Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
History
21 Nov 2024, 03:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory | |
References | () https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory | |
References | () https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/42711/ - Third Party Advisory, VDB Entry |
24 Jul 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows Rt 8.1
Microsoft windows 7 Microsoft windows Server 2012 Microsoft windows 10 1507 Microsoft windows 10 1511 Microsoft windows 10 1703 Microsoft windows 8.1 Microsoft windows Server 2016 Microsoft windows 10 1607 Microsoft windows Server 2008 |
|
CPE | cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
References | () http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory | |
References | () https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory | |
References | () https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory |
Information
Published : 2017-09-13 01:29
Updated : 2024-11-21 03:34
NVD link : CVE-2017-8759
Mitre link : CVE-2017-8759
CVE.ORG link : CVE-2017-8759
JSON object : View
Products Affected
microsoft
- windows_10_1511
- windows_10_1703
- windows_10_1507
- windows_7
- .net_framework
- windows_8.1
- windows_rt_8.1
- windows_server_2016
- windows_10_1607
- windows_server_2012
- windows_server_2008
CWE