Cross Site Scripting Flaw

Risk Description
blah blah blah

Attack Scenario
blah blah blah

Likelihood Considerations
blah blah blah

Impact Considerations
blah blah blah

Overall Severity
blah blah blah

Countermeasures
blah blah blah

Root Causes
blah blah blah

Related Vulnerabilities
blah blah blah