diff --git a/exploits/2022/CVE-2022-44268.json b/exploits/2022/CVE-2022-44268.json index d5aa9d0..5d043ee 100644 --- a/exploits/2022/CVE-2022-44268.json +++ b/exploits/2022/CVE-2022-44268.json @@ -179,15 +179,6 @@ "forks_count": 0, "created_at": "2025-05-02T21:31:39Z" }, - { - "name": "IMAGE-MAGICK-CVE-2022-44268", - "full_name": "Vagebondcur/IMAGE-MAGICK-CVE-2022-44268", - "html_url": "https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2023-10-13T15:43:49Z" - }, { "name": "heroku-CVE-2022-44268-reproduction", "full_name": "nfm/heroku-CVE-2022-44268-reproduction", @@ -197,6 +188,15 @@ "forks_count": 0, "created_at": "2023-02-21T01:15:07Z" }, + { + "name": "IMAGE-MAGICK-CVE-2022-44268", + "full_name": "Vagebondcur/IMAGE-MAGICK-CVE-2022-44268", + "html_url": "https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-10-13T15:43:49Z" + }, { "name": "CVE-2022-44268-automated-poc", "full_name": "Ashifcoder/CVE-2022-44268-automated-poc", diff --git a/exploits/2025/CVE-2025-2783.json b/exploits/2025/CVE-2025-2783.json index 851f6b4..37360e2 100644 --- a/exploits/2025/CVE-2025-2783.json +++ b/exploits/2025/CVE-2025-2783.json @@ -4,7 +4,7 @@ "full_name": "Alchemist3dot14/CVE-2025-2783", "html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783", "description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.", - "stargazers_count": 6, + "stargazers_count": 10, "forks_count": 1, "created_at": "2025-04-06T03:49:01Z" }