This is an automated email from the ASF dual-hosted git repository. zregvart pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-website.git
commit 0e28eacfa8c5c70c58f1ad0b7aeeb8747980dafe Author: Zoran Regvart <zo...@regvart.com> AuthorDate: Fri Sep 23 12:55:07 2022 +0200 fix: remove query parameters No need for these as we're targeting a static resource. --- content/security/CVE-2015-5344.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/content/security/CVE-2015-5344.md b/content/security/CVE-2015-5344.md index cb509dd8..54826e90 100644 --- a/content/security/CVE-2015-5344.md +++ b/content/security/CVE-2015-5344.md @@ -16,5 +16,4 @@ fixed: 2.15.5, 2.16.1 and newer The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-9297 refers to the various commits that resovoled the issue, and have more details. -A related xstream de-serialization vulnerability was recently reported for Apache ActiveMQ: http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt?version=1&modificationDate=1449589734000&api=v2 - +A related xstream de-serialization vulnerability was recently reported for Apache ActiveMQ: http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt