Given the restrictive nature of mobile operating systems, such exploits are much less impactful than on desktop OSs. Furthermore, if you are dealing with those exploits, you are probably victim of a targeted attack, which is well above what normal users worry about.