Under special conditions it's possible access private application data, including keys.
vulners.com/securityvulns/securityvulns:doc:5810