info
discussion
exploit
solution
references
Geeklog Email Composition CRLF Injection Vulnerability
There is no exploit code required.
Privacy Statement
Copyright 2010, SecurityFocus