2025-04-15 20:17:05
icscert
PUBLISHED
An unauthenticated attacker can check the existence of usernames in the system by querying an API.