A remote attacker can exploit the authentication protocol to build a username bruteforcer that will reveal the list of registered users.
A remote attacker can exploit the authentication protocol to build a username bruteforcer that will reveal the list of registered users.