memory leak vulnerabilities and exploits