Crossite scripting, crossite information access, FTP commands injection. Vulnerabilities can be used for hidden malware installation.
vulners.com/securityvulns/securityvulns:doc:13791
vulners.com/securityvulns/securityvulns:doc:13801
vulners.com/securityvulns/securityvulns:doc:13802
vulners.com/securityvulns/securityvulns:doc:13803
vulners.com/securityvulns/securityvulns:doc:13804
vulners.com/securityvulns/securityvulns:doc:13999
vulners.com/securityvulns/securityvulns:doc:14016
vulners.com/securityvulns/securityvulns:doc:14039
vulners.com/securityvulns/securityvulns:doc:14048
vulners.com/securityvulns/securityvulns:doc:14241