Vulnerabilities in Eset software