Unfortunately, this does not mean that those vulnerabilities cannot be exploited by attackers seeking fame, fortune, or revenge. They certainly can.
A series is born
Here be dragons
This series of posts will look into those problems in detail. It will also offer actionable guidance on how to find and avoid them.