
Cloud Vulnerability DB
A community-led vulnerabilities database
Visual Studio Code (VS Code) was found to contain a spoofing vulnerability identified as CVE-2023-33144. The vulnerability affects VS Code versions prior to 1.79 and was disclosed in June 2023. This security issue impacts Microsoft's lightweight but powerful source code editor that runs on Windows, macOS, and Linux operating systems (Qualys Alert).
The vulnerability has been assigned a CVSS v3.1 Base Score of 6.6 (MEDIUM) with the following vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N. The vulnerability is classified under CWE-23 (Relative Path Traversal) according to Microsoft's assessment (NVD Database).
The vulnerability could potentially lead to information disclosure if successfully exploited. The CVSS scoring indicates that while the vulnerability requires local access and user interaction, it could result in high impacts to both confidentiality and integrity, though availability is not affected (NVD Database).
Microsoft has released a security update to address this vulnerability. Users are advised to upgrade to Visual Studio Code version 1.79 or later to mitigate the risk (Qualys Alert).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."