He also included detailed instructions about how it could be exploited through a multi-step process, along with a method of mitigating the attack.
FORBES: Updated with Google comment below.
应用推荐
模块上移
模块下移
不移动