jetty-http is vulnerable to HTTP request smuggling attacks. The HTTP parser accepts request headers when the HTTP/0.9 protocol specifically has none, allowing a malicious user to conduct HTTP request smuggling attacks.
dev.eclipse.org/mhonarc/lists/jetty-announce/msg00123.html
www.securitytracker.com/id/1041194
bugs.eclipse.org/bugs/show_bug.cgi?id=535667
github.com/eclipse/jetty.project/issues/2529
lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
lists.apache.org/thread.html/rbf4565a0b63f9c8b07fab29352a97bbffe76ecafed8b8555c15b83c6@%3Cissues.maven.apache.org%3E
security.netapp.com/advisory/ntap-20181014-0001/
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us
www.debian.org/security/2018/dsa-4278
www.oracle.com/security-alerts/cpuoct2020.html
www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html