This is an automated email from the ASF dual-hosted git repository.

zregvart pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-website.git

commit 0e28eacfa8c5c70c58f1ad0b7aeeb8747980dafe
Author: Zoran Regvart <zo...@regvart.com>
AuthorDate: Fri Sep 23 12:55:07 2022 +0200

    fix: remove query parameters
    
    No need for these as we're targeting a static resource.
---
 content/security/CVE-2015-5344.md | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/content/security/CVE-2015-5344.md 
b/content/security/CVE-2015-5344.md
index cb509dd8..54826e90 100644
--- a/content/security/CVE-2015-5344.md
+++ b/content/security/CVE-2015-5344.md
@@ -16,5 +16,4 @@ fixed: 2.15.5, 2.16.1 and newer
 
 The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-9297 refers to 
the various commits that resovoled the issue, and have more details.
 
-A related xstream de-serialization vulnerability was recently reported for 
Apache ActiveMQ: 
http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt?version=1&modificationDate=1449589734000&api=v2
-
+A related xstream de-serialization vulnerability was recently reported for 
Apache ActiveMQ: 
http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt

Reply via email to