Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
| CVE-2026-42587 | 7.5 HIGH | Netty: HttpContentDecompressor maxAllocation bypass via Content-Encoding: br/zstd/snappy e |
| CVE-2026-42582 | 7.5 HIGH | Netty: HTTP/3 QPACK literal unbounded allocation |
| CVE-2026-42579 | 7.5 HIGH | Netty: DNS Codec Input Validation Bypass in Netty (Encoder + Decoder) |
| CVE-2026-42583 | 7.5 HIGH | Netty: Lz4FrameDecoder resource exhaustion |
| CVE-2026-42584 | 7.3 HIGH | Netty: HttpClientCodec response desynchronization |
| CVE-2026-42586 | 6.8 MEDIUM | Netty: CRLF Injection in Netty Redis Codec Encoder |
| CVE-2026-42580 | 6.5 MEDIUM | Netty: HTTP Request Smuggling due to incorrect chunk size parsing |
| CVE-2026-42585 | 6.5 MEDIUM | Netty: HTTP Request Smuggling due to malformed Transfer-Encoding |
| CVE-2026-42581 | 5.8 MEDIUM | Netty: HTTP/1.0 TE+CL Coexistence Bypasses Smuggling Sanitization |
| CVE-2026-44248 | 5.3 MEDIUM | Netty: Resource exhaustion in MqttDecoder |
| CVE-2026-42578 | Netty: HTTP Header Injection via HttpProxyHandler Disabled Validation |
No comments yet