Two vulnerabilities in the n8n workflow automation platform could allow attackers to fully compromise affected instances, access sensitive data, and execute arbitrary code on the underlying host.
Maybe there was a time when you wanted to lock away certain pages in a PDF, but you didn’t have the tools to get it done. Well, those days are over due to the release of an interesting software known ...