PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
https://security.netapp.com/advisory/ntap-20200717-0003/
https://lists.tartarus.org/pipermail/putty-announce/
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html