This document discusses PHP unserialization vulnerabilities. It begins with an introduction to PHP classes, objects, serialization and unserialization. It explains that unserialization can be exploited if an attacker can influence the input and trigger malicious code through PHP magic methods like __destruct or __wakeup. Two examples of exploits are shown using the __destruct and __wakeup methods. The document concludes with mitigation strategies like using the options parameter in PHP7's unserialize function and avoiding unserialization of user input.