{"uuid": "ef9fd7bc-ec1b-4b40-ab56-968dd5747495", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27364", "type": "seen", "source": "https://t.me/cvedetector/18831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27364 - Caldera Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27364 \nPublished : Feb. 24, 2025, 7:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T22:08:42.000000Z"}