FILE-OTHER -- Snort detected traffic targeting vulnerabilities in a file type that does not require enough rule coverage to have its own category.
FILE-OTHER Visual Studio Code Python extension arbitrary code execution attempt
This rule looks for a crafted repository that, when opened, will execute an arbitrary command on the victim's machine.
This rule fires on attempts to exploit an arbitrary command execution vulnerability in Microsoft Visual Studio Code's Python extension.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Execution
Technique: Exploitation for Client Execution
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org