>The loophole was mostly closed back in July of last year, when Valve recompiled Steam using modern exploit protections. It could still have theoretically caused some damage (it would cause a crash if activated, rather than allowing full remote code execution) but the threat was greatly reduced.
Security hole has not been massive for 11 months.
>Context Information Security contacted Valve the moment they’d found this exploit, and within 8 hours a beta-branch patch had been published, making them one of the fastest-to-react companies that Context have ever had to deal with.
Clickbait threads like this are why wordfilters are necessary.