source: http://www.securityfocus.com/bid/5354/info shoutBOX does not sufficiently sanitize HTML tags from input supplied via form fields. Attackers may exploit this lack of input validation to inject arbitrary HTML and script code into pages that are generated by the script. This may result in execution of attacker-supplied code in the web client of a user who visits such a page. HTML and script code will be executed in the security context of the site hosting the software. In the Site URL text box, type in: "></a><html code goes here><a href="
Related ExploitsTrying to match CVEs (1): CVE-2002-1429
Trying to match OSVDBs (1): 8034
Other Possible E-DB Search Terms: ShoutBox 1.2, ShoutBox