A remote code execution vulnerability exists in the way that Microsoft Office Powerpoint handles specially crafted Powerpoint files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
CVE Link
Exploit Platform
Exploit Type
Product Name