Website build build-and-publish-website/master-90
diff --git a/index.html b/index.html
index 81e6450..ff94913 100644
--- a/index.html
+++ b/index.html
@@ -10,11 +10,11 @@
 <title>CogniCrypt - Secure Integration of Cryptographic Software | CogniCrypt</title>
 <meta property="og:title" content="CogniCrypt - Secure Integration of Cryptographic Software | CogniCrypt" />
 <meta name="twitter:title" content="CogniCrypt - Secure Integration of Cryptographic Software | CogniCrypt" />
-<meta name="description" content="A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report State of the Software Security 2017 lists the insecure use of cryptography as the second most common cause of software vulnerabilities, right after data leakage.
+<meta name="description" content="A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report State of the Software Security v11 (2020) lists the insecure use of cryptography as the third most common cause of software vulnerabilities, right after information leakage and CRLF injection.
 Eclipse CogniCrypt was developed within the collaborative research center CROSSING of Technische Universität Darmstadt. It allows developers to quickly identify and fix security-critical misuses of cryptographic libraries.">
-<meta property="og:description" content="A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report State of the Software Security 2017 lists the insecure use of cryptography as the second most common cause of software vulnerabilities, right after data leakage.
+<meta property="og:description" content="A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report State of the Software Security v11 (2020) lists the insecure use of cryptography as the third most common cause of software vulnerabilities, right after information leakage and CRLF injection.
 Eclipse CogniCrypt was developed within the collaborative research center CROSSING of Technische Universität Darmstadt. It allows developers to quickly identify and fix security-critical misuses of cryptographic libraries.">
-<meta name="twitter:description" content="A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report State of the Software Security 2017 lists the insecure …">
+<meta name="twitter:description" content="A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report State of the Software Security v11 (2020) lists the …">
 <meta name="author" content="Eclipse Foundation"/>
 <link href='https://www.eclipse.org/cognicrypt/favicon.ico' rel='icon' type='image/x-icon'/>
 <meta name="twitter:card" content="summary" />
@@ -235,7 +235,7 @@
         <div class="col-md-10">
     		
 
-<p>A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report <a href="https://www.veracode.com/state-software-security-2017" target="_blank">State of the Software Security 2017</a> lists the insecure use of cryptography as the second most common cause of software vulnerabilities, right after data leakage.</p>
+<p>A large number of recent studies have shown that most software applications that use cryptographic procedures misuse them. The VeraCode Report <a href="https://www.veracode.com/state-of-software-security-report" target="_blank">State of the Software Security v11 (2020)</a> lists the insecure use of cryptography as the third most common cause of software vulnerabilities, right after information leakage and CRLF injection.</p>
 
 <p>Eclipse CogniCrypt was developed within the collaborative research center CROSSING of Technische Universität Darmstadt. It allows developers to quickly identify and fix security-critical misuses of cryptographic libraries.</p>