Wudang
BOFH
Memory protection between different processes. You can always destroy your own process, but not other peoples.
If transaction isolation and such is activated. At a certain bank I worked at the most common reason for CICS transaction abends was storage overlays. LE (the runtime environment for IBM's languages) marks storage begin and end with keys and I'd see them overwritten all the time. There were a number of reasons - the infrastructure code that helped applications with security and other stuff wasn't written in a way that supported it, programmers were badly trained as the internal training was shockingly bad, and bad culture in a lot of teams.
Some Insurance application that was written at Macro level rather than Command level. The whole thing was the work of one 'guru', and he did some stupid hacks to optimise it, such as use the LLVV VV bytes in a variable length ISAM record to stick some application data in. Either way, it would crash regularly.