE-2022-23476 [HIGH] CWE-252 CVE-2022-23476: Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8`
Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse un
nvd
CVE-2022-29181HIGHCVSS 8.2fixed in 1.13.62022-05-20
CVE-2022-29181 [HIGH] CWE-241 CVE-2022-29181: Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure
nvd
CVE-2022-24836HIGHCVSS 7.5fixed in 1.13.42022-04-11
CVE-2022-24836 [HIGH] CWE-400 CVE-2022-24836: Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `< v1.13.4` contains an inefficie
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `= 1.13.4`. There are no known workarounds for this issue.
nvd
CVE-2021-41098HIGHCVSS 7.5fixed in 1.12.52021-09-27
CVE-2021-41098 [HIGH] CWE-611 CVE-2021-41098: Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector suppo
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::
nvd
CVE-2020-26247MEDIUMCVSS 4.3fixed in 1.11.0.rc42020-12-30
CVE-2020-26247 [MEDIUM] CWE-611 CVE-2020-26247: Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector suppo
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This be
nvd