Product
An authenticated, remote attacker can exploit multiple vulnerabilities in cPanel/WHM to gain root privileges, execute arbitrary code, disclose sensitive information, or cause a denial-of-service condition.