Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn’t be seen at the beginning of an exploit chain.
The original article found on darkreading Read More