Analyzing the OWASP Top Ten attacks