The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Delegate | Etl | 5.9 (including) | 5.9 (including) |
Delegate | Etl | 6.0 (including) | 6.0 (including) |