Vulnerabilities in OWASP software