| License | Apache 2.0 |
|---|---|
| Tags | securityintegration |
| Ranking | #56385 in MvnRepository (See Top Artifacts) |
| Used By | 8 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
4.3.x | 4.3.2 | Central | Nov 10, 2025 | ||
| 4.3.1 | Central | Oct 03, 2025 | |||
| 4.3.0 | Central | Sep 27, 2025 | |||
| 4.3.0-M4 | Central | Sep 22, 2025 | |||
| 4.3.0-M3 | Central | Sep 11, 2025 | |||
| 4.3.0-M2 | Central | Aug 27, 2025 | |||
| 4.3.0-M1 | Central | Aug 04, 2025 | |||
4.2.x | 4.2.7 | Central | Sep 11, 2025 | ||
| 4.2.6 | Central | Aug 14, 2025 | |||
| 4.2.5 | Central | Aug 04, 2025 | |||
| 4.2.4 | Central | Jul 11, 2025 | |||
| 4.2.3 | Central | Jun 05, 2025 | |||
| 4.2.2 | Central | May 09, 2025 | |||
| 4.2.1 | Central | Apr 21, 2025 | |||
| 4.2.0 | Central | Mar 02, 2025 | |||
4.1.x | 4.1.7 | Central | Feb 25, 2025 | ||
| 4.1.6 | Central | Dec 20, 2024 | |||
| 4.1.5 | Central | Dec 12, 2024 | |||
| 4.1.4 | Central | Nov 12, 2024 | |||
| 4.1.3 | Central | Oct 24, 2024 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |