Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
R-project
R-project rgui |
|
| Vendors & Products |
R-project
R-project rgui |
Sun, 12 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation. Attackers can craft malicious input in the Language for menus and messages field to trigger a stack-based buffer overflow, execute a ROP chain for VirtualAlloc allocation, and achieve arbitrary code execution. | |
| Title | RGui 3.5.0 Local Buffer Overflow SEH DEP Bypass | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-13T18:06:18.442Z
Reserved: 2026-04-12T12:13:36.489Z
Link: CVE-2018-25258
Updated: 2026-04-13T17:58:12.327Z
Status : Deferred
Published: 2026-04-12T13:16:31.740
Modified: 2026-04-15T15:00:32.790
Link: CVE-2018-25258
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:56:02Z