AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() ![]() ![]() Furthermore, exploitation can only succeed when Self-Defense is disabled. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions.
0 Comments
Read More
Leave a Reply. |