Skip to main content
Mallory

Local Code Execution Flaws Disclosed in PDF Explorer and RGui

endpoint-software-vulnerabilityproof-of-concept-release
Updated April 12, 2026 at 02:03 PM2 sources
Share:
Local Code Execution Flaws Disclosed in PDF Explorer and RGui

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Two newly cataloged CVEs detail local code execution vulnerabilities in Windows desktop applications PDF Explorer 1.5.66.2 and RGui 3.5.0. CVE-2018-25217 affects PDF Explorer through a structured exception handler (SEH) overflow in the application's Custom fields settings dialog, where malicious data placed in the Label field can overwrite SEH records and enable arbitrary code execution. The issue is mapped to CWE-787 and was published with CVSS v4.0 and v3.1 scoring, alongside references to Exploit-DB, RTT Software, a trial installer, and a VulnCheck advisory.

CVE-2018-25258 affects RGui 3.5.0 through a stack-based buffer overflow in the GUI preferences dialog, specifically the Language for menus and messages field. The disclosure says an attacker can use SEH-based exploitation to bypass DEP, run a ROP chain that calls VirtualAlloc, and achieve arbitrary code execution on the local system. The entry was published with CVSS v4.0 and v3.1 vectors and references to the affected R 3.5.0 Windows binary, Exploit-DB, the R Project website, and a VulnCheck advisory.

Timeline

  1. Apr 12, 2026

    CVE-2018-25258 disclosed for RGui 3.5.0 buffer overflow

    A CVE entry for RGui 3.5.0 documented a local buffer overflow in the GUI preferences dialog, triggered through the "Language for menus and messages" field. The disclosure said attackers could bypass DEP with SEH exploitation, use a ROP chain invoking VirtualAlloc, and achieve arbitrary code execution.

  2. Mar 26, 2026

    CVE-2018-25217 disclosed for PDF Explorer SEH overflow

    A CVE entry for PDF Explorer 1.5.66.2 documented a local code execution vulnerability caused by a structured exception handler overflow in the Custom fields settings dialog's Label field. The disclosure described arbitrary code execution via SEH overwrite, buffer overflow techniques, and ROP gadget chains.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

File Write Flaws in Docudepot PDF Reader and Stackfield Desktop App

File Write Flaws in Docudepot PDF Reader and Stackfield Desktop App

Two newly disclosed vulnerabilities expose users of **Docudepot PDF Reader** and the **Stackfield Desktop App** to arbitrary file write attacks that could lead to severe system compromise. **CVE-2026-30292** affects Docudepot PDF Reader: PDF Viewer APP version `1.0.34`, where a weakness in the file import process allows arbitrary file overwrite of critical internal files. The issue is classified as **CWE-73** and carries a `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` score, with reported impact including possible arbitrary code execution and information exposure. **CVE-2026-28373** affects the Stackfield Desktop App before version `1.10.2` on **macOS** and **Windows**. The flaw stems from path traversal in decryption functionality that mishandles the `filePath` property, allowing a malicious export to write arbitrary content to any location on a victim’s filesystem. The vulnerability is tracked as **CWE-22** and was assigned `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`, reflecting high risk to confidentiality, integrity, and availability when a crafted file is opened.

4 weeks ago
Microsoft February 2026 vulnerability disclosures across Windows, Azure, and developer tools

Microsoft February 2026 vulnerability disclosures across Windows, Azure, and developer tools

Microsoft published multiple security advisories for **Windows**, **Azure**, and **developer tooling**, including several high-impact issues spanning **remote code execution (RCE)**, **elevation of privilege (EoP)**, **spoofing**, **information disclosure**, **denial of service**, and **security feature bypass**. Notable items include **Azure SDK for Python RCE** `CVE-2026-21531` (CVSS 9.8; **deserialization of untrusted data**), **Windows Shell security feature bypass** `CVE-2026-21510` (CVSS 8.8; exploitability listed as **E:F**), **GitHub Copilot/Visual Studio/VS Code** issues enabling **RCE/EoP/feature bypass** (`CVE-2026-21256`, `CVE-2026-21523`, `CVE-2026-21257`, `CVE-2026-21518`), and **Azure Local RCE** `CVE-2026-21228` (CVSS 8.1; **improper certificate validation**). Additional Windows platform flaws include **Desktop Window Manager EoP** `CVE-2026-21519` (type confusion), **HTTP.sys EoP** `CVE-2026-21232` (untrusted pointer dereference), **WinSock Ancillary Function Driver EoP** `CVE-2026-21238` (improper access control), **Windows Storage EoP** `CVE-2026-21508`, **WSL EoP** `CVE-2026-21237`, **Microsoft Word security feature bypass** `CVE-2026-21514`, **Outlook spoofing** `CVE-2026-21511`, **Windows LDAP DoS** `CVE-2026-21243`, plus **ACI Confidential Containers information disclosure** `CVE-2026-23655` and **Azure IoT Explorer information disclosure** `CVE-2026-21528`. Separately, a detailed third-party writeup described a **Windows Error Reporting Service** local privilege escalation, `CVE-2026-20817`, patched in January 2026, where the **WER service** (`wersvc.dll`) running as `NT AUTHORITY\SYSTEM` allegedly fails to validate requester permissions over **ALPC**, enabling a standard user to trigger process creation with a SYSTEM-derived token (retaining powerful rights such as *SeDebugPrivilege*, *SeImpersonatePrivilege*, and *SeBackupPrivilege*). Another third-party report highlighted a long-standing **libpng** heap buffer issue, `CVE-2026-25646` (CVSS 8.3), in `png_set_quantize()` that can be triggered by a crafted PNG (palette present, histogram absent) leading to an infinite loop/out-of-bounds read with potential for DoS and, with heap grooming, possible code execution; an additional MSRC entry referenced **libjpeg-turbo** `CVE-2023-2804` (heap-based overflow) as an Important RCE-class issue. Collectively, the disclosures reinforce the need to prioritize patching for internet-reachable components and developer tooling, and to treat local EoP bugs as high-risk in post-compromise and lateral movement scenarios.

2 months ago
Multiple Adobe Acrobat and Reader Flaws Enable Code Execution and Information Disclosure

Multiple Adobe Acrobat and Reader Flaws Enable Code Execution and Information Disclosure

German authorities issued security advisories for **Adobe Acrobat DC**, **Acrobat Reader DC**, and **Adobe Acrobat Reader** covering multiple vulnerabilities that could allow **information disclosure** and **arbitrary code execution**. One advisory specifically warned that a flaw in Adobe Acrobat Reader could expose sensitive information and be leveraged for code execution, raising the risk of compromise when users open maliciously crafted PDF files. A follow-up advisory expanded the scope to **multiple vulnerabilities** across Adobe’s Acrobat product line, indicating broader exposure for enterprise and end-user systems that rely on Adobe PDF software. Organizations using affected Adobe applications should prioritize vendor patches and review endpoint protections, as successful exploitation could give attackers access to data or the ability to run code on targeted systems.

2 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.