Cryptographic weakness allows interception of users credential via connection proxying.
vulners.com/securityvulns/securityvulns:doc:5845