The exploited code-execution flaws are the kind coveted by ransomware and nation-state hackers.