As the pointer contains reference only to the certain memory location, a program has access to limited memory portions. To obtain fields or sub-elements within structured data programs may use offsets that can be out-of-range because they come from untrusted source. If attacker's can to monitor the offsets, they can easily access any memory location, influence or stop the functionality or cause code execution.