Buffer overflows, memory corruptions, information leakage, privilege escalation, protection bypass, unauthorized access, interface spoofing.
vulners.com/securityvulns/securityvulns:doc:30375
vulners.com/securityvulns/securityvulns:doc:30385
vulners.com/securityvulns/securityvulns:doc:30393