Categories
|
Popular
|
About
Current Group
Group
H2 Database
com.h2database
Description
H2 is an open source, in-memory database written in Java.
Links
Related Categories
Embedded SQL Databases
DB Migration Tools
Hadoop Databases
SQL Libraries
Categories (277)
Maven Plugins
Testing
Android Packages
Language Runtime
JVM Languages
Logging Frameworks
JSON Libraries
Java Specifications
Core Utilities
Annotation Libraries
Mocking
Web Assets
HTTP Clients
Logging Bridges
Dependency Injection
XML Processing
Concurrency Libraries
Web Frameworks
Android Platform
Code Generators
View All
Home
»
com.h2database
»
h2
» Versions
H2 Database Engine
A fast SQL database that can run embedded or a server mode with support for transactions, encryption, full search, etc. Storage can be disk-based or in-memory.
Overview
Versions (161)
Used By (10.6k)
BOMs (1.4k)
Badges
Books (5)
Central (140)
WSO2 Dist (2)
Redhat GA (15)
Redhat EA (2)
Nuiton (1)
ICM (1)
+1 more
Version
▼
Vulnerabilities
Repository
Usages
Date
2.4
.x
2.4.240
Central
710
Sep 24, 2025
2.3
.x
2.3.232
Central
1,380
Aug 12, 2024
2.3.230
Central
118
Jul 15, 2024
2.2
.x
2.2.224
Central
1,391
Sep 18, 2023
2.2.222
Central
101
Sep 01, 2023
2.2.220
Central
740
Jul 05, 2023
2.1
.x
2.1.214
1 vulnerability
Central
1,608
Jun 14, 2022
2.1.212
1 vulnerability
Central
305
Apr 10, 2022
2.1.210
1 vulnerability
Central
537
Jan 17, 2022
2.0
.x
2.0.206
2 vulnerabilities
Central
145
Jan 04, 2022
2.0.204
3 vulnerabilities
Central
27
Dec 22, 2021
2.0.202
3 vulnerabilities
Central
74
Nov 29, 2021
1.4
.x
1.4.200
4 vulnerabilities
Central
2,231
Oct 14, 2019
1.4.199
4 vulnerabilities
Central
1,033
Mar 13, 2019
1.4.198
4 vulnerabilities
Central
97
Feb 22, 2019
1.4.197
2 vulnerabilities
Central
1,465
Mar 18, 2018
1.4.196
2 vulnerabilities
Central
1,068
Jun 10, 2017
1.4.195
2 vulnerabilities
Central
233
Apr 23, 2017
1.4.194
2 vulnerabilities
Central
226
Mar 14, 2017
1.4.193
2 vulnerabilities
Central
540
Oct 31, 2016
1.4.192
2 vulnerabilities
Central
420
May 26, 2016
1.4.191
2 vulnerabilities
Central
418
Jan 21, 2016
1.4.190
2 vulnerabilities
Central
280
Oct 11, 2015
1.4.189
2 vulnerabilities
Central
91
Sep 13, 2015
1.4.188
2 vulnerabilities
Central
122
Aug 13, 2015
1.4.187
2 vulnerabilities
Central
332
Apr 10, 2015
1.4.186
2 vulnerabilities
Central
127
Mar 02, 2015
1.4.185
2 vulnerabilities
Central
145
Jan 16, 2015
1.4.184
2 vulnerabilities
Central
93
Dec 19, 2014
1.4.183
2 vulnerabilities
Central
67
Dec 13, 2014
1.4.182
2 vulnerabilities
Central
132
Oct 17, 2014
1.4.181
2 vulnerabilities
Central
165
Aug 06, 2014
1.4.180
2 vulnerabilities
Central
89
Jul 13, 2014
1.4.179
2 vulnerabilities
Central
36
Jun 23, 2014
1.4.178
2 vulnerabilities
Central
151
May 02, 2014
1.4.177
2 vulnerabilities
Central
45
Apr 12, 2014
1.3
.x
1.3.176
2 vulnerabilities
Central
431
Apr 05, 2014
1.3.175
2 vulnerabilities
Central
211
Jan 18, 2014
1.3.174
2 vulnerabilities
Central
163
Oct 19, 2013
1.3.173
2 vulnerabilities
Central
293
Jul 28, 2013
1.3.172
2 vulnerabilities
Central
121
May 25, 2013
1.3.171
2 vulnerabilities
Central
109
Mar 17, 2013
1.3.170
2 vulnerabilities
Central
218
Nov 30, 2012
1.3.169
2 vulnerabilities
Central
5
Sep 09, 2012
1.3.168
2 vulnerabilities
Central
331
Jul 13, 2012
1.3.167
2 vulnerabilities
Central
99
May 23, 2012
1.3.166
2 vulnerabilities
Central
99
Apr 08, 2012
1.3.165
2 vulnerabilities
Central
36
Mar 18, 2012
1.3.164
2 vulnerabilities
Central
74
Feb 03, 2012
1.3.163
2 vulnerabilities
Central
49
Dec 30, 2011
1.3.162
2 vulnerabilities
Central
26
Nov 26, 2011
1.3.161
2 vulnerabilities
Central
77
Oct 28, 2011
1.3.160
2 vulnerabilities
Central
77
Sep 11, 2011
1.3.159
2 vulnerabilities
Central
34
Aug 13, 2011
1.3.158
2 vulnerabilities
Central
65
Jul 17, 2011
1.3.157
2 vulnerabilities
Central
32
Jun 25, 2011
1.3.156
2 vulnerabilities
Central
65
Jun 17, 2011
1.3.155
2 vulnerabilities
Central
26
May 27, 2011
1.3.154
2 vulnerabilities
Central
54
Apr 04, 2011
1.3.153
2 vulnerabilities
Central
26
Mar 14, 2011
1.3.152
2 vulnerabilities
Central
8
Mar 01, 2011
1.3.151
2 vulnerabilities
Central
13
Feb 12, 2011
1.3.150
2 vulnerabilities
Central
0
Feb 08, 2011
1.3.149
2 vulnerabilities
Central
27
Jan 07, 2011
1.3.148
2 vulnerabilities
Central
17
Dec 12, 2010
1.3.146
2 vulnerabilities
Central
8
Nov 19, 2010
1.2
.x
1.2.147
2 vulnerabilities
Central
30
Nov 21, 2010
1.2.145
2 vulnerabilities
Central
37
Nov 02, 2010
1.2.144
2 vulnerabilities
Central
28
Oct 15, 2010
1.2.143
2 vulnerabilities
Central
24
Sep 18, 2010
1.2.142
2 vulnerabilities
Central
5
Aug 31, 2010
1.2.141
2 vulnerabilities
Central
0
Aug 22, 2010
1.2.140
2 vulnerabilities
Central
35
Jul 25, 2010
1.2.139
2 vulnerabilities
Central
19
Jul 10, 2010
1.2.138
2 vulnerabilities
Central
19
Jun 27, 2010
1.2.137
2 vulnerabilities
Central
35
Jun 06, 2010
1.2.136
2 vulnerabilities
Central
9
May 24, 2010
1.2.135
2 vulnerabilities
Central
7
May 08, 2010
1.2.134
2 vulnerabilities
Central
14
Apr 23, 2010
1.2.133
2 vulnerabilities
Central
14
Apr 10, 2010
1.2.132
2 vulnerabilities
Central
42
Mar 21, 2010
1.2.131
2 vulnerabilities
Central
27
Mar 05, 2010
1.2.130
2 vulnerabilities
Central
6
Feb 26, 2010
1.2.129
2 vulnerabilities
Central
0
Feb 19, 2010
1.2.128
2 vulnerabilities
Central
44
Jan 30, 2010
1.2.127
2 vulnerabilities
Central
18
Jan 15, 2010
1.2.126
2 vulnerabilities
Central
10
Dec 18, 2009
1.2.125
2 vulnerabilities
Central
10
Dec 06, 2009
1.2.124
2 vulnerabilities
Central
12
Nov 20, 2009
1.2.123
2 vulnerabilities
Central
3
Nov 08, 2009
1.2.122
2 vulnerabilities
Central
3
Oct 28, 2009
1.2.121
2 vulnerabilities
Central
22
Oct 11, 2009
1.2.120
2 vulnerabilities
Central
0
Oct 04, 2009
1.1
.x
1.1.119
2 vulnerabilities
Central
39
Sep 26, 2009
1.1.118
2 vulnerabilities
Central
7
Sep 04, 2009
1.1.117
2 vulnerabilities
Central
27
Aug 09, 2009
1.1.116
2 vulnerabilities
Central
17
Jul 18, 2009
1.1.115
2 vulnerabilities
Central
6
Jun 27, 2009
1.1.114
2 vulnerabilities
Central
21
Jun 01, 2009
1.1.113
2 vulnerabilities
Central
13
May 21, 2009
1.1.112
2 vulnerabilities
Central
6
May 01, 2009
1.1.111
2 vulnerabilities
Central
14
Apr 10, 2009
1.1.110
2 vulnerabilities
Central
2
Apr 03, 2009
1.1.109
2 vulnerabilities
Central
1
Mar 14, 2009
1.1.108
2 vulnerabilities
Central
6
Feb 28, 2009
1.1.107
2 vulnerabilities
Central
2
Jan 24, 2009
1.1.106
2 vulnerabilities
Central
14
Jan 04, 2009
1.1.105
2 vulnerabilities
Central
0
Dec 19, 2008
1.1.104
2 vulnerabilities
Central
6
Nov 28, 2008
1.1.103
2 vulnerabilities
Central
1
Nov 07, 2008
1.1.102
2 vulnerabilities
Central
6
Oct 24, 2008
1.1.101
2 vulnerabilities
Central
7
Oct 17, 2008
1.1.100
2 vulnerabilities
Central
0
Oct 04, 2008
1.0
.x
1.0.20070617
1 vulnerability
Central
6
Jun 19, 2007
1.0.20070429
1 vulnerability
Central
3
May 15, 2007
1.0.20070304
1 vulnerability
Central
3
Mar 12, 2007
1.0.20061217
1 vulnerability
Central
5
Dec 22, 2006
1.0.79
1 vulnerability
Central
10
Sep 26, 2008
1.0.78
1 vulnerability
Central
7
Aug 28, 2008
1.0.77
1 vulnerability
Central
10
Aug 16, 2008
1.0.76
1 vulnerability
Central
2
Jul 28, 2008
1.0.75
1 vulnerability
Central
0
Jul 14, 2008
1.0.74
1 vulnerability
Central
0
Jun 21, 2008
1.0.73
1 vulnerability
Central
1
May 31, 2008
1.0.72
1 vulnerability
Central
0
May 10, 2008
1.0.71
1 vulnerability
Central
6
Apr 25, 2008
1.0.70
1 vulnerability
Central
0
Apr 20, 2008
1.0.69
1 vulnerability
Central
6
Mar 29, 2008
1.0.68
1 vulnerability
Central
3
Mar 15, 2008
1.0.67
1 vulnerability
Central
11
Feb 22, 2008
1.0.66
1 vulnerability
Central
1
Feb 02, 2008
1.0.65
1 vulnerability
Central
0
Jan 18, 2008
1.0.64
1 vulnerability
Central
2
Dec 27, 2007
1.0.63
1 vulnerability
Central
7
Dec 02, 2007
1.0.62
1 vulnerability
Central
0
Nov 25, 2007
1.0.61
1 vulnerability
Central
0
Nov 10, 2007
1.0.60
1 vulnerability
Central
15
Oct 20, 2007
1.0.59
1 vulnerability
Central
0
Oct 03, 2007
1.0.58
1 vulnerability
Central
0
Sep 16, 2007
1.0.57
1 vulnerability
Central
0
Aug 26, 2007
Related books
SQL Pocket Guide: A Guide to SQL Usage
Zhao, Alice
SQL for Data Analysis: Advanced Techniques for Transforming Data into Insights
Tanimura, Cathy
Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data
DeBarros, Anthony
Learning SQL: Generate, Manipulate, and Retrieve Data
Beaulieu, Alan
New
MacBook Pro
M5
10-core
CPU
10-core
GPU
24GB
RAM
Indexed Repositories (3155)
Central
Atlassian External
Atlassian
WSO2 Releases
WSO2 Public
Hortonworks
KtorEAP
Mulesoft
JCenter
Sonatype
🌐
DNS Gurus
Free DNS Tools & Analysis
Popular Tags
aar
android
apache
api
arm
assets
build
build-system
bundle
client
clojure
cloud
config
cran
data
database
eclipse
example
extension
framework
github
gradle
groovy
io
ios
javascript
jvm
kotlin
library
logging
maven
mobile
module
npm
osgi
persistence
plugin
resources
rlang
sdk
server
service
spring
sql
starter
testing
tools
ui
web
webapp
About
Web site developed by
@frodriguez
Powered by:
Scala
,
Play
,
Spark
,
Pekko
and
Cassandra
Read more...