Which of the following can aid a buffer overflow attack to execute when used in the creation of applications?