Access to databases, configuration files, and user credentials. Defacement: Changing the appearance of the website.
Hardcode base directories in your scripts so that users cannot traverse the file system. vdesk hangupphp3 exploit
By executing a "Web Shell," an attacker gains total control over the web server. Access to databases