OWASP Top Ten 2017 - A8 Insecure Deserialization

owasp-a8

Insecure deserialization often leads to remote code execution vulnerabilities.

Even if deserialization vulnerabilities do not result in remote code execution, they can be used to perform replay attacks, injection attacks, and privilege escalation.

OWASP Top 10 Application Security Risks - 2017 Reference
A8:2017-Insecure Deserialization OWASP

Most of the time, serialization is used as a quick and easy way to save, reload, or transmit data structures that can be represented in a simpler and less dangerous way.

The secret to application security is having defined interfaces for handling data, and deserialization does not fit this practice.

Francesco Ongaro

Request more information about this

Or call us at
(+39) 045 4853232


Recent Posts

Visit the blog


Popular Tags


🎉 We want to talk to you! Book an appointment!