What Statement Describes A Memory Leak Vulnerability