Yep. You guessed it. Another mail CGI.
Destination address is not a CGI variable. Therefore, it's not possible to hijack this mailto script for malicious purposes, and spammers' extraction programs can't grab your address from the source ef the page which invokes it.
Um, and it mails form entries to you.
Configuration: The _desturl CGI variable points at the URL to send the user to in the event that the CGI believes form data has been successfully submitted. Edit the CGI script to set the recipient and the location of Sendmail.
If you get '500 Internal Server Error' messages when trying to submit your form, you probably have an invalid email address set.
Current version: 0.10
Changes from previous version: It no longer comes with an enormous and rather pointless xcf.