Object Input Stream Insecure Deserialization High

It is often convenient to serialize objects for communication or to save them for later use. However, deserialized data or code can often be modified without using the provided accessor functions if it does not use cryptography to protect itself.

Detector ID
Common Weakness Enumeration (CWE) external icon