Detailed analysis of security vulnerabilities
The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.
The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.