Select Page

A remote attacker can exploit the authentication protocol to build a username bruteforcer that will reveal the list of registered users.

PDF