Multiple memory corruptions, code execution, information leakages, crossite scripting, protection bypass.