In order to gain access to any information in privileged memory using one of these exploits, a user-level application must be launched on the specific machine to be compromised. This means that presently, an OS/2 executable must be used as the attack vector. As of this writing, we are not aware of any such code which executes on the OS/2 platform.
どうしても攻撃コードはプラットフォーム依存になるからマイナー OS/2 は狙われにくいというお話。さあみんな OS/2 を使おうよ。
# というコメントを Windows 10 の Firefox で書いていますｗ