cgiemail allows remote attackers to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as "required-subject," which can be used to modify the CC, BCC, and other header fields in the generated email message.
Score: 0.0
Priority: Unclassified
Score: 0.00524
Percentile:
0.65972
CVSS v2 Score: 5.0
Severity: