Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6233-1 | pdns security update |
Debian DSA |
DSA-6234-1 | pdns-recursor security update |
Debian DSA |
DSA-6235-1 | dnsdist security update |
Mon, 27 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:* cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:* cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:* cpe:2.3:a:powerdns:recursor:5.4.0:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| Metrics |
ssvc
|
Wed, 22 Apr 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns authoritative Powerdns dnsdist Powerdns recursor |
|
| Vendors & Products |
Powerdns
Powerdns authoritative Powerdns dnsdist Powerdns recursor |
Wed, 22 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default. | |
| Title | Insufficient input validation of internal webserver | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-04-22T18:10:30.709Z
Reserved: 2026-03-18T10:06:16.572Z
Link: CVE-2026-33257
Updated: 2026-04-22T18:03:44.579Z
Status : Analyzed
Published: 2026-04-22T10:16:51.313
Modified: 2026-04-27T17:03:56.720
Link: CVE-2026-33257
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:30:12Z
Debian DSA