Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
https://www.tenable.com/blog/oracle-critical-patch-update-for-october-contains-180-fixes
https://www.tenable.com/blog/oracle-critical-patch-update-for-april-contains-297-fixes
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451
https://security.gentoo.org/glsa/201710-28
https://security-tracker.debian.org/tracker/CVE-2016-4000
https://hg.python.org/jython/rev/d06e29d100c0
https://hg.python.org/jython/file/v2.7.1rc1/NEWS
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859
http://www.securityfocus.com/bid/105647
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html