Figure-10.-Vulnerable-Function