CVE-2005-1408
Currently unrated
Summary
Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation.
References
Timeline
Vulnerability published
Vulnerability Reserved
Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation.
Vulnerability published
Vulnerability Reserved