Vendor
N-able
Products
1
CVEs
4
Across products
4
Status
Private
Products
1- 4 CVEs
Recent CVEs
4| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2025-9316 | Med | 0.54 | — | 0.71 | Nov 12, 2025 | N-central < 2025.4 can generate sessionIDs for unauthenticated users This issue affects N-central: before 2025.4. | ||
| CVE-2025-8876 | 0.13 | — | 0.09 | KEV | Aug 14, 2025 | Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1. | ||
| CVE-2025-8875 | 0.12 | — | 0.03 | KEV | Aug 14, 2025 | Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1. | ||
| CVE-2025-11366 | 0.00 | — | 0.00 | Nov 12, 2025 | N-central < 2025.4 is vulnerable to authentication bypass via path traversal |
- risk 0.54cvss —epss 0.71
N-central < 2025.4 can generate sessionIDs for unauthenticated users This issue affects N-central: before 2025.4.
- risk 0.13cvss —epss 0.09
Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.
- risk 0.12cvss —epss 0.03
Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.
- CVE-2025-11366Nov 12, 2025risk 0.00cvss —epss 0.00
N-central < 2025.4 is vulnerable to authentication bypass via path traversal