An unauthenticated remote attacker can enumerate valid...
High severity
Unreviewed
Published
Jun 26, 2025
to the GitHub Advisory Database
•
Updated Jun 26, 2025
Description
Published by the National Vulnerability Database
Jun 24, 2025
Published to the GitHub Advisory Database
Jun 26, 2025
Last updated
Jun 26, 2025
An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint.
References