Lack of exploit mitigations (e.g. PIE, ARC, or stack canaries)