Multiple memory corruptions, privilege escalations, weak permissions, DoS, protection bypass, crossite scripting.