Total vulnerabilities in the database
The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.
CVSS v2:
No CWE or OWASP classifications available.