source: https://www.securityfocus.com/bid/19928/info The application is prone to an input-validation vulnerability that allows malicious HTML and script code to be injected before it is used in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. . . Cross Context Scripting with Sage . WINDOWS: works with "Allow HTML Tags" off . . WINDOWS: works with "Allow HTML Tags" on . . UNIX: works with "Allow HTML Tags" off . . UNIX: works with "Allow HTML Tags" on .