Identifying The Usage Of Known Vulnerabilities Components Based On OWASP A9 | IEEE Conference Publication | IEEE Xplore