Information leakage, key recovery. This vulnerability is actively used in-the-wild.
vulners.com/securityvulns/securityvulns:doc:30469
vulners.com/securityvulns/securityvulns:doc:30471
vulners.com/securityvulns/securityvulns:doc:30472
vulners.com/securityvulns/securityvulns:doc:30473
vulners.com/securityvulns/securityvulns:doc:30474
vulners.com/securityvulns/securityvulns:doc:30475
vulners.com/securityvulns/securityvulns:doc:30476
vulners.com/securityvulns/securityvulns:doc:30477
vulners.com/securityvulns/securityvulns:doc:30478
vulners.com/securityvulns/securityvulns:doc:30479
vulners.com/securityvulns/securityvulns:doc:30480
vulners.com/securityvulns/securityvulns:doc:30481
vulners.com/securityvulns/securityvulns:doc:30494
vulners.com/securityvulns/securityvulns:doc:30495
vulners.com/securityvulns/securityvulns:doc:30496
vulners.com/securityvulns/securityvulns:doc:30497
vulners.com/securityvulns/securityvulns:doc:30498
vulners.com/securityvulns/securityvulns:doc:30499
vulners.com/securityvulns/securityvulns:doc:30500
vulners.com/securityvulns/securityvulns:doc:30501
vulners.com/securityvulns/securityvulns:doc:30502
vulners.com/securityvulns/securityvulns:doc:30503
vulners.com/securityvulns/securityvulns:doc:30504
vulners.com/securityvulns/securityvulns:doc:30505
vulners.com/securityvulns/securityvulns:doc:30506
vulners.com/securityvulns/securityvulns:doc:30507
vulners.com/securityvulns/securityvulns:doc:30508
vulners.com/securityvulns/securityvulns:doc:30509
vulners.com/securityvulns/securityvulns:doc:30510
vulners.com/securityvulns/securityvulns:doc:30511
vulners.com/securityvulns/securityvulns:doc:30512
vulners.com/securityvulns/securityvulns:doc:30519
vulners.com/securityvulns/securityvulns:doc:30520
vulners.com/securityvulns/securityvulns:doc:30522
vulners.com/securityvulns/securityvulns:doc:30523
vulners.com/securityvulns/securityvulns:doc:30524
vulners.com/securityvulns/securityvulns:doc:30525
vulners.com/securityvulns/securityvulns:doc:30526
vulners.com/securityvulns/securityvulns:doc:30530
vulners.com/securityvulns/securityvulns:doc:30537
vulners.com/securityvulns/securityvulns:doc:30553
vulners.com/securityvulns/securityvulns:doc:30696
vulners.com/securityvulns/securityvulns:doc:30771
vulners.com/securityvulns/securityvulns:doc:30776