Analysis and Exploitation of an ESET Vulnerability