Intrusion Prevention



This indicates an attempt to use a malicious PHP page.
Most malicious PHP script is used to execute command within the privileges of the web applications. And some will be used to launch attack or send spam emails.

Affected Products

Any compromised PHP server


System Compromise: Remote attacker can gain control of vulnerable systems.

Recommended Actions

Remove malicious php file from the system.