security attack was stopped

Does anyone know what this issue is as in what direct action could cause this issue?

 

Total impact: 49
Affected tags: xss, csrf, id, rfe, sqli, lfi

Variable: COOKIE.CFCLIENT_BNO | Value: user_name=#
Impact: 3 | Tags: xss, csrf, id
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35

Variable: COOKIE.CFCLIENT_HERBALCOACH | Value: web_user_id=8EB4E9BA-1422-1091-8008B11D0BCDDAF2#
Impact: 3 | Tags: xss, csrf, id
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35

Variable: COOKIE.CFCLIENT_KILLPHIL | Value: isabot=No#istrial=false#customerid=0#
Impact: 12 | Tags: xss, csrf, id, rfe
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects common XSS concatenation patterns 2/2 | Tags: xss, csrf, id, rfe | ID: 31
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35

Variable: COOKIE.CFCLIENT_LOOMIS | Value: browseback=1#lastid=1#device=other#os=Win#browsercode=M#mobilesite=false#mimetype=text/html#versi alt=0#
Impact: 8 | Tags: xss, csrf, id
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35

Variable: COOKIE.CFGLOBALS | Value: urltoken=CFID#=19518030&CFTOKEN#=7766204#lastvisit={ts \'2010-05-15 04:02:28\'}#timecreated={ts \'2010-05-14 20:02:02\'}#hitcount=13#cftoken=73899136#cfid=58123316#
Impact: 18 | Tags: xss, csrf, id, rfe, sqli, lfi
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects common XSS concatenation patterns 2/2 | Tags: xss, csrf, id, rfe | ID: 31
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43

Variable: COOKIE.__mmtrk | Value: 1|-1|||19|f0d112328383bb5d2a9faaace9efad9a
Impact: 5 | Tags: xss, csrf
Description: Detects obfuscated JavaScript script injections | Tags: xss, csrf | ID: 25
Centrifuge detection data  Threshold: 3.49  Ratio: 2.4

REMOTE_ADDR: 207.241.235.52
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /home/maddxwx/public_html/profile.php
QUERY_STRING: ID=robots.txt
REQUEST_URI: /robots.txt
QUERY_STRING: ID=robots.txt
SCRIPT_NAME: /profile.php
PHP_SELF: /profile.php

Quote · 15 May 2010

This look to me as a hack bot. 
Look at the ip number under into the message, there you can see if this is a strange ip or your own.

Kids first
Quote · 15 May 2010

Doesn't seem like anything much to worry about:

SCRIPT_FILENAME: /home/maddxwx/public_html/profile.php
QUERY_STRING: ID=robots.txt
REQUEST_URI: /robots.txt
QUERY_STRING: ID=robots.txt
SCRIPT_NAME: /profile.php
PHP_SELF: /profile.php

Something checked out profile.php and robots.txt that happens all day long everyday. No big deal. Unless there is something out of the ordinary going on this phpids junk is shooting you an error because your settings are so low. Not your fault it's dolphin's base suggestions are so piddly nobody can post anything without getting some kind of error without disabling the thing, which is what many have done.

I wouldn't worry about it too much.

DialMe.com - Your One and Only Source For Boonex Dolphin Tutorials and Resources
Quote · 15 May 2010
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.