Summary from http://www.milw0rm.com/exploits/8880 seems pretty serious but quite difficult to fix all of them in 2 weeks.
Timeline :
05/21/2009 - sent initial email to vendor with a link to a private
resource for viewing various kloxo hiab575
vulnerability info
05/23/2009 - received the following: "Thanks for the info. I will
review this and let you know." (no signature)
05/30/2009 - sent an email asking if there were any updates
06/01/2009 - received the following: "Sorry for the delay. I am
currently looking into this, and will reply in a couple
of hours time." (no signature)
06/04/2009 - nothing heard from vendor, and the private resource
containing the vulnerability info still does not
appear to have been accessed
2 weeks have passed since the initial notification. Vendor appears
uninterested.
ISSUE 1 - uid/gid reuse
ISSUE 2 - unprivileged port use
ISSUE 3 - default passwords
ISSUE 4 - useradd string in the process list
ISSUE 5 - XSS
ISSUE 6 - remotely create partially user controlled file names
and directories. Locally append uncontrolled data to
any file
ISSUE 7 - local users can take control of any file or directory
ISSUE 8 - local users can take control of any file or directory
ISSUE 9 - local users can overwrite any file on the box
ISSUE 10 - yet another symlink attack for local users
ISSUE 11 - metachar injection, local command execution as root
ISSUE 12 - web stats world readable password hashes
ISSUE 13 - local users can overwrite any file on the box
ISSUE 14 - metachar injection, local command execution as root
ISSUE 15 - remotely block any - or every - IP addr in hosts.deny
ISSUE 16 - remote CPU and mem usage DoS
ISSUE 17 - local users can truncate and control any file
ISSUE 18 - just 2 more symlinks to own any file on the box
ISSUE 19 - file manager, view and edit any file
ISSUE 20 - file manager PT II
ISSUE 21 - file manager PT III
ISSUE 22 - local user symlink attack
ISSUE 23 - local user symlink attack (last one)
ISSUE 24 - sql injection in the "Forgot Password" form