Urgent - Possible Attack

As soon as I finished installing RC1 I started receiving these emails every 5 minutes about a possible attack. Can someone please let me know what is wrong and how do I fix it. Thanks

-------------

otal impact: 44
Affected tags: xss, csrf

Variable: REQUEST.newrecord | Value: sound awesome respect!, <a href=\"http://ragga-jungle.com/index.php?showuser=13195\">Buy Flexeril Online</a>,  479, <a href=\"http://www.immihelp.com/forum/member.php?u=81685\">Buy Zithromax Online</a>,  %]]], <a href=\"http://showhype.com/profile/Wellbutrin_Bupropion/\"> </a>,  8-D, <a href=\"http://www.immihelp.com/forum/member.php?u=81907\"> </a>, 572299, <a href=\"http://getsatisfaction.com/people/esgic_plus\">buy Esgic Plus</a>,  xfxvyh, <a href=\"http://community.icontact.com/users/ordereffexor\"> </a>,  :(((, <a href=\"http://boards.sonypictures.com/boards/member.php?u=75002\">Buy Amoxicillin Online</a>,  wavaf, <a href=\"http://ragga-jungle.com/index.php?showuser=13339\">Buy Ultram Online</a>,  >:-OO, <a href=\"http://www.ami-imaging.org/forums/member.php?u=18401\">buy Prozac</a>,  7183, 
Impact: 22 | Tags: xss, csrf
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects self-executing JavaScript functions | Tags: xss, csrf | ID: 8
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33

Variable: POST.newrecord | Value: sound awesome respect!, <a href=\"http://ragga-jungle.com/index.php?showuser=13195\">Buy Flexeril Online</a>,  479, <a href=\"http://www.immihelp.com/forum/member.php?u=81685\">Buy Zithromax Online</a>,  %]]], <a href=\"http://showhype.com/profile/Wellbutrin_Bupropion/\"> </a>,  8-D, <a href=\"http://www.immihelp.com/forum/member.php?u=81907\"> </a>, 572299, <a href=\"http://getsatisfaction.com/people/esgic_plus\">buy Esgic Plus</a>,  xfxvyh, <a href=\"http://community.icontact.com/users/ordereffexor\"> </a>,  :(((, <a href=\"http://boards.sonypictures.com/boards/member.php?u=75002\">Buy Amoxicillin Online</a>,  wavaf, <a href=\"http://ragga-jungle.com/index.php?showuser=13339\">Buy Ultram Online</a>,  >:-OO, <a href=\"http://www.ami-imaging.org/forums/member.php?u=18401\">buy Prozac</a>,  7183, 
Impact: 22 | Tags: xss, csrf
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects self-executing JavaScript functions | Tags: xss, csrf | ID: 8
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Centrifuge detection data  Threshold: ---  Ratio: ---  Converted: ((++::

REMOTE_ADDR: 85.10.199.83
HTTP_X_FORWARDED_FOR: 
HTTP_CLIENT_IP:

Quote · 18 Nov 2009

Please use the search function, there are a number of topics on this.  Check out the last post from AlexT in the following post to solve the problem:

http://www.boonex.com/unity/forums/topic/Urgent-Possible-Attack.htm#topic/Are-you-still-getting-Possible-Attacks-Try-This-.htm

Quote · 18 Nov 2009
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.