| License | LGPL 2.1 |
|---|---|
| Tags | securityjboss |
| HomePage | http://www.jboss.org/jbossas 🔍 Inspect URL |
| Ranking | #12217 in MvnRepository (See Top Artifacts) |
| Used By | 40 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
6.1.x | 6.1.0.Final | Central | Aug 16, 2011 | ||
6.0.x | 6.0.0.20101110-CR1 | Central | Nov 22, 2010 | ||
| 6.0.0.20100911-M5 | Central | Sep 23, 2010 | |||
| 6.0.0.20100721-M4 | Central | Jul 23, 2010 | |||
| 6.0.0.20100429-M3 | Central | May 02, 2010 | |||
| 6.0.0.20100216-M2 | Central | Feb 16, 2010 | |||
| 6.0.0.Final | Central | Dec 28, 2010 | |||
| 6.0.0.M1 | Central | Dec 02, 2009 | |||
5.1.x | 5.1.0.GA | Central | May 23, 2009 | ||
| 5.1.0.CR1 | Central | Apr 29, 2009 | |||
| 5.1.0.Beta1 | Central | Apr 29, 2009 | |||
5.0.x | 5.0.1.GA | Central | Feb 24, 2009 | ||
| 5.0.0.GA | Central | Dec 05, 2008 | |||
| 5.0.0.CR2 | Central | Sep 17, 2008 | |||
| 5.0.0.CR1 | Central | Jul 08, 2008 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |