The publicly available exploits provide a near-universal way to bypass key protections.