Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6uz8-kz5m-8ya9
SummaryAn attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
Aliases
0
alias CVE-2026-33608
Fixed_packages
0
url pkg:apk/alpine/pdns@5.0.4-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=aarch64&distroversion=edge&reponame=community
1
url pkg:apk/alpine/pdns@5.0.4-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=armhf&distroversion=edge&reponame=community
2
url pkg:apk/alpine/pdns@5.0.4-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=armv7&distroversion=edge&reponame=community
3
url pkg:apk/alpine/pdns@5.0.4-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=loongarch64&distroversion=edge&reponame=community
4
url pkg:apk/alpine/pdns@5.0.4-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=ppc64le&distroversion=edge&reponame=community
5
url pkg:apk/alpine/pdns@5.0.4-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=riscv64&distroversion=edge&reponame=community
6
url pkg:apk/alpine/pdns@5.0.4-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=s390x&distroversion=edge&reponame=community
7
url pkg:apk/alpine/pdns@5.0.4-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=x86_64&distroversion=edge&reponame=community
8
url pkg:apk/alpine/pdns@5.0.4-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/pdns@5.0.4-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/pdns@5.0.4-r0%3Farch=x86&distroversion=edge&reponame=community
Affected_packages
References
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33608
1
reference_url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
reference_id powerdns-advisory-powerdns-2026-05.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:28:03Z/
url https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html
Weaknesses
Exploits
Severity_range_score7.4 - 7.4
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6uz8-kz5m-8ya9