Two vulnerabilities can be exploited to fully compromise instances of the Google Looker business intelligence platform.
A popular WordPress quiz plugin can be abused to mount SQL injection attacks ...
Critical n8n v CVE-2026-25049 allows authenticated workflow abuse to execute system commands and expose server data.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results