Because it was written in C, libxml2's CVE history has been dominated by use-after-free, buffer overflows, double frees, and type confusion. xmloxide is written in pure Rust, so these entire vulnerability classes are eliminated at compile time.
If by flaws you mean the security researchers spamming libxml2 with low effort stuff demanding a CVE for each one so they can brag about it – no, I don’t think anybody can fix that.
jawiggins|1 day ago
sarchertech|1 day ago
blegge|1 day ago
Doesn't seem to have shut down or even be unmaintained. Perhaps it was briefly, and has now been resurrected?
fweimer|20 hours ago
notpushkin|1 day ago
bawolff|1 day ago