Analysis of 0-click iMessage exploit named FORCEDENTRY Exploit | Android Security & Malware
Analysis of 0-click iMessage exploit named FORCEDENTRY Exploitation: By sending a .gif iMessage attachment (which was really a PDF) NSO were able to remotely trigger a heap buffer overflow in the ImageIO JBIG2 decoder https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html