2025-06-24 08:14:31
CERTVDE
PUBLISHED
An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint.