Loading...
Loading...
Itaka before 0.2.1, when using Authentication mode, allows remote attackers to bypass authentication and obtain sensitive information by downloading screenshots via a direct request for /screenshot.
July 25, 2007
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2007-3964
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.