尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/zeroxjf/CVE-2025-43529-analysis | POC详情 |
| 2 | exploit for cve-2025-43529 | https://github.com/jir4vv1t/CVE-2025-43529 | POC详情 |
| 3 | Analysis of CVE-2025-43529 (WebKit UAF) + CVE-2025-14174 (ANGLE OOB) exploit chain - iOS Safari | https://github.com/zeroxjf/WebKit-UAF-ANGLE-OOB-Analysis | POC详情 |
| 4 | Analysis of CVE-2025-43529 (WebKit UAF) + CVE-2025-14174 (ANGLE OOB) exploit chain - iOS Safari | https://github.com/SgtBattenHA/Analysis | POC详情 |
| 5 | 🔍 Analyze WebKit and ANGLE vulnerabilities with this repository for CVE-2025-43529 and CVE-2025-14174, focusing on verified components and ongoing efforts. | https://github.com/sakyu7/sakyu7.github.io | POC详情 |
| 6 | CTT-Enhanced iOS Safari Exploit (based on CVE-2025-43529) | https://github.com/SimoesCTT/Convergent-Time-Theory-Enhanced-iOS-Safari-RCE-CVE-2025-43529- | POC详情 |
| 7 | webkit_refraction.js (The 33-Layer WebGL Payload) This JavaScript payload uses the \alpha constant to create a high-frequency "Memory Shiver." It induces the Use-After-Free (UAF) in CVE-2025-43529 by desynchronizing the WebKit garbage collector from the GPU's Metal command buffer. | https://github.com/SimoesCTT/CTT-Apple-Silicon-Refraction | POC详情 |
| 8 | Root Cause Analysis for CVE-2025-43529, a UAF vulnerability due to incorrect DFG StoreBarrierInsertionPhase in JavaScriptCore. | https://github.com/bjrjk/CVE-2025-43529 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论