One of the vulnerabilities can be exploited to escalate privilege to gain root privileges, according to Qualys.