jackson-databind is vulnerable to arbitrary code execution. The vulnerability exists through the lack of sanitization of the javax.swing.JTextPane
class through deserialization.
bugzilla.redhat.com/show_bug.cgi?id=1916633
github.com/advisories/GHSA-5949-rw7g-wx7w
github.com/FasterXML/jackson-databind/issues/2854
lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E
lists.debian.org/debian-lts-announce/2021/04/msg00025.html
security.netapp.com/advisory/ntap-20210219-0008/
www.oracle.com//security-alerts/cpujul2021.html