• You have to look at which kind of threats these vulnerabilities are! If it is a local one, normally you would have more problems already as the attacker would need to execute code locally on the system.

    😎