Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6233-1 | pdns security update |
Fri, 24 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns authoritative |
|
| Vendors & Products |
Powerdns
Powerdns authoritative |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
ssvc
|
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it. | |
| Title | Incomplete domain name sanitization during | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-04-22T14:28:15.172Z
Reserved: 2026-03-23T12:58:38.267Z
Link: CVE-2026-33608
Updated: 2026-04-22T14:27:55.851Z
Status : Analyzed
Published: 2026-04-22T14:16:54.650
Modified: 2026-04-24T18:52:44.260
Link: CVE-2026-33608
No data.
OpenCVE Enrichment
Updated: 2026-04-27T18:45:11Z
Debian DSA