Guys, please understand that these vulnerabilities are what is termed a two-step attack, where the attacker needs to first gain root access through another vulnerability before they can exploit the system.
These CVE’s are NOT” run this file and be compromised” exploits (also Comodo would alert to any prior Privilege elevation requests-thereby stopping Step 1).