Description: This event is generated when an attempt is made to exploit a known vulnerability on a web server or a web application resident on a web server.
Impact: Information gathering and system integrity compromise. Possible unauthorized administrative access to the server. Possible execution of arbitrary code of the attackers choosing in some cases.
Corrective: Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied. Check the host logfiles and application logs for signs of compromise.