Choose a version of org.glassfish.hk2 : security-lockdown-example-alice to add to Maven or Gradle - Latest Versions:
Latest Stable: 3.0.4
Latest Release Candidate: 3.0.0-RC1
All Versions
Choose a version of org.glassfish.hk2 : security-lockdown-example-alice to add to Maven or Gradle - All Versions:
Version
Vulnerabilities
Updated
3.0.x
security-lockdown-example-alice-3.0.4
security-lockdown-example-alice-3.0.3
security-lockdown-example-alice-3.0.2
security-lockdown-example-alice-3.0.1
security-lockdown-example-alice-3.0.0
security-lockdown-example-alice-3.0.0-RC1
security-lockdown-example-alice-3.0.0-M2
2.6.x
security-lockdown-example-alice-2.6.1
security-lockdown-example-alice-2.6.0
2.5.x
security-lockdown-example-alice-2.5.0
security-lockdown-example-alice-2.5.0-b63
security-lockdown-example-alice-2.5.0-b62
security-lockdown-example-alice-2.5.0-b61
security-lockdown-example-alice-2.5.0-b60
security-lockdown-example-alice-2.5.0-b59
security-lockdown-example-alice-2.5.0-b58
security-lockdown-example-alice-2.5.0-b57
security-lockdown-example-alice-2.5.0-b56
security-lockdown-example-alice-2.5.0-b55
security-lockdown-example-alice-2.5.0-b54
security-lockdown-example-alice-2.5.0-b53
security-lockdown-example-alice-2.5.0-b52
security-lockdown-example-alice-2.5.0-b50
security-lockdown-example-alice-2.5.0-b49
security-lockdown-example-alice-2.5.0-b48
security-lockdown-example-alice-2.5.0-b47
security-lockdown-example-alice-2.5.0-b46
security-lockdown-example-alice-2.5.0-b45
security-lockdown-example-alice-2.5.0-b44
security-lockdown-example-alice-2.5.0-b43
security-lockdown-example-alice-2.5.0-b42
security-lockdown-example-alice-2.5.0-b41
security-lockdown-example-alice-2.5.0-b40
security-lockdown-example-alice-2.5.0-b38
security-lockdown-example-alice-2.5.0-b37
security-lockdown-example-alice-2.5.0-b36
security-lockdown-example-alice-2.5.0-b35
security-lockdown-example-alice-2.5.0-b34
security-lockdown-example-alice-2.5.0-b33
security-lockdown-example-alice-2.5.0-b32
security-lockdown-example-alice-2.5.0-b31
security-lockdown-example-alice-2.5.0-b30
security-lockdown-example-alice-2.5.0-b29
security-lockdown-example-alice-2.5.0-b28
security-lockdown-example-alice-2.5.0-b27
security-lockdown-example-alice-2.5.0-b26
security-lockdown-example-alice-2.5.0-b25
security-lockdown-example-alice-2.5.0-b24
security-lockdown-example-alice-2.5.0-b23
security-lockdown-example-alice-2.5.0-b22
security-lockdown-example-alice-2.5.0-b21
security-lockdown-example-alice-2.5.0-b19
security-lockdown-example-alice-2.5.0-b18
security-lockdown-example-alice-2.5.0-b17
security-lockdown-example-alice-2.5.0-b16
security-lockdown-example-alice-2.5.0-b15
security-lockdown-example-alice-2.5.0-b14
security-lockdown-example-alice-2.5.0-b13
security-lockdown-example-alice-2.5.0-b12
security-lockdown-example-alice-2.5.0-b11
security-lockdown-example-alice-2.5.0-b10
security-lockdown-example-alice-2.5.0-b09
security-lockdown-example-alice-2.5.0-b08
security-lockdown-example-alice-2.5.0-b07
security-lockdown-example-alice-2.5.0-b06
security-lockdown-example-alice-2.5.0-b05
security-lockdown-example-alice-2.5.0-b04
security-lockdown-example-alice-2.5.0-b03
security-lockdown-example-alice-2.5.0-b02
security-lockdown-example-alice-2.5.0-b01
2.4.x
security-lockdown-example-alice-2.4.0
security-lockdown-example-alice-2.4.0-b34
security-lockdown-example-alice-2.4.0-b33
security-lockdown-example-alice-2.4.0-b32
security-lockdown-example-alice-2.4.0-b31
security-lockdown-example-alice-2.4.0-b30
security-lockdown-example-alice-2.4.0-b29
security-lockdown-example-alice-2.4.0-b28
security-lockdown-example-alice-2.4.0-b27
security-lockdown-example-alice-2.4.0-b26
security-lockdown-example-alice-2.4.0-b25
security-lockdown-example-alice-2.4.0-b24
security-lockdown-example-alice-2.4.0-b22
security-lockdown-example-alice-2.4.0-b21
security-lockdown-example-alice-2.4.0-b20
security-lockdown-example-alice-2.4.0-b19
security-lockdown-example-alice-2.4.0-b18
security-lockdown-example-alice-2.4.0-b17
security-lockdown-example-alice-2.4.0-b16
security-lockdown-example-alice-2.4.0-b15
security-lockdown-example-alice-2.4.0-b14
security-lockdown-example-alice-2.4.0-b13
security-lockdown-example-alice-2.4.0-b12
security-lockdown-example-alice-2.4.0-b11
security-lockdown-example-alice-2.4.0-b10
security-lockdown-example-alice-2.4.0-b09
security-lockdown-example-alice-2.4.0-b08
security-lockdown-example-alice-2.4.0-b07
security-lockdown-example-alice-2.4.0-b06
security-lockdown-example-alice-2.4.0-b05
security-lockdown-example-alice-2.4.0-b04
security-lockdown-example-alice-2.4.0-b03
security-lockdown-example-alice-2.4.0-b02
security-lockdown-example-alice-2.4.0-b01
2.3.x
security-lockdown-example-alice-2.3.0
security-lockdown-example-alice-2.3.0-b10
security-lockdown-example-alice-2.3.0-b09
security-lockdown-example-alice-2.3.0-b08
security-lockdown-example-alice-2.3.0-b07
security-lockdown-example-alice-2.3.0-b06
security-lockdown-example-alice-2.3.0-b05
security-lockdown-example-alice-2.3.0-b04
security-lockdown-example-alice-2.3.0-b03
security-lockdown-example-alice-2.3.0-b01
2.2.x
security-lockdown-example-alice-2.2.0
security-lockdown-example-alice-2.2.0-b27
security-lockdown-example-alice-2.2.0-b26
security-lockdown-example-alice-2.2.0-b25
security-lockdown-example-alice-2.2.0-b24
security-lockdown-example-alice-2.2.0-b23
security-lockdown-example-alice-2.2.0-b22
security-lockdown-example-alice-2.2.0-b21
security-lockdown-example-alice-2.2.0-b20
security-lockdown-example-alice-2.2.0-b19
security-lockdown-example-alice-2.2.0-b18
security-lockdown-example-alice-2.2.0-b17
security-lockdown-example-alice-2.2.0-b16
security-lockdown-example-alice-2.2.0-b15
security-lockdown-example-alice-2.2.0-b14
security-lockdown-example-alice-2.2.0-b10
security-lockdown-example-alice-2.2.0-b05
security-lockdown-example-alice-2.2.0-b06
security-lockdown-example-alice-2.2.0-b03
security-lockdown-example-alice-2.2.0-b02
2.1.x
security-lockdown-example-alice-2.1.96
security-lockdown-example-alice-2.1.95
security-lockdown-example-alice-2.1.93
security-lockdown-example-alice-2.1.92
security-lockdown-example-alice-2.1.91
security-lockdown-example-alice-2.1.89
security-lockdown-example-alice-2.1.88
security-lockdown-example-alice-2.1.87
security-lockdown-example-alice-2.1.86
security-lockdown-example-alice-2.1.85
security-lockdown-example-alice-2.1.84
security-lockdown-example-alice-2.1.83
security-lockdown-example-alice-2.1.82
security-lockdown-example-alice-2.1.81
security-lockdown-example-alice-2.1.80
security-lockdown-example-alice-2.1.79
security-lockdown-example-alice-2.1.78
security-lockdown-example-alice-2.1.76
security-lockdown-example-alice-2.1.73
security-lockdown-example-alice-2.1.72
security-lockdown-example-alice-2.1.71
security-lockdown-example-alice-2.1.70
security-lockdown-example-alice-2.1.69
security-lockdown-example-alice-2.1.68
security-lockdown-example-alice-2.1.67
security-lockdown-example-alice-2.1.66
security-lockdown-example-alice-2.1.65
security-lockdown-example-alice-2.1.64
security-lockdown-example-alice-2.1.63
security-lockdown-example-alice-2.1.62
security-lockdown-example-alice-2.1.61
security-lockdown-example-alice-2.1.60
security-lockdown-example-alice-2.1.59
security-lockdown-example-alice-2.1.58
security-lockdown-example-alice-2.1.57
security-lockdown-example-alice-2.1.56
security-lockdown-example-alice-2.1.55
security-lockdown-example-alice-2.1.54
security-lockdown-example-alice-2.1.53
security-lockdown-example-alice-2.1.52
security-lockdown-example-alice-2.1.51
security-lockdown-example-alice-2.1.50
security-lockdown-example-alice-2.1.49
security-lockdown-example-alice-2.1.48
security-lockdown-example-alice-2.1.47
security-lockdown-example-alice-2.1.46
security-lockdown-example-alice-2.1.45
security-lockdown-example-alice-2.1.44
security-lockdown-example-alice-2.1.43
security-lockdown-example-alice-2.1.42
security-lockdown-example-alice-2.1.41
security-lockdown-example-alice-2.1.40
security-lockdown-example-alice-2.1.39
security-lockdown-example-alice-2.1.38
security-lockdown-example-alice-2.1.37
security-lockdown-example-alice-2.1.36
security-lockdown-example-alice-2.1.35
security-lockdown-example-alice-2.1.34
security-lockdown-example-alice-2.1.33
security-lockdown-example-alice-2.1.32
security-lockdown-example-alice-2.1.31
security-lockdown-example-alice-2.1.30
security-lockdown-example-alice-2.1.29
security-lockdown-example-alice-2.1.28
security-lockdown-example-alice-2.1.27
security-lockdown-example-alice-2.1.26
security-lockdown-example-alice-2.1.25
security-lockdown-example-alice-2.1.23
security-lockdown-example-alice-2.1.22
security-lockdown-example-alice-2.1.21
security-lockdown-example-alice-2.1.20
security-lockdown-example-alice-2.1.19
security-lockdown-example-alice-2.1.18
security-lockdown-example-alice-2.1.17
security-lockdown-example-alice-2.1.16
security-lockdown-example-alice-2.1.15
security-lockdown-example-alice-2.1.14
security-lockdown-example-alice-2.1.13
security-lockdown-example-alice-2.1.12
security-lockdown-example-alice-2.1.11
security-lockdown-example-alice-2.1.10
security-lockdown-example-alice-2.1.9
security-lockdown-example-alice-2.1.8
security-lockdown-example-alice-2.1.7
security-lockdown-example-alice-2.1.5
security-lockdown-example-alice-2.1.4
security-lockdown-example-alice-2.1.3
security-lockdown-example-alice-2.1.2
security-lockdown-example-alice-2.1.1
security-lockdown-example-alice-2.1.0
2.0.x
security-lockdown-example-alice-2.0.5
security-lockdown-example-alice-2.0.4
security-lockdown-example-alice-2.0.3
security-lockdown-example-alice-2.0.1
How to add a dependency to Maven
Add the following org.glassfish.hk2 : security-lockdown-example-alice maven dependency to the pom.xml file with your favorite IDE (IntelliJ / Eclipse / Netbeans):