I guess it actually worked. I just received this email.....
Total impact: 19<br/>
Affected tags: xss, csrf, sqli, id, lfi<br/>
<br/>
Variable: POST.DescriptionMe.0 | Value: My name's
Virgilio Shore but everybody calls me Virgilio.
I'm from Iceland. I'm studying at the college (2nd
year) and I
play the Pedal Steel Guitar for 8 years. Usually I
choose music from my famous films
:).
I have two sister. I like Antiquities, watching TV
(NCIS) and Painting.
Feel free to visit myy web site - <a
href="removedtobreaklink://tokki.cocolog-nifty.com/blog/2014/03/post-33eb.html">gaming
updates</a><br/>
Impact: 19 | Tags: xss, csrf, sqli, id, lfi<br/>
Description: finds html breaking injections
including whitespace attacks | Tags: xss, csrf |
ID: 1<br/>
Description: finds attribute breaking injections
including whitespace attacks | Tags: xss, csrf |
ID: 2<br/>
Description: Detects obfuscated script tags and
XML wrapped HTML | Tags: xss | ID: 33<br/>
Description: Detects basic SQL authentication
bypass attempts 2/3 | Tags: sqli, id, lfi | ID:
45<br/>
<br/>
REMOTE_ADDR: 81.4.125.166
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME:
/var/pathto/towtalk.net/httpdocs/join.php
QUERY_STRING:
REQUEST_URI: /join.php
QUERY_STRING:
SCRIPT_NAME: /join.php
PHP_SELF: /join.php