| License | Apache 2.0EPL 1.0 |
|---|---|
| Tags | serversecurityeclipsewebserverjetty |
| HomePage | http://www.eclipse.org/jetty 🔍 Inspect URL |
| Date | Sep 14, 2017 |
| Files | pom (1 KB) jar (90 KB) View All |
| Repositories | CentralMulesoftSoftmotions |
| Ranking | #783 in MvnRepository (See Top Artifacts) |
| Used By | 805 artifacts |
| Vulnerabilities | Vulnerabilities from dependencies: CVE-2024-8184 CVE-2024-13009 CVE-2023-26049 View 13 more ... |
Compile Dependencies (1)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
| Web Server Apache 2.0EPL 2.0 | org.eclipse.jetty » jetty-server16 vulnerabilities | 9.4.7.v20170914 | 12.1.4 |
Test Dependencies (1)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
Apache 2.0EPL 2.0 | org.eclipse.jetty.toolchain » jetty-test-helper | 4.2 | 6.4 |
Licenses
| License | URL |
|---|---|
| Apache Software License - Version 2.0 | http://www.apache.org/licenses/LICENSE-2.0 |
| Eclipse Public License - Version 1.0 | http://www.eclipse.org/org/documents/epl-v10.php |
Developers
| Name | Dev Id | Roles | Organization | |
|---|---|---|---|---|
| Greg Wilkins | gregw<at>webtide.com | gregw | Webtide, LLC | |
| Jan Bartel | janb<at>webtide.com | janb | Webtide, LLC | |
| Jesse McConnell | jesse.mcconnell<at>gmail.com | jesse | Webtide, LLC | |
| Joakim Erdfelt | joakim.erdfelt<at>gmail.com | joakime | Webtide, LLC | |
| Simone Bordet | simone.bordet<at>gmail.com | sbordet | Webtide, LLC | |
| David Jencks | david.a.jencks<at>gmail.com | djencks | IBM |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |