Most Common Security Vulnerabilities Using JavaScript