| License | MIT |
|---|---|
| Tags | security |
| Ranking | #139163 in MvnRepository (See Top Artifacts) |
| Used By | 3 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
2.1.x | 2.1.3 | Central | Nov 13, 2025 | ||
| 2.1.2 | Central | Sep 26, 2025 | |||
| 2.1.1 | Central | Sep 19, 2025 | |||
2.0.x | 2.0.26 | Central | Jun 08, 2025 | ||
| 2.0.20 | Central | Apr 25, 2025 | |||
| 2.0.18 | Central | Apr 22, 2025 | |||
| 2.0.14 | Central | Mar 10, 2025 | |||
| 2.0.3 | Central | Dec 13, 2024 | |||
| 2.0.1 | Central | Nov 29, 2024 | |||
1.4.x | 1.4.2 | Central | Nov 04, 2024 | ||
| 1.4.1 | Central | Oct 29, 2024 | |||
1.3.x | 1.3.8 | Central | Sep 11, 2024 | ||
| 1.3.7 | Central | Aug 18, 2024 | |||
| 1.3.6 | Central | Jul 22, 2024 | |||
| 1.3.5 | Central | Jul 21, 2024 | |||
| 1.3.4 | Central | Jul 20, 2024 | |||
| 1.3.3 | Central | Jul 18, 2024 | |||
| 1.3.2 | Central | Jul 14, 2024 | |||
| 1.3.1 | Central | Jul 13, 2024 | |||
1.2.x | 1.2.8 | Central | Jul 11, 2024 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |