Why exploits prefer memory corruption | PACIBSP security

Why do most in-the-wild exploits that target end-user platforms use memory corruption?