Known Vulnerabilities in Remote Support