Ask Slashdot: Reviewing 3rd Party Libraries?
in my day job I work for Fortify. You can contact the developers of this library and request that they use static analysis product on their software, or request a security review from a 3rd party.
We would for sure catch those SQL injections and more. But we would need the original source code. You can probe for things from the binary, but the results don't come back in a way that is very actionable for the developers.
As for your predicament: I think you would be better off writing your own library, rather than putting the insecure one to work.
Going To Boot Camp
Which of those products ran hypervisory kernels, or anything like it? I can answer for you: the x86 card.
And although it may have been usable in 1995, it wasn't usable yesterday. Emulation or dual booting was the only option yesterday. I think the Wisconsin Cocksucker's post is pretty interesting.