Applying OWASP 2017: Mitigating Use of Components with Known Vulnerabilities