Описание
Visual Studio Code Elevation of Privilege Vulnerability
Обходное решение
The following workaround may be helpful in your situation:
- Create a folder C:\ProgramData\jupyter\kernels\ and configure it to be writable only by the current user
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could execute code in the context of another Visual Studio Code user on the vulnerable system.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Jupyter Extension for Visual Studio Code |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 89%
0.04402
Низкий
7.8 High
CVSS3
Связанные уязвимости
CVSS3: 7.8
nvd
больше 3 лет назад
Visual Studio Code Elevation of Privilege Vulnerability
EPSS
Процентиль: 89%
0.04402
Низкий
7.8 High
CVSS3