Owasp top 10 vulnerabilities and mitigation techniques