Hardcoded user accounts, command execution, unauthorized access, password storing in reversible encryption, weak permissions, session hijacking, information leaks.
vulners.com/securityvulns/securityvulns:doc:25149
vulners.com/securityvulns/securityvulns:doc:25150