Skip to main content
. 2020 Jun 11;12223:110–131. doi: 10.1007/978-3-030-52683-2_6

Fig. 11.

Fig. 11.

Demo screenshots of exploiting the vulnerability V8 and V9.