Information leakage, unsigned code execution, code execution, restrictions bypass, memory corruption.
vulners.com/securityvulns/securityvulns:doc:31397
vulners.com/securityvulns/securityvulns:doc:31503