Known Vulnerabilities in APM Clients 7.2.4.4