At its core both vulnerabilities are essentially local privilege escalation bugs (i.e. a random process can read e.g. secret keys from another process), but that still is a very important exploit - if I can run unprivileged C code on e.g. AWS and are able to read the memory of
someone else running on the same shared machine, that's really bad.
The Javascript case is the main one that makes it remotely exploitable.