{"@odata.context":"https://api.msrc.microsoft.com/sug/v2.0/en-US/$metadata#vulnerability/$entity","id":"00000000-0000-0000-0000-0000205dde16","releaseDate":"2021-05-11T07:00:00Z","cveNumber":"CVE-2021-31214","cveTitle":"Visual Studio Code Remote Code Execution Vulnerability","releaseNumber":"2021-May","vulnType":"Security Vulnerability","latestRevisionDate":"2021-05-11T07:00:00Z","cweList":[],"mitreText":"CVE-2021-31214","mitreUrl":"https://www.cve.org/CVERecord?id=CVE-2021-31214","publiclyDisclosed":"No","exploited":"No","latestSoftwareReleaseId":2,"latestSoftwareRelease":"Exploitation Less Likely","olderSoftwareReleaseId":2,"olderSoftwareRelease":"Exploitation Less Likely","denialOfService":"N/A","tag":"Visual Studio Code","issuingCna":"Microsoft","severityId":100000001,"severity":"Important","impactId":100000005,"impact":"Remote Code Execution","langCode":"en-US","baseScore":"7.8","temporalScore":"6.8","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","isMariner":false,"articles":[{"articleType":"FAQ","description":"
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
\nThe user would have be enticed to open a malicious file in a directory. Users should never open anything that they do not know or trust to be safe.
\n","ordinal":10000}],"revisions":[{"cveNumber":"CVE-2021-31214","version":1.0000000000,"revisionDate":"2021-05-11T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Information published.
\n","unformattedDescription":"Information published.","notificationNeeded":false,"notificationSent":false,"sourceId":"8d36d582-a9a7-eb11-a83e-000d3a6d3364"}]}