Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1933 | stanford-parser v3.9.2 and below was discovered to contain a code injection vulnerability in the component edu.stanford.nlp.io.getBZip2PipedInputStream. This vulnerability is exploited via passing an unchecked argument. |
Github GHSA |
GHSA-353m-jh2m-72v4 | Code injection in stanford-parser |
Tue, 22 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-22T19:43:14.434Z
Reserved: 2023-07-25T00:00:00.000Z
Link: CVE-2023-39020
Updated: 2024-08-02T17:54:39.996Z
Status : Modified
Published: 2023-07-28T15:15:13.287
Modified: 2024-11-21T08:14:38.043
Link: CVE-2023-39020
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA