299,759
Total vulnerabilities in the database
Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation.
| Software | From | Fixed in |
|---|---|---|
| apple / keynote | 2.0.1 | 2.0.1.x |
| apple / keynote | 2.0.0 | 2.0.0.x |