Privilege escalations, crossite scripting, DoS, race conditions, SSL spoofing if HTTP proxy is used, multiple memory corruptions.
vulners.com/securityvulns/securityvulns:doc:22008
vulners.com/securityvulns/securityvulns:doc:22009
vulners.com/securityvulns/securityvulns:doc:22010
vulners.com/securityvulns/securityvulns:doc:22011
vulners.com/securityvulns/securityvulns:doc:22012
vulners.com/securityvulns/securityvulns:doc:22013
vulners.com/securityvulns/securityvulns:doc:22014
vulners.com/securityvulns/securityvulns:doc:22015
vulners.com/securityvulns/securityvulns:doc:22016
vulners.com/securityvulns/securityvulns:doc:22017