For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and upgrade notes.
If additional details are required, consult the closed issues for this release milestone.
# SHA1
c308b1f6a2d73fc2bba9da2cc33bf7e3ec49e851 dependency-track-apiserver.jar
b94fb9cbaa91c4e332bcec266e10a0f325f12e22 dependency-track-bundled.jar
# SHA256
d06f4550e16451ccb7843c36534172744934a7dc69e1d48e970a6eec24e49dc3 dependency-track-apiserver.jar
cf27db44e637b4bc551c16e659e81890f4c5d4f3b4ea9893ebf1717bff98b999 dependency-track-bundled.jar
# SHA512
4f190398de8084b1d481dc2e6ca3bb80afc675c96bba3dda1eaf1dc4faf8382c7a22f8be5953ed170dfc6765bd8a2efd67aa7d98826ce72c88e35cd16821f0f0 dependency-track-apiserver.jar
292f8af307adb3f52197ff1722e9565590f75a06a541fab2a54256dd2880a4abbf021cafdc43a112e7bf11364461bc5a26f90597b97d0190daf7365fcfd4efc5 dependency-track-bundled.jar What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…