Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| netty | netty | >= 4.2.0.Alpha1, < 4.2.13.Final | - | |
| io.netty | netty-codec | < 4.1.133.Final | - | |
| io.netty | netty-codec-compression | < 4.2.13.Final | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-42587 | 7.5 HIGH | Netty: HttpContentDecompressor maxAllocation bypass via Content-Encoding: br/zstd/snappy e |
| CVE-2026-42582 | 7.5 HIGH | Netty: HTTP/3 QPACK literal unbounded allocation |
| CVE-2026-42579 | 7.5 HIGH | Netty: DNS Codec Input Validation Bypass in Netty (Encoder + Decoder) |
| CVE-2026-42577 | 7.5 HIGH | Netty: epoll transport denial of service via RST on half-closed TCP connection |
| CVE-2026-42584 | 7.3 HIGH | Netty: HttpClientCodec response desynchronization |
| CVE-2026-42586 | 6.8 MEDIUM | Netty: CRLF Injection in Netty Redis Codec Encoder |
| CVE-2026-42580 | 6.5 MEDIUM | Netty: HTTP Request Smuggling due to incorrect chunk size parsing |
| CVE-2026-42585 | 6.5 MEDIUM | Netty: HTTP Request Smuggling due to malformed Transfer-Encoding |
| CVE-2026-42581 | 5.8 MEDIUM | Netty: HTTP/1.0 TE+CL Coexistence Bypasses Smuggling Sanitization |
| CVE-2026-44248 | 5.3 MEDIUM | Netty: Resource exhaustion in MqttDecoder |
| CVE-2026-42578 | Netty: HTTP Header Injection via HttpProxyHandler Disabled Validation |
No comments yet