296,223
Total vulnerabilities in the database
Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation.
Software | From | Fixed in |
---|---|---|
apple / keynote | 2.0.1 | 2.0.1.x |
apple / keynote | 2.0.0 | 2.0.0.x |