HTML filtering bypass, crossite scripting, weak hashing function, memory corruption, buffer overflow, etc.
vulners.com/securityvulns/securityvulns:doc:16199
vulners.com/securityvulns/securityvulns:doc:16200
vulners.com/securityvulns/securityvulns:doc:16201
vulners.com/securityvulns/securityvulns:doc:16202
vulners.com/securityvulns/securityvulns:doc:16203
vulners.com/securityvulns/securityvulns:doc:16269
vulners.com/securityvulns/securityvulns:doc:16270