Two vulnerabilities in Zoom could lead to code execution Two vulnerabilities in Zoom could lead to code execution