| License | GPL 3.0 |
|---|---|
| Tags | securityshirostarter |
| Ranking | #437239 in MvnRepository (See Top Artifacts) |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
1.1.x | 1.1.6-M2 | Central |
0
| Oct 24, 2025 | |
| 1.1.6-M2-java8 | Central |
0
| Oct 24, 2025 | ||
| 1.1.6-M1 | Central |
0
| Sep 08, 2025 | ||
| 1.1.5 | Central |
0
| Aug 14, 2025 | ||
| 1.1.5-java8 | Central |
0
| Aug 14, 2025 | ||
| 1.1.5-M1 | Central |
0
| Aug 01, 2025 | ||
| 1.1.3 | Central |
0
| Jul 14, 2025 | ||
| 1.1.3-java8 | Central |
0
| Jul 14, 2025 | ||
| 1.1.3-M2 | Central |
0
| Jun 11, 2025 | ||
| 1.1.3-M1 | Central |
0
| Jun 10, 2025 | ||
| 1.1.2 | Central |
0
| Jun 05, 2025 | ||
| 1.1.2-java8 | Central |
0
| Jun 05, 2025 | ||
| 1.1.1 | Central |
0
| Apr 30, 2025 | ||
| 1.1.1-java8 | Central |
0
| Apr 30, 2025 | ||
| 1.1.0 | Central |
0
| Mar 20, 2025 | ||
| 1.1.0-java8 | Central |
0
| Mar 20, 2025 | ||
1.0.x | 1.0.9 | Central |
0
| Jan 20, 2025 | |
| 1.0.9-java8 | Central |
0
| Mar 13, 2025 | ||
| 1.0.8 | Central |
0
| Dec 06, 2024 | ||
| 1.0.8-java8 | Central |
0
| Dec 24, 2024 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |