This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Top 10-2017 Acknowledgements

From OWASP
Revision as of 19:56, 20 January 2018 by T.Gigler (talk | contribs) (Added a table including the Acknowledgements to Data Contributors)

Jump to: navigation, search
← Methodology and Data
2017 Table of Contents

PDF version

 
Acknowledgements to Data Contributors

We'd like to thank the many organizations that contributed their vulnerability data to support the 2017 update:

• ANCAP • ContextIS • ITsec Security Services bv • Paladion Networks
• Aspect Security • Contrast Security • Khallagh • Purpletalk
• AsTech Consulting • DDoS.com • Linden Lab • Secure Network
• Atos • Derek Weeks • M. Limacher
  IT Dienstleistungen
• Shape Security
• Branding Brand • Easybss • SHCP
• Bugcrowd • Edgescan • Micro Focus Fortify • Softtek
• BUGemot • EVRY • Minded Security • Synopsis
• CDAC • EZI • National Center for
  Cyber Security
  Technology
• TCS
• Checkmarx • Hamed • Vantage Point
• Colegio LaSalle
  Monteria
• Hidden • Veracode
• I4 Consulting • Network Test Labs Inc. • Web.com
• Company.com • iBLISS Seguran̤a
  & Inteligencia
• Osampa  
     

For the first time, all the data contributed to a Top 10 release, and the full list of contributors is publicly available.

Acknowledgements to Individual Contributors

We’d like to thank the individual contributors who spent many hours collectively contributing to the Top 10 in GitHub.

  • ak47gen
  • alonergan
  • ameft
  • anantshri
  • bandrzej
  • bchurchill
  • binarious
  • bkimminich
  • Boberski
  • borischen
  • Calico90
  • chrish
  • clerkendweller
  • D00gs
  • davewichers
  • drkknight
  • drwetter
  • dune73
  • ecbftw
  • einsweniger
  • ekobrin
  • eoftedal
  • frohoff
  • fzipi
  • gebl
  • Gilc83
  • gilzow
  • global4g
  • grnd
  • h3xstream
  • hiralph
  • HoLyVieR
  • ilatypov
  • irbishop
  • itscooper
  • ivanr
  • jeremylong
  • jhaddix
  • jmanico
  • joaomatosf
  • jrmithdobbs
  • jsteven
  • jvehent
  • katyanton
  • kerberosmansour
  • koto
  • m8urnett
  • mwcoates
  • neo00
  • nickthetait
  • ninedter
  • ossie-git
  • PauloASilva
  • PeterMosmans
  • pontocom
  • psiinon
  • pwntester
  • raesene
  • riramar
  • ruroot
  • securestep9
  • securitybits
  • SPoint42
  • sreenathsasikumar
  • starbuck3000
  • stefanb
  • sumitagarwalusa
  • taprootsec
  • tghosth
  • TheJambo
  • thesp0nge
  • toddgrotenhuis
  • troymarshall
  • tsohlacol
  • vdbaan
  • yohgaki

And everyone else who provided feedback via Twitter, email, and other means. We would be remiss not to mention that Dirk Wetter, Jim Manico, and Osama Elnaggar have provided extensive assistance. Also, Chris Frohoff and Gabriel Lawrence provided invaluable support in the writing of the new A8:2017-Insecure Deserialization risk.

← Methodology and Data
2017 Table of Contents

PDF version

 

© 2002-2017 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png