Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apple
Apple macos Microsoft Microsoft windows |
Wed, 13 May 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adobe
Adobe premiere Pro |
|
| Vendors & Products |
Adobe
Adobe premiere Pro |
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Premiere Pro versions 26.0.2, 25.6.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |
| Title | Premiere Pro | Use After Free (CWE-416) | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2026-05-13T10:01:10.182Z
Reserved: 2026-03-30T17:30:36.491Z
Link: CVE-2026-34638
Updated: 2026-05-13T09:58:01.133Z
Status : Analyzed
Published: 2026-05-12T18:17:10.190
Modified: 2026-05-13T14:28:31.203
Link: CVE-2026-34638
No data.
OpenCVE Enrichment
Updated: 2026-05-12T19:45:15Z