The exposes applications to a security flaw that can weaken cryptographic protections. Exploiting this vulnerability may allow attackers to intercept sensitive data, undermining the integrity of secure communications across affected systems.
https://hackerone.com/reports/2270225