It was determined that your web application is performing PHP object deserialization of user-supplied data. Arbitrary object deserialization is inherently unsafe, and should never be performed on untrusted data. Consult Web references section for more information about this issue.
PHP object deserialization should not be performed on user-supplied data. Do not use the unserialize() function with user-supplied input, use JSON functions instead.
Apache Tomcat JK connector security bypass
WordPress Plugin Login by Auth0 Multiple Vulnerabilities (3.11.3)
WordPress Plugin A. Gallery TimThumb Arbitrary File Upload (0.9rev378511)
Deserialization of Untrusted Data (Java JSON Deserialization) Genson
WordPress Plugin Advanced Order Export For WooCommerce CSV Injection (1.5.4)