Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-8759

KEV EPSS 93.95% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-8759

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft .NET Framework 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft .NET Framework是美国微软(Microsoft)公司开发的一种全面且一致的编程模型,也是一个用于构建Windows、Windows Store、Windows Phone、Windows Server和Microsoft Azure的应用程序的开发平台。该平台包括C#和Visual Basic编程语言、公共语言运行库和广泛的类库。 Microsoft .NET Framework中存在远程代码执行漏洞。远程攻击者可借助恶意的文档或引用程序利用该漏洞执行代码。以下版本受到影响
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Microsoft CorporationMicrosoft .NET Framework Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 -

II. Public POCs for CVE-2017-8759

#POC DescriptionSource LinkShenlong Link
1Running CVE-2017-8759 exploit sample.https://github.com/Voulnet/CVE-2017-8759-Exploit-samplePOC Details
2NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinementshttps://github.com/nccgroup/CVE-2017-8759POC Details
3CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.https://github.com/vysecurity/CVE-2017-8759POC Details
4CVE-2017-8759 Researchhttps://github.com/BasuCert/CVE-2017-8759POC Details
5Nonehttps://github.com/tahisaad6/CVE-2017-8759-Exploit-sample2POC Details
6CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5https://github.com/homjxi0e/CVE-2017-8759_-SOAP_WSDLPOC Details
7Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.https://github.com/bhdresh/CVE-2017-8759POC Details
8CVE-2017-8759https://github.com/Lz1y/CVE-2017-8759POC Details
9Simple C# implementation of CVE-2017-8759https://github.com/JonasUliana/CVE-2017-8759POC Details
10Two versions of CVE-2017-8759 exploitshttps://github.com/ashr/CVE-2017-8759-exploitsPOC Details
11Nonehttps://github.com/l0n3rs/CVE-2017-8759POC Details
12Just My ports of CVE-2017-8759https://github.com/ChaitanyaHaritash/CVE-2017-8759POC Details
13yehnahhttps://github.com/smashinu/CVE-2017-8759ExpoitPOC Details
14CVE-2017-8759 微软word漏洞利用脚本https://github.com/adeljck/CVE-2017-8759POC Details
15CVE-2017-8759 use filehttps://github.com/zhengkook/CVE-2017-8759POC Details
16CVE-2017-8759 || report related with execute code vulnerabilityhttps://github.com/varunsaru/SNPPOC Details
17CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerabilityhttps://github.com/GayashanM/OHTSPOC Details
18CVE-2017-8759https://github.com/sythass/CVE-2017-8759POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-8759

登录查看更多情报信息。

Same Patch Batch · Microsoft Corporation · 2017-09-13 · 77 CVEs total

CVE-2017-8728Microsoft Windows PDF Library 安全漏洞
CVE-2017-8751Microsoft Windows Edge 安全漏洞
CVE-2017-8739Microsoft Windows Edge scripting引擎信息泄露漏洞
CVE-2017-8738Microsoft Windows Edge scripting引擎安全漏洞
CVE-2017-8737Microsoft Windows PDF Library 安全漏洞
CVE-2017-8736Microsoft Windows Edge和Internet Explorer 信息泄露漏洞
CVE-2017-8735Microsoft Windows Edge 安全漏洞
CVE-2017-8734Microsoft Windows Edge 安全漏洞
CVE-2017-8733Microsoft Windows Internet Explorer 安全漏洞
CVE-2017-8729Microsoft Windows Edge scripting引擎安全漏洞
CVE-2017-8740Microsoft Windows Edge scripting引擎安全漏洞
CVE-2017-8725Microsoft Publisher 安全漏洞
CVE-2017-8724Microsoft Windows Edge 安全漏洞
CVE-2017-8723Microsoft Windows Edge 安全漏洞
CVE-2017-8720Microsoft Windows graphics组件权限许可和访问控制问题漏洞
CVE-2017-8719Microsoft Windows内核组件息泄露漏洞
CVE-2017-8716Microsoft Windows Control Flow Guard 安全漏洞
CVE-2017-8714Microsoft Windows Hyper-V组件安全漏洞
CVE-2017-8713Microsoft Windows Hyper-V组件信息泄露漏洞
CVE-2017-8712Microsoft Windonws 信息泄露漏洞

Showing top 20 of 77 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-8759

No comments yet


Leave a comment