Most of the security leaks are of the cross-site scripting type. Attackers can use them to inject links into victims that inject malicious code into their user context and execute it. According to the ...