Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn’t be seen at the beginning of an exploit chain.
Go to Source
Author: Alexander Culafi
Go to Source
Author: Alexander Culafi