Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?