Crossite scripting, memory corruptions, buffer overflows, array overflows, integer overflows. Can be exploited to silently install malware code.
vulners.com/securityvulns/securityvulns:doc:12224
vulners.com/securityvulns/securityvulns:doc:12228
vulners.com/securityvulns/securityvulns:doc:12269
vulners.com/securityvulns/securityvulns:doc:12272