Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
History
10 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/42711/ - Third Party Advisory, VDB Entry | |
References | () https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory | |
References | () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory |
24 Jul 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* |
|
First Time |
Microsoft windows 7
Microsoft windows 10 1703 Microsoft windows 10 1507 Microsoft windows 8.1 Microsoft windows 10 1511 Microsoft windows Server 2012 Microsoft windows Server 2016 Microsoft windows Rt 8.1 Microsoft windows Server 2008 Microsoft windows 10 1607 |
|
CWE | NVD-CWE-noinfo | |
References | (SECTRACK) http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory | |
References | (MISC) https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory |
Information
Published : 2017-09-13 01:29
Updated : 2025-03-13 21:00
NVD link : CVE-2017-8759
Mitre link : CVE-2017-8759
JSON object : View
Products Affected
microsoft
- windows_7
- windows_8.1
- windows_10_1607
- windows_10_1703
- windows_rt_8.1
- windows_10_1511
- windows_server_2016
- windows_server_2012
- .net_framework
- windows_10_1507
- windows_server_2008
CWE