Return to Article Details Security Exploitation for Online Meeting Applications: Proof of Concept Download Download PDF