Buffer overflow in index.cgi administration interface for Boozt! Standard 0.9.8 allows local users to execute arbitrary code via a long name field when creating a new banner.
http://www.iss.net/security_center/static/7790.php
http://www.boozt.com/news_detail.php?id=3
http://marc.info/?l=bugtraq&m=101027773404836&w=2
Source: Mitre, NVD
Published: 2002-03-25
Updated: 2025-04-03
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.02207