Description
It was determined that your web application is performing Python object deserialization (using the pickle library) of user-supplied data. Arbitrary object deserialization is inherently unsafe, and should never be performed on untrusted data. Consult Web references section for more information about this issue.
Remediation
The pickle module is not intended to be secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source.
References
Related Vulnerabilities
PHP mail function ASCII control character header spoofing vulnerability
WordPress Plugin WP eCommerce 'collected_data[]' SQL Injection (3.8.4)
WordPress Plugin WordPress Photo Gallery by Gallery Bank SQL Injection (3.0.229)
WordPress Plugin WP eCommerce 'wpsc-transaction_results_functions.php' SQL Injection (3.8.7.5)