When your operating system is devoid of exploit mitigations, writing exploits for applications running on it is simple.
When your operating system is devoid of exploit mitigations, writing exploits for applications running on it is simple.