Closed stevepolitodesign closed 2 years ago
A bad actor could exploit this vulnerability to see if a user exists in the system.
A bad actor could exploit this vulnerability to see if a user exists in the system.
Issues