Show filters
272 Total Results
Displaying 171-180 of 272
Sort by:
Attacker Value
Unknown
CVE-2020-17150
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Visual Studio Code Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17156
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Visual Studio Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17148
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17100
Disclosure Date: November 11, 2020 (last updated November 28, 2024)
Visual Studio Tampering Vulnerability
0
Attacker Value
Unknown
CVE-2020-17104
Disclosure Date: November 11, 2020 (last updated November 28, 2024)
Visual Studio Code JSHint Extension Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17023
Disclosure Date: October 16, 2020 (last updated November 28, 2024)
<p>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious 'package.json' file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>To exploit this vulnerability, an attacker would need to convince a target to clone a repository and open it in Visual Studio Code. Attacker-specified code would execute when the target opens the malicious 'package.json' file.</p>
<p>The update address the vulnerability by modifying the way Visual Studio Code handles JSON files.</p>
0
Attacker Value
Unknown
CVE-2020-16977
Disclosure Date: October 16, 2020 (last updated November 28, 2024)
<p>A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads a Jupyter notebook file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>To exploit this vulnerability, an attacker would need to convince a target to open a specially crafted file in Visual Studio Code with the Python extension installed.</p>
<p>The update addresses the vulnerability by modifying the way Visual Studio Code Python extension renders notebook content.</p>
0
Attacker Value
Unknown
CVE-2020-26870
Disclosure Date: October 07, 2020 (last updated February 22, 2025)
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
0
Attacker Value
Unknown
CVE-2020-8927
Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
0
Attacker Value
Unknown
CVE-2020-1130
Disclosure Date: September 11, 2020 (last updated November 28, 2024)
<p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles data operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.</p>
<p>An attacker could exploit this vulnerability by running a specially crafted application on the victim system.</p>
<p>The update addresses the vulnerability by correcting the way the Diagnostics Hub Standard Collector handles data operations.</p>
0