Did you read it? There are multiple examples of claimed exploitation right below the section I linked.
Which bit says about stealing a certificate/keys and MITMing traffic with the stolen keys - with real world ramifications?
Which bit says about stealing a certificate/keys and MITMing traffic with the stolen keys - with real world ramifications?