CrossSiteScriptingValidation.NET 4.0 uses the IsDangerousString method to meet these conditions:
If a single occurrence <or is at the end of the mail data, then it is safe. If <follows az, AZ, / ,? or! it is not safe. If # (octotorp!) Also follows, then this is unsafe.
This regex in javascript should work:
/^(?!(.|\n)*<[a-z!\/?])(?!(.|\n)*&