Answer and Explanation:
(a) Vulnerabilities presented by the flaw are:
- Utilizing a typical stack may in some cases deceive the procedures.
- One procedure may utilize different procedure contentions and assets.
- The substance of the stack might be adulterated by whatever other procedure which may intrude on the different procedure execution.
(b) The flaw can be constrained by dividing the stack and allotting the stack to each procedure. The access confinements can be applied to the procedures with the goal that they can't get to different procedure stack substance.