{"uuid": "a85f8d7e-0552-43e8-9f5c-e5d58236f11f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36437", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11493", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-36437\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Connection handler in Hazelcast and Hazelcast Jet allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection. The affected Hazelcast versions are through 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3.\n\ud83d\udccf Published: 2022-12-29T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-11T22:46:33.774Z\n\ud83d\udd17 References:\n1. https://github.com/hazelcast/hazelcast/security/advisories/GHSA-c5hg-mr8r-f6jp", "creation_timestamp": "2025-04-11T22:51:19.000000Z"}