Memory corruption, javascript code spoofing, code execution. May be used for hidden malware installation.