Update recent feed data
This commit is contained in:
parent
2c59329c06
commit
542ff1c588
2 changed files with 3 additions and 3 deletions
|
@ -4,7 +4,7 @@
|
|||
"full_name": "LOURC0D3/CVE-2024-4367-PoC",
|
||||
"html_url": "https://github.com/LOURC0D3/CVE-2024-4367-PoC",
|
||||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"stargazers_count": 157,
|
||||
"stargazers_count": 159,
|
||||
"forks_count": 25,
|
||||
"created_at": "2024-05-20T10:02:23Z"
|
||||
},
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "bronsoneaver/CVE-2025-2783",
|
||||
"html_url": "https://github.com/bronsoneaver/CVE-2025-2783",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T20:33:42Z"
|
||||
},
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "Alchemist3dot14/CVE-2025-2783",
|
||||
"html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783",
|
||||
"description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.",
|
||||
"stargazers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-06T03:49:01Z"
|
||||
}
|
||||
|
|
Loading…
Add table
Reference in a new issue