

List of Permission-Incompliant PDF Applications Secure: Attack is clearly detectable on the UI Limited Vulnerability: Attack is undetectable on the UIĢ Every kind of annotation, whether it is allowed or not, leads to an Vulnerable: Attack is undetectable on the UIġ LibreOffice does not provide a UI-Layer 3Īnd attacks can, henceforce, not be detected. ∑ Applications that are limited vulnerability, max 26

∑ Applications that are vulnerable, max 26 Security Evaluation: Certification Attacks (2021)Īll exploits are compliant to the PDF SpecificiationĪttacks improving the stealthiness of EAA and SSA
