Possible attack!!! All data has been collected and

"Possible attack!!! All data has been collected and sent to the site owner for analysis"

 

clicking "login" button from all the top menu pages, gives me this error.

 

this security measure is all over the place...

 

please.

 

Quote · 31 Oct 2009

I got a possible attak through my email today here's the day :

Total impact: 20
Affected tags: xss, csrf

Variable: REQUEST.Check | Value: return ( preg_match( \'/^[a-zA-Z0-9_-]+$/\', $arg0 ) and !file_exists( $dir[\'root\'] . $arg0 ) );
Impact: 10 | Tags: xss, csrf
Description: Detects self-executing JavaScript functions | Tags: xss, csrf | ID: 8
Description: Detects obfuscated JavaScript script injections | Tags: xss, csrf | ID: 25

Variable: POST.Check | Value: return ( preg_match( \'/^[a-zA-Z0-9_-]+$/\', $arg0 ) and !file_exists( $dir[\'root\'] . $arg0 ) );
Impact: 10 | Tags: xss, csrf
Description: Detects self-executing JavaScript functions | Tags: xss, csrf | ID: 8
Description: Detects obfuscated JavaScript script injections | Tags: xss, csrf | ID: 25
Centrifuge detection data Threshold: 3.49 Ratio: 3.36842105263

REMOTE_ADDR: **************
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:

Proud Hosted by Zarconia.net
Quote · 31 Oct 2009

Yahooo I have made fix for this bug! its works for me...i hope its work for u as well

download this file and replace it with: /DOLPHIN DIRECTORY/inc/security.inc.php

http://www.mediafire.com/?hciyinnjn20

Quote · 12 Nov 2009

Works for me...

Quote · 9 Jul 2014
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.