Yonyou NC Cloud harnesses the next-generation technologies to create an integrated platform that enables the digitalization of enterprise management.Attackers can upload deserialization object to execute malicious command.This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None