Technology ❯ Cybersecurity ❯ Vulnerabilities ❯ Known Exploited Vulnerabilities
Attackers can execute code by sending crafted packets to vulnerable on‑prem clients over TCP 443.