Yeah those kind of exploits exist but show me how they're relevant to the conversation that we're having
I.e that the tools I'm suggesting are vulnerable to them.
It is true that theoretically a vulnerability *could* exist
There just isn't anything you can point to that shows that there is one.