* add 3.1 to deprecated versions * rewrite img src to use azure blob storage in archive script Co-authored-by: rachmari <rachmari@users.noreply.github.com> * remove static files for ghes 3.1 * remove liquid conditionals and content for ghes 3.1 * remove outdated hardware reqs reusable * Fix liquid conditional uncaught by script * Close liquid conditionals missed by script * Apply @mattpollard's suggestions Co-authored-by: Matt Pollard <mattpollard@users.noreply.github.com> Co-authored-by: rachmari <rachmari@users.noreply.github.com> Co-authored-by: Matt Pollard <mattpollard@users.noreply.github.com>
79 lines
2.4 KiB
Markdown
79 lines
2.4 KiB
Markdown
---
|
|
title: Feeds
|
|
intro: ''
|
|
versions:
|
|
fpt: '*'
|
|
ghes: '*'
|
|
ghae: '*'
|
|
ghec: '*'
|
|
topics:
|
|
- API
|
|
miniTocMaxHeadingLevel: 3
|
|
---
|
|
|
|
## About the Feeds API
|
|
|
|
To see what feeds are available to you, use the [Get feeds](#get-feeds) operation. You can then get a feed by sending a request to one of the feed URLs.
|
|
|
|
### Example of getting an Atom feed
|
|
|
|
To get a feed in Atom format, you must specify the `application/atom+xml` type in the `Accept` header. For example, to get the Atom feed for GitHub security advisories:
|
|
|
|
curl -H "Accept: application/atom+xml" https://github.com/security-advisories
|
|
|
|
#### Response
|
|
|
|
```shell
|
|
HTTP/2 200
|
|
```
|
|
|
|
```xml
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
|
<feed xmlns="http://www.w3.org/2005/Atom"
|
|
xmlns:media="http://search.yahoo.com/mrss/"
|
|
xml:lang="en-US">
|
|
<id>tag:github.com,2008:/security-advisories</id>
|
|
<link rel="self" type="application/atom+xml"
|
|
href="https://github.com/security-advisories.atom"/>
|
|
<title>GitHub Security Advisory Feed</title>
|
|
<author>
|
|
<name>GitHub</name>
|
|
</author>
|
|
<updated>2019-01-14T19:34:52Z</updated>
|
|
<entry>
|
|
<id>tag:github.com,2008:GHSA-abcd-12ab-23cd</id>
|
|
<published>2018-07-26T15:14:52Z</published>
|
|
<updated>2019-01-14T19:34:52Z</updated>
|
|
<title type="html">[GHSA-abcd-12ab-23cd] Moderate
|
|
severity vulnerability that affects Octoapp</title>
|
|
<category term="NPM"/>
|
|
<content type="html">
|
|
<p>Octoapp node module before 4.17.5 suffers
|
|
from a Modification of Assumed-Immutable Data (MAID)
|
|
vulnerability via defaultsDeep, merge, and mergeWith
|
|
functions, which allows a malicious user to modify
|
|
the prototype of "Object" via
|
|
<strong>proto</strong>, causing the
|
|
addition or modification of an existing property
|
|
that will exist on all objects.</p>
|
|
<p><strong>Affected Packages</strong></p>
|
|
|
|
<dl>
|
|
<dt>Octoapp</dt>
|
|
<dd>Ecosystem: npm</dd>
|
|
<dd>Severity: moderate</dd>
|
|
<dd>Versions: &lt; 4.17.5</dd>
|
|
<dd>Fixed in: 4.17.5</dd>
|
|
</dl>
|
|
|
|
<p><strong>References</strong></p>
|
|
|
|
<ul>
|
|
<li>https://nvd.nist.gov/vuln/detail/CVE-2018-123</li>
|
|
</ul>
|
|
|
|
</content>
|
|
</entry>
|
|
</feed>
|
|
```
|