Uncovering Critical Vulnerabilities in PuTTY SSH Client: What You Need to Know