![]() Furthermore, exploitation can only succeed when Self-Defense is disabled. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. ![]() A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. ![]()
0 Comments
Leave a Reply. |