The flaws allow remote code-execution without user interaction or authentication, and are highly exploitable.
Source: Threadpost