Uncovering Critical Vulnerabilities In Putty Ssh Client: What You Need To Know