Protection bypass, memory corruptions, ceritficate spoofing, privilege escalation, crossite scripting.