CVE: CVE-2002-1575

Export to Word

cgiemail allows remote attackers to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as "required-subject," which can be used to modify the CC, BCC, and other header fields in the generated email message.

Threat-Mapped Scoring

Score: 0.0

Priority: Unclassified

EPSS

Score: 0.00524
Percentile: 0.65972

CVSS Scoring

CVSS v2 Score: 5.0

Severity:

Affected Products

← Back to Home