diff --git a/exploits/2024/CVE-2024-4367.json b/exploits/2024/CVE-2024-4367.json index 5a6fc17..5e56406 100644 --- a/exploits/2024/CVE-2024-4367.json +++ b/exploits/2024/CVE-2024-4367.json @@ -4,7 +4,7 @@ "full_name": "LOURC0D3/CVE-2024-4367-PoC", "html_url": "https://github.com/LOURC0D3/CVE-2024-4367-PoC", "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", - "stargazers_count": 157, + "stargazers_count": 159, "forks_count": 25, "created_at": "2024-05-20T10:02:23Z" }, diff --git a/exploits/2025/CVE-2025-2783.json b/exploits/2025/CVE-2025-2783.json index 58901b1..7645701 100644 --- a/exploits/2025/CVE-2025-2783.json +++ b/exploits/2025/CVE-2025-2783.json @@ -4,7 +4,7 @@ "full_name": "bronsoneaver/CVE-2025-2783", "html_url": "https://github.com/bronsoneaver/CVE-2025-2783", "description": null, - "stargazers_count": 1, + "stargazers_count": 11, "forks_count": 0, "created_at": "2025-03-28T20:33:42Z" }, @@ -13,7 +13,7 @@ "full_name": "Alchemist3dot14/CVE-2025-2783", "html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783", "description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.", - "stargazers_count": 0, + "stargazers_count": 1, "forks_count": 0, "created_at": "2025-04-06T03:49:01Z" }