This exploit involves a fuzzed XLS file designed to trigger vulnerabilities in iPhone Document Reader Applications. The PoC leverages a mutated sample to test for potential crashes or exploitable conditions.
Classification
Working Poc 80%
Attack Type
Dos
Complexity
Moderate
Reliability
Theoretical
Target:Document Reader Applications for iPhone (unspecified versions)
No auth needed
Prerequisites:Access to the target iPhone application · Ability to deliver the malicious XLS file