vulnerability verification

  1. PowerPoint Use-After-Free Risks (2025): Verification Gaps, Mitigations, and Defender Playbook

    Microsoft’s advisory link for CVE-2025-54908 points to a PowerPoint use‑after‑free that “allows an unauthorized attacker to execute code locally,” but that specific CVE number could not be corroborated in public vulnerability trackers at the time of verification; when attempting to load the...