PoC-in-GitHub/2025/CVE-2025-24085.json
2025-12-12 21:45:38 +09:00

44 lines
No EOL
1.7 KiB
JSON

[
{
"id": 1043077297,
"name": "Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201",
"full_name": "JGoyd\/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201",
"owner": {
"login": "JGoyd",
"id": 212175154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/212175154?v=4",
"html_url": "https:\/\/github.com\/JGoyd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JGoyd\/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201",
"description": "Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), then WebKit(CVE-2025-24201) and Core Media(CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction.",
"fork": false,
"created_at": "2025-08-23T05:08:06Z",
"updated_at": "2025-12-12T11:30:22Z",
"pushed_at": "2025-11-27T13:02:14Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-24085",
"cve-2025-24201",
"imessage",
"ios",
"kernel-exploit",
"privilege-escalation",
"rce",
"sandbox-escape",
"zero-click",
"zeroday"
],
"visibility": "public",
"forks": 7,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}
]