The two vulnerabilities have been exploited in real-life attacks. Read more at straitstimes.com. Read more at ...