source: http://www.securityfocus.com/bid/55561/info
IFOBS is prone to multiple HTML-injection vulnerabilities.
Exploiting these issues may allow an attacker to execute HTML and script code in the context of the affected site, to steal cookie-based authentication credentials, or to control how the site is rendered to the user; other attacks are also possible. 
IFOBS XSS-1.html  
 IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua      IFOBS XSS-2.html   IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua      IFOBS XSS-3.html   IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua      IFOBS XSS-4.html   IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua      IFOBS XSS-5.html   IFOBS XSS exploit (C) 2012 MustLive. http://websecurity.com.ua