What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain the rights of the user that is running the affected application. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker with standard user privileges could place a malicious file on the Visual Code server and then wait for the privileged victim to run the server.
<a href="https://github.com/ycdxsb">ycdxsb</a>