Comment by tptacek
Point to a real, exploitable, public vulnerability that exploits this behavior, and then we'll all be talking about the same thing.
Point to a real, exploitable, public vulnerability that exploits this behavior, and then we'll all be talking about the same thing.