Vulnerabilities in ESET Cyber Security