an attacker to trigger a kernel heap overflow, potentially leading to local privilege
escalation and granting system-level access to the affected software.
No advisories yet.
Solution
Users and administrators of affected product versions are advised to update to the latest version immediately.
Workaround
No workaround given by the vendor.
Mon, 27 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Winfsp
Winfsp winfsp |
|
| Vendors & Products |
Winfsp
Winfsp winfsp |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-362 | |
| Metrics |
ssvc
|
Mon, 27 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-368 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 27 Apr 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of the race condition vulnerability could allow an attacker to trigger a kernel heap overflow, potentially leading to local privilege escalation and granting system-level access to the affected software. | |
| Title | Race Condition Vulnerability | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CSA
Published:
Updated: 2026-04-27T13:30:05.621Z
Reserved: 2026-02-23T05:15:38.972Z
Link: CVE-2026-3006
Updated: 2026-04-27T13:19:33.209Z
Status : Awaiting Analysis
Published: 2026-04-27T03:15:59.277
Modified: 2026-04-27T18:57:20.293
Link: CVE-2026-3006
OpenCVE Enrichment
Updated: 2026-04-27T20:20:15Z