Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows Server 2025 (server Core Installation)
|
|
| Vendors & Products |
Microsoft windows Server 2025 (server Core Installation)
|
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network. | |
| Title | Windows Kernel-Mode Driver Remote Code Execution Vulnerability | |
| First Time appeared |
Microsoft
Microsoft windows Server 2025 |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft windows Server 2025 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-15T17:13:07.096Z
Reserved: 2026-03-26T21:02:16.445Z
Link: CVE-2026-34332
Updated: 2026-05-13T09:59:30.184Z
Status : Analyzed
Published: 2026-05-12T18:17:07.127
Modified: 2026-05-14T15:25:29.693
Link: CVE-2026-34332
No data.
OpenCVE Enrichment
Updated: 2026-05-12T20:15:24Z