My management team is going to start stroking out from all of these vulnerabilities.
The attacker needs to have access to the targeted system and they must be able to execute arbitrary code.
So if your systems are already locked down, you should be OK.