For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and upgrade notes.
If additional details are required, consult the closed issues for this release milestone.
# SHA1
174956bf3cd2dab16cfd36e7ab1b5d7001b99160 dependency-track-apiserver.jar
af75c903b033418ea6326cbb4e6885afba99ee94 dependency-track-bundled.jar
# SHA256
135cf4361bbbc65f488796bf196c8d2d3cbebec931b249e037551c6fbbae2ed7 dependency-track-apiserver.jar
5020ac51158038439b7482d5c5fec151773162724dce1779249bf73053456d34 dependency-track-bundled.jar
# SHA512
2002e27260b5cd4f96384828ef57f753916faab5ad06e0299958c3ab3e328045f2e805d0b1c3c56c85b4602d473c10d2c23d1098c94a4db93af0959c45b6ede8 dependency-track-apiserver.jar
262b582bd2dcbbb8966acd5dae3df88bc318590da0e66a7ac11f2197ccdca89b773013f317b5fe945650f16a48d2c4601356df10d77c10666d899917755cc0c8 dependency-track-bundled.jar When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…