The host is installed with Microsoft PowerPoint 2007 or 2010 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict the path used for loading external libraries. Successful exploitation allows attackers to take complete control of an affected system.