OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
http://www.vupen.com/english/advisories/2010/3078
http://www.securityfocus.com/bid/44111
http://www.infradead.org/openconnect.html
http://secunia.com/advisories/42381
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html