First published: Wed Aug 02 2017(Updated: )
Untrusted search path vulnerability in F-Secure Online Scanner allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL that is located in the same folder as F-SecureOnlineScanner.exe.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
F-Secure Online Scanner |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8264 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2015-8264, ensure that your F-Secure Online Scanner is updated to the latest version to mitigate the vulnerability.
CVE-2015-8264 can enable DLL hijacking attacks, allowing attackers to execute arbitrary code.
CVE-2015-8264 affects F-Secure Online Scanner software.
Yes, CVE-2015-8264 can be exploited remotely by attackers using a specially crafted Trojan horse DLL.