This second vulnerability might be harder to exploit without the first one but its consequences could be as bad.