Cut and paste from an email sent to me from the Server:
=========
Total impact: 10
Affected tags: xss, csrf
Variable: REQUEST.topic_text | Value: <p>Thank you Anthony that is a good start! Wulf: Sorry was not going to bother you about it and I figured I would post it here so I could get different ideas. SO What is your input? What else can I have him look for?</p>
Impact: 5 | Tags: xss, csrf
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Variable: POST.topic_text | Value: <p>Thank you Anthony that is a good start! Wulf: Sorry was not going to bother you about it and I figured I would post it here so I could get different ideas. SO What is your input? What else can I have him look for?</p>
Impact: 5 | Tags: xss, csrf
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
REMOTE_ADDR: x.x.x.x
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /var/www/kz5/modules/boonex/forum/index.php
QUERY_STRING:
REQUEST_URI: /kz5/forum/
QUERY_STRING:
SCRIPT_NAME: /kz5/modules/boonex/forum/index.php
PHP_SELF: /kz5/modules/boonex/forum/index.php