Unauthorized access, commands injection, information leakage, code execution.
vulners.com/securityvulns/securityvulns:doc:25806
vulners.com/securityvulns/securityvulns:doc:25807
vulners.com/securityvulns/securityvulns:doc:25808
vulners.com/securityvulns/securityvulns:doc:25809
vulners.com/securityvulns/securityvulns:doc:25810