Show filters
272 Total Results
Displaying 171-180 of 272
Sort by:
Attacker Value
Unknown

CVE-2020-17150

Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Visual Studio Code Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2020-17156

Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Visual Studio Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2020-17148

Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2020-17100

Disclosure Date: November 11, 2020 (last updated November 28, 2024)
Visual Studio Tampering Vulnerability
0
Attacker Value
Unknown

CVE-2020-17104

Disclosure Date: November 11, 2020 (last updated November 28, 2024)
Visual Studio Code JSHint Extension Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2020-17023

Disclosure Date: October 16, 2020 (last updated November 28, 2024)
<p>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious 'package.json' file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would need to convince a target to clone a repository and open it in Visual Studio Code. Attacker-specified code would execute when the target opens the malicious 'package.json' file.</p> <p>The update address the vulnerability by modifying the way Visual Studio Code handles JSON files.</p>
0
Attacker Value
Unknown

CVE-2020-16977

Disclosure Date: October 16, 2020 (last updated November 28, 2024)
<p>A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads a Jupyter notebook file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would need to convince a target to open a specially crafted file in Visual Studio Code with the Python extension installed.</p> <p>The update addresses the vulnerability by modifying the way Visual Studio Code Python extension renders notebook content.</p>
0
Attacker Value
Unknown

CVE-2020-26870

Disclosure Date: October 07, 2020 (last updated February 22, 2025)
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
Attacker Value
Unknown

CVE-2020-8927

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Attacker Value
Unknown

CVE-2020-1130

Disclosure Date: September 11, 2020 (last updated November 28, 2024)
<p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles data operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.</p> <p>An attacker could exploit this vulnerability by running a specially crafted application on the victim system.</p> <p>The update addresses the vulnerability by correcting the way the Diagnostics Hub Standard Collector handles data operations.</p>
0