8.8
CVSSv3

CVE-2020-1481

Published: 14/07/2020 Updated: 21/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 829
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists in the ESLint extension for Visual Studio Code when it validates source code after opening a project, aka 'Visual Studio Code ESLint Extention Remote Code Execution Vulnerability'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft visual studio code eslint extension

Github Repositories

Poc for CVE-2020-14181

CVE-2020-14181 Poc for CVE-2020-14181 Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHoverjspa endpoint This vulnerability was discovered by Mikhail Klyuchnikov of Positive Technologies POC For CVE-2020-1481 - Jira Username Enumerator/Validator Usage: pyth

POC For CVE-2020-1481 - Jira Username Enumerator/Validator

CVE-2020-14181 Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHoverjspa endpoint This vulnerability was discovered by Mikhail Klyuchnikov of Positive Technologies Affected versions: version < 71316 800 ≤ version < 857 860 ≤ ver