Apple web server security acknowledgements, 2013

Apple publishes this article to acknowledge and thank those who reported potential security issues in our web servers. Credit is added after the issue has been identified and addressed.

For credits from other years, see the end of this article. You can also view recent Apple web server security acknowledgements.

Credits

December 2013

  • Akash Jain (@jain_ak)

  • Connor Spicer

  • E. Sanchez

  • Hassan El Hadary

  • Ishan Anand

  • John Campbell of Yabla, Inc.

  • Kamil Sevi (@kamilsevi)

  • Kirill Ermakov of Positive Technologies

  • Muhammad Talha Khan

  • Riaz Ebrahim

  • Shubham Raj (@xceptioncode)

  • Vedachala (@vedachalaka)

November 2013

  • Akash Jain (@jain_ak)

  • Alexandr Drozdov

  • Andrei Neculaesei

  • Andrew Pouliot of Facebook

  • Axel Schneider

  • Shyam Jordan of Hicube Infosec Pvt.Ltd.

  • Steven Harwood of the Corona Norco Unified School District

October 2013

  • Abhinav Sejpal (@Abhinav_Sejpal) of PASS Technologies

  • Akash Jain (@jain_ak)

  • Axel Schneider

  • David Hoyt of Hoyt LLC

  • Dylan E. Meador (@DylanMeador)

  • Ebrahim Hegazy (@Zigoo0)

  • Gena Makhomed

  • Gokmen GURESCI

  • JATIN JAIN

  • Javid Hussain from TechDefence

  • Jayvardhan Singh

  • k T Ram Ganesh

  • Kyle Brogle

  • Masato Kinugawa

  • Narendra Bhati (R00t Sh3ll The Untraceable) of Cyber Octet Pvt.Ltd

  • Nikhil Srivastava

  • Oliver Gruskovnjak of Portcullis, Inc.

  • Olivier Beg

  • Prashant Sharma (@ps_manu) of LBSS Pvt. Ltd.

  • Sergiu Dragos Bogdan

  • Tushar Rajhans Kumbhare (@tush2388)

September 2013

  • Abhinav Karnawat

  • Akash Jain (@jain_ak)

  • Ali Hasan Ghauri | AHPT

  • Chandroliya Ravi Ghanashyam bhai (@ChandroliyaRavi)

  • David Hoyt of Hoyt LLC Research

  • Enguerran Gillier

  • Jigar Thakkar (@jigarthakkar39)

  • Kamil Sevi (@kamilsevi)

  • Pralhad Chaskar of NII Consulting (@c0d3xpl0it)

  • Ravikumar R. Paghdal (@_RaviRamesh) of the Shrimad Rajchandra Institute of Management and Computer Application

  • Sahil Dhar

  • Sahil Sehgal

  • Vasudeva of Net-square solutions Pvt. ltd.

  • Vedachala (@vedachalaka)

  • Vikas Chopalli (@vikas115m)

August 2013

  • Ahmed Aboul-Ela (@_SecGeek) of Starware

  • Akash Jain (@jain_ak), India

  • Amy Worrall

  • Bluebox Security

  • Christy Philip Mathew - Offcon Info Security

  • David Hoyt of Hoyt LLC Research

  • Deepankar Arora (@sec403)

  • Diamant Osmani

  • Ebrahim Hegazy (@Zigoo0)

  • Evgeniy Tolmachev (@c3retc3) of Positive Research Lab

  • Jorge García Pérez (@jorgegarccia)

  • Jorge Luis Alvarez Medina

  • Manish Bhattacharya

  • Manish Bhattacharya of Shobhit University

  • Mohamed Osman Saeed From Vision Valley Company

  • Nikhil.P.Kulkarni (@nikchillz) of M.S.Ramaiah Institute of Technology

  • Nipun Jaswal (@nipunjaswal)

  • Osanda Malith Jayathissa (@OsandaMalith)

  • Ravikumar R. Paghdal (@_RaviRamesh) of the Shrimad Rajchandra Institute of Management and Computer Application

  • Sahil Dhar

  • Saqib Kamran

  • Ucha Gobejishvili

July 2013

  • David Hoyt of Hoyt LLC Research

  • Gokmen GURESCI

  • Ibrahim BALIC (Balich IT)

  • Jason Hullinger

  • Javid Hussain (@javidhussain21) from TechDefence

  • John Santoleri of StoneWork Capital LLC

  • Mohamed Osman Saeed of Vision Valley Company

  • Nikhil Srivastava

  • Olivier Beg

  • Paweł Hałdrzyński

  • Roy Castillo of Informatics Computer Institute - Cebu, Philippines

  • SCANV

  • Yorrick Hardeman

June 2013

  • Abhibandhu Kafle

  • Adrián Condes

  • Ahmad Ashraff (@yappare)

  • Ajinkya Patil (@5nak3Eyes)

  • Ali hassan

  • Anand Sundar Tiwari

  • Bradley Johnson

  • Damien Bancal

  • Danalachi Sergiu

  • Danijel Maksimović (Brčko Distrikt, @maxon3)

  • Danish Tariq

  • Darius Petrescu of Romanian Security Team

  • David Hoyt of Hoyt LLC Research

  • Dawid Bałut

  • Dragos Scarlatescu of the Romanian Security Team

  • E. Sanchez

  • Florin

  • Frans Rosén from Detectify

  • Frederik Oddershede Markor of Surfshark

  • Greg Wroblewski of Microsoft and MSVR

  • Horatau Marius

  • J. Francisco Bolívar

  • Javid Hussain from TechDefence

  • Jeison Maldonado

  • Martin Hall of Microsoft

  • Mike Czumak

  • Mohamed Ramadan

  • Monendra Sahu (@mohitnitrr)

  • Mr. Mayank Bhatodra

  • Narendra Bhati (R00t Sh3ll The Untraceable) of Cyber Octet Pvt.Ltd

  • Naresh Chattala

  • Nikhil Srivastava

  • Noman Ramzan

  • Pobereznicenco Dan

  • Prasanna Mestha of Security Ghost Team

  • Rubén Díaz Alonso (@outime) of Rubutek

  • Sahil Sehgal

  • Salvatore Menna Ancy

  • Sebastian Neef

  • Secbeta

  • Stefan Schurtz

  • Tarek Siddiki of Team Haxorsistz

  • Tim Schäfers

  • Timo Lins

  • Umer Shakil (@umer_djzz)

  • Vikas Chopalli

  • Yasir Altaf Zargar

  • Yosuke Hasegawa of NetAgent Co., Ltd

May 2013

  • Adrian Ivascu

  • André Ferreira (From Leiria / ESDS) "White Hat Hacker"

  • Darius Petrescu (@akkiliON_) of Romanian Security Team

  • Griffin Francis

  • Issam Rabhi

  • Javid Hussain (@javidhussain21)

  • Nidhish Dave of BVCOE

  • REBIAI Ali Zinédine (@z_reb)

  • Somana Syam Kumar

  • Yosuke Hasegawa of NetAgent Co., Ltd

April 2013

  • Aditya Balapure

  • Akash Jain (@jain_ak)

  • Ali Hasan Ghauri - AHPT

  • Andrey Medov of Positive Technologies

  • Camilo Galdos AkA Dedalo of Open-Sec

  • Christian Lopez Martin (phr0nak)

  • devesh bhatt (#deveshbhatt11)

  • Ermakov Kirill of Positive Technologies

  • hip

  • Jack "fin1te" W

  • Jeff Jarmoc (@jjarmoc)

  • John (@n0x00)

  • Kamil Sevi (@kamilsevi)

  • Malte Batram

  • Manjot Singh (मनजोत सिंह)

  • Masato Kinugawa

  • Richard Moulinneuf from ENI (Ãcole Nantaise en Informatique)

  • Rishal Dwivedi (रिशाल द्विवेदी)

  • Russell Sullivan

  • Sandeep Singh Rehal

  • Sunil Dadhich (@Sunil_Dadhich7)

  • Wong Chieh Yie (@wcypierrenet)

  • Yngve N. Pettersen of Opera Software ASA

March 2013

  • Artem Chaykin of Positive Technologies

  • Bilal K

  • David Hoyt of Hoyt LLC Research

  • Dmitriy Serebryannikov (@dsrbr) of Positive Technologies

  • E Sanchez

  • Fabián Cuchietti

  • Gerardo Salazar

  • Malte Batram

  • Masato Kinugawa

  • Mayur Lohite

  • Milan Bačkonja

  • Sergey Bobrov of Positive Research

  • Siddhesh Gawde

  • Tushar Rajhans Kumbhare

  • Tushar Rajhans Kumbhare

  • Vaibhav Khatke of Syntel inc

  • Vasudeva of Net-square solutions Pvt. ltd.

  • Vikas Chopalli

  • Yngve N. Pettersen of Opera Software ASA

February 2013

  • Ahmed Mohamed Hassan Aboul-Ela of Starware

  • ankit bharathan (lonely-hacker)

  • Ari Rubinstein

  • Chema Alonso

  • Christy Philip Mathew of Zimperium, Inc

  • Evgeny Ermakov (@crw__) of Positive Technologies

  • Fernando Muñoz

  • Fernando Muñoz Sánchez from Null Group

  • JATIN JAIN

  • José Miguel Soriano

  • Malte Batram

  • Mohamed Ramadan

  • Nikhil.P.Kulkarni (@nikchillz) of Break The Security team

  • Yuji Kosuga

January 2013

  • Bernhard 'Bruhns' Brehm of Recurity Labs

  • Christian Seifert of Deutsche Telekom

  • Clint Ruoho of Laconic Security

  • Danijel Maksimović (@MaXoN3)

  • David Benjamin of the Massachusetts Institute of Technology

  • David Hoyt of Hoyt LLC Research

  • Elie Bursztein of Google

  • Frans Rosén from Detectify

  • Gurjant Singh (Godhacker_IHOS)

  • Jinen Patel

  • Louis Romero (@Arcank)

  • Mirza Burhan Baig

  • Mukesh Chowdary

  • Nils Juenemann

  • Pradeep Jairamani (Black_Eagle)

  • Prakhar Prasad of Security Pulse and National Anti-Hacking Group

  • Rafay Baloch

  • Rahul Iyer of Bejoi LLC

  • Shubham Mittal

  • SiddhartH SolankI

  • Subhash Dasyam

  • Yngve N. Pettersen of Opera Software ASA

Apple web server security acknowledgements by year

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: