Previous (Findings - Action based findings)
Latent injection vulnerability
Next (Findings - Action based findings)
Malware generation vulnerability