Two vulnerabilities in the operating systems

Two vulnerabilities in the operating systems