From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Dec 30 19:10:13 2010 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 33F8B1065673 for ; Thu, 30 Dec 2010 19:10:13 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 092438FC1A for ; Thu, 30 Dec 2010 19:10:13 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.4/8.14.4) with ESMTP id oBUJACOv074588 for ; Thu, 30 Dec 2010 19:10:12 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.4/8.14.4/Submit) id oBUJACtR074585; Thu, 30 Dec 2010 19:10:12 GMT (envelope-from gnats) Date: Thu, 30 Dec 2010 19:10:12 GMT Message-Id: <201012301910.oBUJACtR074585@freefall.freebsd.org> To: freebsd-ports-bugs@FreeBSD.org From: Mark Foster Cc: Subject: Re: ports/153526: vuxml entry for wordpress CVE-2010-4257 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Mark Foster List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Dec 2010 19:10:13 -0000 The following reply was made to PR ports/153526; it has been noted by GNATS. From: Mark Foster To: bug-followup@FreeBSD.org Cc: Subject: Re: ports/153526: vuxml entry for wordpress CVE-2010-4257 Date: Thu, 30 Dec 2010 11:09:23 -0800 I suggest the vuxml should say: wordpress - SQL injection vulnerability as that is more descriptive.