'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2026-01-14 | |
| Rule Name: | PHP Deserialization Detection | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Deserialization vulnerability refers to a security issue in which an application deserializes externally supplied data without proper validation, allowing attacker-crafted payloads to be executed and potentially leading to arbitrary code execution or system compromise. This rule detects suspicious PHP deserialization data. | |
| Impact: | An attacker can carefully construct malicious serialized data and pass it to the application, and execute the malicious code constructed by the attacker when the application deserializes the object. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Please contact the software vendor to update the software patch. |