As soon as I finished installing RC1 I started receiving these emails every 5 minutes about a possible attack. Can someone please let me know what is wrong and how do I fix it. Thanks
-------------
otal impact: 44
Affected tags: xss, csrf
Variable: REQUEST.newrecord | Value: sound awesome respect!, <a href=\"http://ragga-jungle.com/index.php?showuser=13195\">Buy Flexeril Online</a>, 479, <a href=\"http://www.immihelp.com/forum/member.php?u=81685\">Buy Zithromax Online</a>, %]]], <a href=\"http://showhype.com/profile/Wellbutrin_Bupropion/\"> </a>, 8-D, <a href=\"http://www.immihelp.com/forum/member.php?u=81907\"> </a>, 572299, <a href=\"http://getsatisfaction.com/people/esgic_plus\">buy Esgic Plus</a>, xfxvyh, <a href=\"http://community.icontact.com/users/ordereffexor\"> </a>, :(((, <a href=\"http://boards.sonypictures.com/boards/member.php?u=75002\">Buy Amoxicillin Online</a>, wavaf, <a href=\"http://ragga-jungle.com/index.php?showuser=13339\">Buy Ultram Online</a>, >:-OO, <a href=\"http://www.ami-imaging.org/forums/member.php?u=18401\">buy Prozac</a>, 7183,
Impact: 22 | Tags: xss, csrf
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects self-executing JavaScript functions | Tags: xss, csrf | ID: 8
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Variable: POST.newrecord | Value: sound awesome respect!, <a href=\"http://ragga-jungle.com/index.php?showuser=13195\">Buy Flexeril Online</a>, 479, <a href=\"http://www.immihelp.com/forum/member.php?u=81685\">Buy Zithromax Online</a>, %]]], <a href=\"http://showhype.com/profile/Wellbutrin_Bupropion/\"> </a>, 8-D, <a href=\"http://www.immihelp.com/forum/member.php?u=81907\"> </a>, 572299, <a href=\"http://getsatisfaction.com/people/esgic_plus\">buy Esgic Plus</a>, xfxvyh, <a href=\"http://community.icontact.com/users/ordereffexor\"> </a>, :(((, <a href=\"http://boards.sonypictures.com/boards/member.php?u=75002\">Buy Amoxicillin Online</a>, wavaf, <a href=\"http://ragga-jungle.com/index.php?showuser=13339\">Buy Ultram Online</a>, >:-OO, <a href=\"http://www.ami-imaging.org/forums/member.php?u=18401\">buy Prozac</a>, 7183,
Impact: 22 | Tags: xss, csrf
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects self-executing JavaScript functions | Tags: xss, csrf | ID: 8
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Centrifuge detection data Threshold: --- Ratio: --- Converted: ((++::
REMOTE_ADDR: 85.10.199.83
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP: