Understanding Cross-Site Request Forgery Threat Vectors