Date: Fri, 14 May 2021 11:50:08 +0100 From: Matthew Wild <mwild1@...il.com> To: oss-security@...ts.openwall.com Subject: Re: Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities) On Fri, 14 May 2021 at 11:08, Robert G. <robert.groesser@...glemail.com> wrote: > > Hey guys, > > thank you for fixing this! > > >This flaw was discovered by Matthew Wild, a member of the Prosody team. > The issue with MUC passwords was also previously identified by Robert > GrÃ¶sser. > > This wasn't identified by me, to be fair. I only reported this. > The flaw was initially found by my colleague Marvin Zerulla. Thanks for the clarification Robert! I've updated the advisory with this info. Your quote also highlighted that the text advisory is being served without an explicit character encoding. Thanks for finding that issue, now fixed :) Regards, Matthew
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.