| License | MIT |
|---|---|
| Tags | securitystarter |
| Ranking | #452713 in MvnRepository (See Top Artifacts) |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
4.6.x | 4.6.8 | Central |
0
| Nov 25, 2022 | |
4.5.x | 4.5.8 | Central |
0
| Aug 25, 2022 | |
4.4.x | 4.4.8 | Central |
0
| Apr 29, 2022 | |
4.3.x | 4.3.8 | Central |
0
| Feb 25, 2022 | |
4.2.x | 4.2.8 | Central |
0
| Dec 15, 2021 | |
4.1.x | 4.1.8 | Central |
0
| Dec 03, 2021 | |
4.0.x | 4.0.11 | Central |
0
| Sep 29, 2021 | |
| 4.0.10 | Central |
0
| Sep 09, 2021 | ||
| 4.0.9 | Central |
0
| Aug 28, 2021 | ||
| 4.0.8 | Central |
0
| Aug 28, 2021 | ||
3.8.x | 3.8.8 | Central |
0
| Jun 28, 2021 | |
3.7.x | 3.7.8 | Central |
0
| Jun 19, 2021 | |
3.6.x | 3.6.8 | Central |
0
| Jun 12, 2021 | |
3.5.x | 3.5.8 | Central |
0
| Jun 07, 2021 | |
3.3.x | 3.3.8 | Central |
0
| May 28, 2021 | |
3.2.x | 3.2.8 | Central |
0
| May 21, 2021 | |
3.1.x | 3.1.8 | Central |
0
| May 06, 2021 | |
3.0.x | 3.0.8 | Central |
0
| Apr 22, 2021 | |
2.5.x | 2.5.8 | Central |
0
| Apr 13, 2021 | |
2.3.x | 2.3.8 | Central |
0
| Mar 15, 2021 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |