Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Visual_studio_code
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 47 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-03-24 | CVE-2021-28967 | The unofficial MATLAB extension before 2.0.1 for Visual Studio Code allows attackers to execute arbitrary code via a crafted workspace because of lint configuration settings. | Visual_studio_code | 9.8 | ||
2021-12-15 | CVE-2021-43908 | Visual Studio Code Spoofing Vulnerability | Visual_studio_code | 4.3 | ||
2020-05-21 | CVE-2020-1171 | A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192. | Visual_studio_code | 8.8 | ||
2020-05-21 | CVE-2020-1192 | A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads workspace settings from a notebook file, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1171. | Visual_studio_code | 7.8 | ||
2019-03-05 | CVE-2019-0728 | A remote code execution vulnerability exists in Visual Studio Code when it process environment variables after opening a project, aka 'Visual Studio Code Remote Code Execution Vulnerability'. | Visual_studio_code | 7.8 | ||
2020-01-24 | CVE-2019-1414 | An elevation of privilege vulnerability exists in Visual Studio Code when it exposes a debug listener to users of a local computer, aka 'Visual Studio Code Elevation of Privilege Vulnerability'. | Visual_studio_code | N/A | ||
2018-06-26 | CVE-2018-0597 | Untrusted search path vulnerability in the installer of Visual Studio Code allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | Visual_studio_code | 7.8 |