Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object.
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization
www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
www.securityfocus.com/bid/78872
arxiv.org/pdf/2306.05534
github.com/apache/commons-collections
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2015-6420
www.kb.cert.org/vuls/id/581311
www.tenable.com/security/research/tra-2017-14
www.tenable.com/security/research/tra-2017-23