Three of them have already been exploited in the wild, and three others have publicly available proofs of concept, which ...