Tag
high
advisory
Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
2 rules 1 TTP 2 IOCsNetty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.
netty
request-smuggling
http
2r
1t
2i
high
advisory
Netty HTTP/2 CONTINUATION Frame Flood Denial of Service
1 ruleA denial of service vulnerability exists in Netty's HTTP/2 server implementation where an unauthenticated user can exhaust server CPU resources by sending a flood of CONTINUATION frames with zero-byte payloads, bypassing size-based mitigations and leading to service unavailability with minimal bandwidth usage; affected versions include netty-codec-http2 < 4.1.132.Final and netty-codec-http2 versions >= 4.2.0.Alpha1 and < 4.2.10.Final.
denial-of-service
http2
netty
cve-2026-33871
1r