-
-
Notifications
You must be signed in to change notification settings - Fork 303
Expand file tree
/
Copy pathzdi_rss_mock.xml
More file actions
22 lines (22 loc) · 1.5 KB
/
zdi_rss_mock.xml
File metadata and controls
22 lines (22 loc) · 1.5 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
<channel>
<title>Zero Day Initiative - Published Advisories</title>
<link>http://www.zerodayinitiative.com</link>
<description>Published ZDI Advisories</description>
<item>
<title><![CDATA[ZDI-25-001: Example Vendor Product Remote Code Execution Vulnerability]]></title>
<guid isPermaLink="false">ZDI-CAN-12345</guid>
<link>http://www.zerodayinitiative.com/advisories/ZDI-25-001/</link>
<description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Example Vendor Product. User interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-12345.]]></description>
<pubDate>Mon, 06 Jan 2025 00:00:00 -0600</pubDate>
</item>
<item>
<title><![CDATA[ZDI-25-002: Another Vendor Product Information Disclosure Vulnerability]]></title>
<guid isPermaLink="false">ZDI-CAN-67890</guid>
<link>http://www.zerodayinitiative.com/advisories/ZDI-25-002/</link>
<description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Another Vendor Product. No user interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. No CVE has been assigned to this advisory at this time.]]></description>
<pubDate>Tue, 07 Jan 2025 00:00:00 -0600</pubDate>
</item>
</channel>
</rss>