Forum OpenACS Q&A: Response to Stealing Email Addresses -3x

Posted by David Walker on
It can be used to harvest the user database. Sign up for a free account and then tell your program to hit
It does not give the user any information they don't have permission to receive but it will allow retrieving the entire user database including deleted users.