Weak cryptography, memory corruption, restrictions bypass.
vulners.com/securityvulns/securityvulns:doc:31794