Essentially - it's reading user-defined data - which is probably enough to be really bad, incase of a malicious exploit in the wild.
Essentially - it's reading user-defined data - which is probably enough to be really bad, incase of a malicious exploit in the wild.