Common Vulnerabilities and Exploits: Understanding OWASP Top Ten