Description: This event is generated when an attempt is made to exploit a weakness in a php application.
Impact: Arbitrary code execution.
Corrective: Check the php implementation on the host. Check the webserver log files for signs of this activity. Where possible, ensure the webserver is run as an unprivileged process. Check the host for signs of compromise.