Eclipse Jetty provides a Web server and javax.servlet container plus support for HTTP/2 WebSocket OSGi JMX JNDI JAAS and many other integrations. These components are open source and available for commercial use and distribution.
Jetty Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Critical
Jetty Integer Overflow or Wraparound Vulnerability
Critical
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Critical
Jetty Improper Access Control Vulnerability
Critical
Jetty Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Critical
Jetty Observable Discrepancy Vulnerability
High
Jetty Sensitive Information in Resource Not Removed Before Reuse Vulnerability
High
Jetty Missing Release of Memory after Effective Lifetime Vulnerability
High
Jetty Uncontrolled Resource Consumption Vulnerability
High
Jetty Uncontrolled Resource Consumption Vulnerability
High
Jetty Uncontrolled Resource Consumption Vulnerability
High
Jetty Improper Resource Shutdown or Release Vulnerability
High
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
High
Jetty Uncontrolled Resource Consumption Vulnerability
High
Jetty Integer Overflow or Wraparound Vulnerability
High
Jetty Improper Resource Shutdown or Release Vulnerability
High
Jetty Uncontrolled Resource Consumption Vulnerability
High
Jetty Session Fixation Vulnerability
High
Jetty Other Vulnerability
High
Jetty Uncontrolled Resource Consumption Vulnerability
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
High
Jetty Uncontrolled Resource Consumption Vulnerability
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
High
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Medium
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Medium
Jetty Improper Input Validation Vulnerability
Medium
Jetty Vulnerability
Medium
Jetty Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Medium
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Medium