1. 6
  1.  

  2. 1

    When your operating system is devoid of exploit mitigations, writing exploits for applications running on it is simple.