Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/zeroxjf/CVE-2025-43529-analysis | POC Details |
| 2 | exploit for cve-2025-43529 | https://github.com/jir4vv1t/CVE-2025-43529 | POC Details |
| 3 | Analysis of CVE-2025-43529 (WebKit UAF) + CVE-2025-14174 (ANGLE OOB) exploit chain - iOS Safari | https://github.com/zeroxjf/WebKit-UAF-ANGLE-OOB-Analysis | POC Details |
| 4 | Analysis of CVE-2025-43529 (WebKit UAF) + CVE-2025-14174 (ANGLE OOB) exploit chain - iOS Safari | https://github.com/SgtBattenHA/Analysis | POC Details |
| 5 | 🔍 Analyze WebKit and ANGLE vulnerabilities with this repository for CVE-2025-43529 and CVE-2025-14174, focusing on verified components and ongoing efforts. | https://github.com/sakyu7/sakyu7.github.io | POC Details |
| 6 | CTT-Enhanced iOS Safari Exploit (based on CVE-2025-43529) | https://github.com/SimoesCTT/Convergent-Time-Theory-Enhanced-iOS-Safari-RCE-CVE-2025-43529- | POC Details |
| 7 | webkit_refraction.js (The 33-Layer WebGL Payload) This JavaScript payload uses the \alpha constant to create a high-frequency "Memory Shiver." It induces the Use-After-Free (UAF) in CVE-2025-43529 by desynchronizing the WebKit garbage collector from the GPU's Metal command buffer. | https://github.com/SimoesCTT/CTT-Apple-Silicon-Refraction | POC Details |
| 8 | Root Cause Analysis for CVE-2025-43529, a UAF vulnerability due to incorrect DFG StoreBarrierInsertionPhase in JavaScriptCore. | https://github.com/bjrjk/CVE-2025-43529 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet