security attack was stopped!

I received the following msg:

Total impact: 5
Affected tags: Command Execution, id

Variable: GET.bubbles | Value: AddContent:NaN,Mail:0,Friends:

0,Shopping Cart:0,
Impact: 5 | Tags: Command Execution, id
Description: Detects remote code exectuion tests. Will match "ping -n 3 localhost" and "ping localhost -n 3"  | Tags: Command Execution, id | ID: 74

REMOTE_ADDR: 98.248.214.50
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /kunden/homepages/15/d244096630/htdocs/v71xhamifratz/member_menu_queries.php
QUERY_STRING: action=get_bubbles_values&bubbles=AddContent%3ANaN%2CMail%3A0%2CFriends%3A0%2CShopping+Cart%3A0%2C&_r=0.04550111677725088
REQUEST_URI: /member_menu_queries.php?action=get_bubbles_values&bubbles=AddContent%3ANaN%2CMail%3A0%2CFriends%3A0%2CShopping+Cart%3A0%2C&_r=0.04550111677725088
QUERY_STRING: action=get_bubbles_values&bubbles=AddContent%3ANaN%2CMail%3A0%2CFriends%3A0%2CShopping+Cart%3A0%2C&_r=0.04550111677725088
SCRIPT_NAME: /member_menu_queries.php
PHP_SELF: /member_menu_queries.php
 
Any clue what does it mean and should I do something??
Quote · 12 Sep 2013

See this post.

http://www.boonex.com/forums/topic/security-attack-was-stopped-2013-09-04.htm

https://www.deanbassett.com
Quote · 12 Sep 2013
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.