Skip to main content
. 2020 May 22;12(5):e8235. doi: 10.7759/cureus.8235

Figure 4. Demonstration of webspace injection technique (left hand).

Figure 4