How would this be considered an exploit? I would like someone to explain it to me, explicitly please.