Why exploits prefer memory corruption | PACIBSP security Why do most in-the-wild exploits that target end-user platforms use memory corruption?