📦 N Central
by N Able
🔍 What is N Central?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
N-central versions before 2025.4 contain a path traversal vulnerability that allows attackers to bypass authentication mechanisms. This affects all organizations using vulnerable N-central versions fo...
CVE-2025-11367 allows remote attackers to execute arbitrary code on systems running vulnerable versions of N-central Software Probe via insecure deserialization. This affects organizations using N-cen...
CVE-2024-28200 is an authentication bypass vulnerability in N-central server that allows attackers to access the user interface without valid credentials. This affects all N-central deployments prior ...
This vulnerability in N-able N-central allows attackers to escalate privileges through API calls, potentially gaining administrative access. It affects all N-central installations before version 2023....
N-central versions before 2025.4 are vulnerable to XML External Entity (XXE) injection attacks, allowing attackers to read arbitrary files from the server. This affects organizations using N-central f...
This vulnerability allows any authenticated user in N-central to read, write, and modify syslog configurations across all customer accounts on the server. It affects all N-central deployments prior to...
CVE-2025-8876 is an OS command injection vulnerability in N-able N-central management software caused by improper input validation. Attackers can execute arbitrary operating system commands on affecte...