Several vulnerabilities can be chained together for a full exploit.
Source: Threadpost