How to add a POM dependency to Maven
POM as dependency in dependencyManagement
<dependency>
<groupId>io.undertow</groupId>
<artifactId>undertow-parent</artifactId>
<version>2.2.26.Final</version>
</dependency>
Choose a version of io.undertow : undertow-parent to add to Maven - Latest Versions:
Version | Vulnerabilities | Updated | |
---|---|---|---|
2.3.x |
undertow-parent-2.3.8.Final
|
||
undertow-parent-2.3.7.Final
|
|||
undertow-parent-2.3.6.Final
|
|||
undertow-parent-2.3.5.Final
|
|||
undertow-parent-2.3.4.Final
|
CVE-2022-4492 | ||
undertow-parent-2.3.3.Final
|
CVE-2022-4492 | ||
undertow-parent-2.3.2.Final
|
CVE-2022-4492 | ||
undertow-parent-2.3.1.Final
|
CVE-2022-4492 | ||
undertow-parent-2.3.0.Final
|
CVE-2022-4492 | ||
undertow-parent-2.3.0.Beta1
|
2 vulnerabilities | ||
undertow-parent-2.3.0.Alpha2
|
2 vulnerabilities | ||
undertow-parent-2.3.0.Alpha1
|
3 vulnerabilities | ||
2.2.x |
undertow-parent-2.2.26.Final
|
||
undertow-parent-2.2.25.Final
|
|||
undertow-parent-2.2.24.Final
|
|||
undertow-parent-2.2.23.Final
|
CVE-2022-4492 | ||
undertow-parent-2.2.22.Final
|
CVE-2022-4492 | ||
undertow-parent-2.2.21.Final
|
CVE-2022-4492 | ||
undertow-parent-2.2.20.Final
|
2 vulnerabilities | ||
undertow-parent-2.2.19.Final
|
2 vulnerabilities | ||
undertow-parent-2.2.18.Final
|
2 vulnerabilities | ||
undertow-parent-2.2.17.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.16.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.15.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.14.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.13.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.12.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.11.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.10.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.9.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.8.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.7.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.6.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.5.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.4.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.3.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.2.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.1.Final
|
3 vulnerabilities | ||
undertow-parent-2.2.0.Final
|
3 vulnerabilities | ||
2.1.x |
undertow-parent-2.1.8.Final
|
3 vulnerabilities | |
undertow-parent-2.1.7.Final
|
3 vulnerabilities | ||
undertow-parent-2.1.6.Final
|
3 vulnerabilities | ||
undertow-parent-2.1.5.Final
|
3 vulnerabilities | ||
undertow-parent-2.1.4.Final
|
4 vulnerabilities | ||
undertow-parent-2.1.3.Final
|
5 vulnerabilities | ||
undertow-parent-2.1.2.Final
|
5 vulnerabilities | ||
undertow-parent-2.1.1.Final
|
5 vulnerabilities | ||
undertow-parent-2.1.0.Final
|
7 vulnerabilities | ||
2.0.x |
undertow-parent-2.0.42.Final
|
3 vulnerabilities | |
undertow-parent-2.0.41.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.40.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.39.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.38.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.37.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.36.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.35.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.34.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.33.Final
|
3 vulnerabilities | ||
undertow-parent-2.0.32.Final
|
4 vulnerabilities | ||
undertow-parent-2.0.31.Final
|
4 vulnerabilities | ||
undertow-parent-2.0.30.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.29.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.28.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.27.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.26.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.25.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.24.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.23.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.22.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.21.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.20.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.19.Final
|
7 vulnerabilities | ||
undertow-parent-2.0.18.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.17.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.16.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.15.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.14.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.13.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.12.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.11.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.10.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.9.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.8.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.7.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.6.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.5.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.4.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.3.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.2.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.1.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.0.Final
|
10 vulnerabilities | ||
undertow-parent-2.0.0.Beta1
|
10 vulnerabilities | ||
undertow-parent-2.0.0.Alpha1
|
10 vulnerabilities | ||
1.4.x |
undertow-parent-1.4.28.Final
|
10 vulnerabilities | |
undertow-parent-1.4.27.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.26.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.25.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.24.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.23.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.22.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.21.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.20.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.19.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.18.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.17.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.16.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.15.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.14.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.13.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.12.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.11.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.10.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.9.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.8.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.7.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.6.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.5.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.4.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.3.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.2.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.1.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.0.Final
|
10 vulnerabilities | ||
undertow-parent-1.4.0.CR4
|
10 vulnerabilities | ||
undertow-parent-1.4.0.CR3
|
10 vulnerabilities | ||
undertow-parent-1.4.0.CR2
|
10 vulnerabilities | ||
undertow-parent-1.4.0.CR1
|
10 vulnerabilities | ||
undertow-parent-1.4.0.Beta1
|
10 vulnerabilities | ||
1.3.x |
undertow-parent-1.3.33.Final
|
10 vulnerabilities | |
undertow-parent-1.3.32.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.31.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.30.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.29.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.28.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.27.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.26.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.25.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.24.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.23.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.22.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.21.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.20.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.19.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.18.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.17.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.16.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.15.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.14.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.13.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.12.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.11.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.10.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.9.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.8.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.7.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.6.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.5.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.4.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.3.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.2.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.1.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Final
|
10 vulnerabilities | ||
undertow-parent-1.3.0.CR3
|
10 vulnerabilities | ||
undertow-parent-1.3.0.CR2
|
10 vulnerabilities | ||
undertow-parent-1.3.0.CR1
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta13
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta12
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta11
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta10
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta9
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta8
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta7
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta6
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta5
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta4
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta3
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta2
|
10 vulnerabilities | ||
undertow-parent-1.3.0.Beta1
|
10 vulnerabilities | ||
1.2.x |
undertow-parent-1.2.12.Final
|
10 vulnerabilities | |
undertow-parent-1.2.11.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.10.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.9.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.8.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.7.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.6.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.5.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.4.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.3.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.2.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.1.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Final
|
10 vulnerabilities | ||
undertow-parent-1.2.0.CR1
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta10
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta9
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta8
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta7
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta6
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta5
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta4
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta3
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta2
|
10 vulnerabilities | ||
undertow-parent-1.2.0.Beta1
|
10 vulnerabilities | ||
1.1.x |
undertow-parent-1.1.9.Final
|
10 vulnerabilities | |
undertow-parent-1.1.8.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.7.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.6.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.5.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.4.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.3.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.2.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.1.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Final
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR8
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR7
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR6
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR5
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR4
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR3
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR2
|
10 vulnerabilities | ||
undertow-parent-1.1.0.CR1
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta8
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta7
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta6
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta5
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta4
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta3
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta2
|
10 vulnerabilities | ||
undertow-parent-1.1.0.Beta1
|
10 vulnerabilities | ||
1.0.x |
undertow-parent-1.0.19.Final
|
10 vulnerabilities | |
undertow-parent-1.0.18.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.17.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.16.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.15.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.14.Final
|
11 vulnerabilities | ||
undertow-parent-1.0.13.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.12.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.11.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.10.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.9.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.8.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.7.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.6.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.5.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.4.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.3.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.2.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.1.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Final
|
10 vulnerabilities | ||
undertow-parent-1.0.0.CR5
|
10 vulnerabilities | ||
undertow-parent-1.0.0.CR4
|
10 vulnerabilities | ||
undertow-parent-1.0.0.CR3
|
10 vulnerabilities | ||
undertow-parent-1.0.0.CR2
|
10 vulnerabilities | ||
undertow-parent-1.0.0.CR1
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta33
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta32
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta31
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta30
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta29
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta28
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta27
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta26
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta25
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta24
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta23
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta22
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta21
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta20
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta19
|
11 vulnerabilities | ||
undertow-parent-1.0.0.Beta18
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta17
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta16
|
11 vulnerabilities | ||
undertow-parent-1.0.0.Beta15
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta14
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta13
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta12
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta11
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta10
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta9
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta8
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta7
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta6
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta5
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta4
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta3
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta2
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Beta1
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha22
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha21
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha20
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha19
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha18
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha17
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha16
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha15
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha14
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha13
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha12
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha11
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha10
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha9
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha8
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha7
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha6
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha5
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha4
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha3
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha2
|
10 vulnerabilities | ||
undertow-parent-1.0.0.Alpha1
|
10 vulnerabilities |
POM as dependency in dependencyManagement
<dependency>
<groupId>io.undertow</groupId>
<artifactId>undertow-parent</artifactId>
<version>2.2.26.Final</version>
</dependency>
Advertisement