Language:
https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html
https://resources.infosecinstitute.com/10-steps-avoid-insecure-deserialization/#gref
https://www.owasp.org/index.php/Deserialization_of_untrusted_data
Severity: Critical
ID: 98780
Type: remote
Family: Web Applications
Published: 10/7/2020
Updated: 12/1/2023
Scan Template: api, pci, scan
Risk Factor: High
Score: 7.5
Risk Factor: High
Base Score: 7.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS Score Source: Tenable
Risk Factor: Critical
Base Score: 9
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Score Source: Tenable
Risk Factor: Critical
Base Score: 9.2
Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score Source: Tenable
Exploit Available: true
CWE: 502
OWASP: 2010-A4, 2013-A4, 2017-A8, 2021-A8
WASC: Improper Input Handling
CAPEC: 586
DISA STIG: APSC-DV-002560
HIPAA: 164.306(a)(1), 164.306(a)(2)
ISO: 27001-A.14.2.5
NIST: sp800_53-SI-10(5)
OWASP API: 2019-API8
OWASP ASVS: 4.0.2-5.5.1
PCI-DSS: 3.2-6.5.1