Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Visual_studio_code
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 47 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-05-21 | CVE-2020-1171 | A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192. | Visual_studio_code | 8.8 | ||
2020-05-21 | CVE-2020-1192 | A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads workspace settings from a notebook file, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1171. | Visual_studio_code | 7.8 | ||
2020-07-14 | CVE-2020-1416 | An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka 'Visual Studio and Visual Studio Code Elevation of Privilege Vulnerability'. | Azure_storage_explorer, Typescript, Visual_studio_2017, Visual_studio_2019, Visual_studio_code | 8.8 | ||
2020-09-11 | CVE-2020-16881 | <p>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious 'package.json' file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user... | Visual_studio_code | N/A | ||
2020-10-16 | CVE-2020-16977 | <p>A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads a Jupyter notebook file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To... | Visual_studio_code | N/A | ||
2020-10-16 | CVE-2020-17023 | <p>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious 'package.json' file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user... | Visual_studio_code | N/A | ||
2020-11-11 | CVE-2020-17104 | Visual Studio Code JSHint Extension Remote Code Execution Vulnerability | Visual_studio_code | N/A | ||
2020-12-10 | CVE-2020-17148 | Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability | Visual_studio_code | N/A | ||
2020-12-10 | CVE-2020-17150 | Visual Studio Code Remote Code Execution Vulnerability | Visual_studio_code | N/A | ||
2020-12-10 | CVE-2020-17159 | Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability | Visual_studio_code | N/A |