Update

Microsoft Visual Studio Code

Microsoft Corporation

Microsoft Visual Studio Code

to version 1.111

View all applications

CVE Vulnerabilities for Microsoft Visual Studio Code

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2026‑411092026‑05‑12 18:17:22HIGH (9)Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network.36NETWORK
CVE‑2026‑215232026‑02‑10 18:16:35HIGH (8)Time-of-check time-of-use (toctou) race condition in GitHub Copilot and Visual Studio allows an authorized attacker to execute code over a network.26NETWORK
CVE‑2026‑215182026‑02‑10 18:16:34HIGH (9)Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an unauthorized attacker to bypass a security feature over a network.36NETWORK
CVE‑2025‑646602025‑11‑20 23:15:57HIGH (8)Improper access control in GitHub Copilot and Visual Studio Code allows an authorized attacker to execute code over a network.26NETWORK
CVE‑2025‑624532025‑11‑11 18:15:50MEDIUM (5)Improper validation of generative ai output in GitHub Copilot and Visual Studio Code allows an authorized attacker to bypass a security feature locally.14LOCAL
CVE‑2021‑344792021‑07‑14 18:15:11HIGH (8)Microsoft Visual Studio Spoofing Vulnerability26LOCAL
CVE‑2020‑169772020‑10‑16 23:15:17HIGH (7)<p>A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads a Jupyter notebook file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would need to convince a target to open a specially crafted file in Visual Studio Code with the Python extension installed.</p> <p>The update addresses the vulnerability by modifying the way Visual Studio Code Python extension renders notebook content.</p> 16LOCAL
CVE‑2020‑11922020‑05‑21 23:15:19HIGH (8)A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads workspace settings from a notebook file, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1171.26LOCAL
CVE‑2020‑11712020‑05‑21 23:15:18HIGH (9)A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.36NETWORK

View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.