| License | EPL 1.0 |
|---|---|
| Tags | securityshiro |
| Ranking | #30684 in MvnRepository (See Top Artifacts) |
| Used By | 16 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
0.22.x | 0.22.2 | Central | Nov 09, 2025 | ||
| 0.22.1 | Central | Oct 16, 2025 | |||
| 0.22.0 | Central | Sep 25, 2025 | |||
0.21.x | 0.21.2 | Central | Sep 17, 2025 | ||
| 0.21.1 | Central | Aug 23, 2025 | |||
| 0.21.0 | Central | Jul 07, 2025 | |||
0.20.x | 0.20.13 | Central | Sep 17, 2025 | ||
| 0.20.12 | Central | Sep 16, 2025 | |||
| 0.20.11 | Central | Sep 05, 2025 | |||
| 0.20.10 | Central | Aug 08, 2025 | |||
| 0.20.9 | Central | Jul 13, 2025 | |||
| 0.20.8 | Central | Mar 09, 2025 | |||
| 0.20.7 | Central | Feb 28, 2025 | |||
| 0.20.6 | Central | Feb 12, 2025 | |||
| 0.20.5 | Central | Jan 31, 2025 | |||
| 0.20.4 | Central | Dec 02, 2024 | |||
| 0.20.3 | Central | Oct 22, 2024 | |||
| 0.20.2 | Central | Oct 14, 2024 | |||
| 0.20.1 | Central | Sep 03, 2024 | |||
| 0.20.0 | Central | Aug 02, 2024 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |