{"uuid": "50a04439-0891-45ed-8d19-5fcb1bf7e589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10750", "type": "seen", "source": "https://t.me/arpsyndicate/2611", "content": "#ExploitObserverAlert\n\nCVE-2016-10750\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2016-10750. In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.\n\nFIRST-EPSS: 0.026100000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2024-01-07T04:08:28.000000Z"}