Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-41083

Опубликовано: 11 окт. 2022
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

Visual Studio Code Elevation of Privilege Vulnerability

Обходное решение

The following workaround may be helpful in your situation:

  • Create a folder C:\ProgramData\jupyter\kernels\ and configure it to be writable only by the current user

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could execute code in the context of another Visual Studio Code user on the vulnerable system.

Обновления

ПродуктСтатьяОбновление
Jupyter Extension for Visual Studio Code

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 89%
0.04402
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 3 лет назад

Visual Studio Code Elevation of Privilege Vulnerability

EPSS

Процентиль: 89%
0.04402
Низкий

7.8 High

CVSS3