Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
https://www.exploit-db.com/exploits/42711/
https://github.com/GitHubAssessments/CVE_Assessments_01_2020
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-133a
https://www.tenable.com/blog/analyzing-the-vulnerabilities-associated-with-the-top-malware-strains-of-2021
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759
https://github.com/nccgroup/CVE-2017-8759
https://github.com/bhdresh/CVE-2017-8759
http://www.securitytracker.com/id/1039324
http://www.securityfocus.com/bid/100742
Source: Mitre, NVD
Published: 2017-09-13
Updated: 2025-04-20
Known Exploited Vulnerability (KEV)
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS: 0.93893