Fig. 6From: From proof-of-concept to exploitableIllustration of the fuzzer implemented by ReveryBack to article page