зеркало из https://github.com/github/docs.git
2.4 KiB
2.4 KiB
title | intro | versions | topics | miniTocMaxHeadingLevel | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Feeds |
|
|
3 |
About the Feeds API
To see what feeds are available to you, use the Get feeds operation. You can then get a feed by sending a request to one of the feed URLs.
Example of getting an Atom feed
To get a feed in Atom format, you must specify the application/atom+xml
type in the Accept
header. For example, to get the Atom feed for GitHub security advisories:
curl -H "Accept: application/atom+xml" https://github.com/security-advisories
Response
HTTP/2 200
<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"
xmlns:media="http://search.yahoo.com/mrss/"
xml:lang="en-US">
<id>tag:github.com,2008:/security-advisories</id>
<link rel="self" type="application/atom+xml"
href="https://github.com/security-advisories.atom"/>
<title>GitHub Security Advisory Feed</title>
<author>
<name>GitHub</name>
</author>
<updated>2019-01-14T19:34:52Z</updated>
<entry>
<id>tag:github.com,2008:GHSA-abcd-12ab-23cd</id>
<published>2018-07-26T15:14:52Z</published>
<updated>2019-01-14T19:34:52Z</updated>
<title type="html">[GHSA-abcd-12ab-23cd] Moderate
severity vulnerability that affects Octoapp</title>
<category term="NPM"/>
<content type="html">
<p>Octoapp node module before 4.17.5 suffers
from a Modification of Assumed-Immutable Data (MAID)
vulnerability via defaultsDeep, merge, and mergeWith
functions, which allows a malicious user to modify
the prototype of "Object" via
<strong>proto</strong>, causing the
addition or modification of an existing property
that will exist on all objects.</p>
<p><strong>Affected Packages</strong></p>
<dl>
<dt>Octoapp</dt>
<dd>Ecosystem: npm</dd>
<dd>Severity: moderate</dd>
<dd>Versions: &lt; 4.17.5</dd>
<dd>Fixed in: 4.17.5</dd>
</dl>
<p><strong>References</strong></p>
<ul>
<li>https://nvd.nist.gov/vuln/detail/CVE-2018-123</li>
</ul>
</content>
</entry>
</feed>