diff --git a/exploits/2024/CVE-2024-4367.json b/exploits/2024/CVE-2024-4367.json index 39ab391..a064fd3 100644 --- a/exploits/2024/CVE-2024-4367.json +++ b/exploits/2024/CVE-2024-4367.json @@ -4,7 +4,7 @@ "full_name": "LOURC0D3/CVE-2024-4367-PoC", "html_url": "https://github.com/LOURC0D3/CVE-2024-4367-PoC", "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", - "stargazers_count": 161, + "stargazers_count": 162, "forks_count": 25, "created_at": "2024-05-20T10:02:23Z" }, diff --git a/exploits/2025/CVE-2025-2783.json b/exploits/2025/CVE-2025-2783.json index e6861d1..23118a6 100644 --- a/exploits/2025/CVE-2025-2783.json +++ b/exploits/2025/CVE-2025-2783.json @@ -4,8 +4,8 @@ "full_name": "Alchemist3dot14/CVE-2025-2783", "html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783", "description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.", - "stargazers_count": 2, - "forks_count": 0, + "stargazers_count": 5, + "forks_count": 1, "created_at": "2025-04-06T03:49:01Z" } ] \ No newline at end of file