| License | MPL 2.0 |
|---|---|
| Tags | securityweb |
| Ranking | #44330 in MvnRepository (See Top Artifacts) |
| Used By | 11 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
3.6.x | 3.6.2 | Central | Jun 18, 2018 | ||
| 3.6.1 | Central | Jun 06, 2018 | |||
| 3.6.0 | Central | May 06, 2018 | |||
3.5.x | 3.5.1 | Central | May 04, 2018 | ||
| 3.5.0 | Central |
0
| Mar 16, 2018 | ||
3.4.x | 3.4.2 | Central | Feb 16, 2018 | ||
| 3.4.1 | Central | Nov 30, 2017 | |||
| 3.4.0 | Central | Nov 28, 2017 | |||
3.3.x | 3.3.1 | Central |
0
| Sep 07, 2017 | |
| 3.3.0 | Central | Jul 31, 2017 | |||
3.2.x | 3.2.0 | Central | Apr 29, 2017 | ||
3.1.x | 3.1.0 | Central | Feb 16, 2017 | ||
3.0.x | 3.0.3 | Central | Jan 16, 2017 | ||
| 3.0.2 | Central | Jan 13, 2017 | |||
| 3.0.1 | Central | Jan 12, 2017 | |||
| 3.0.0 | Central | Dec 12, 2016 | |||
2.3.x | 2.3.4 | Central | Feb 16, 2017 | ||
| 2.3.3 | Central |
0
| Jan 24, 2017 | ||
| 2.3.2 | Central | Nov 09, 2016 | |||
| 2.3.1 | Central | Sep 07, 2016 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |