Technology ❯ Cybersecurity ❯ Vulnerabilities ❯ Software Vulnerabilities
Attackers can execute code by sending crafted packets to vulnerable on‑prem clients over TCP 443.