Memory corruptions, integer overdlows, privilege escalations, code executions, information leakage.
vulners.com/securityvulns/securityvulns:doc:29836