John_507 :
NONE of these are actually exploits. None can retrieve data. Still nothing to worry about. Not one exploit that has actually worked. So this is still a non issue.
You're basing this on what, exactly?
The exploits can retrieve data - that's the problem. What they can't do is modify it, but there a lot of harm that can be done (i.e. stealing encryption keys, etc.) that doesn't involve modifying data.