<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T08:12:04.282746+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/236476d9-9f64-4e23-8f5e-fa9492c06f04/export</id>
    <title>236476d9-9f64-4e23-8f5e-fa9492c06f04</title>
    <updated>2026-05-07T08:12:04.678646+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "236476d9-9f64-4e23-8f5e-fa9492c06f04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45593", "type": "seen", "source": "https://t.me/cvedetector/5262", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45593 - Nix Arbitrary File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45593 \nPublished : Sept. 10, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Nix is a package manager for Linux and other Unix systems. A bug in Nix 2.24 prior to 2.24.6 allows a substituter or malicious user to craft a NAR that, when unpacked by Nix, causes Nix to write to arbitrary file system locations to which the Nix process has access. This will be with root permissions when using the Nix daemon. This issue is fixed in Nix 2.24.6. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T19:15:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/236476d9-9f64-4e23-8f5e-fa9492c06f04/export"/>
    <published>2024-09-10T19:15:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/67bdd96b-8844-4b02-b52e-c3e630116001/export</id>
    <title>67bdd96b-8844-4b02-b52e-c3e630116001</title>
    <updated>2026-05-07T08:12:04.678557+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "67bdd96b-8844-4b02-b52e-c3e630116001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45593", "type": "seen", "source": "https://t.me/CyberBulletin/720", "content": "\u26a1\ufe0fCritical Flaw in NixOS Package Manager: CVE-2024-45593 Allows Arbitrary File Write with Root Permissions.\n\n#CyberBulletin", "creation_timestamp": "2024-09-16T09:16:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/67bdd96b-8844-4b02-b52e-c3e630116001/export"/>
    <published>2024-09-16T09:16:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a47b42ac-e5ac-4a8e-ba38-a1153891090b/export</id>
    <title>a47b42ac-e5ac-4a8e-ba38-a1153891090b</title>
    <updated>2026-05-07T08:12:04.678455+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a47b42ac-e5ac-4a8e-ba38-a1153891090b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45593", "type": "seen", "source": "https://t.me/CyberBulletin/25559", "content": "\u26a1\ufe0fCritical Flaw in NixOS Package Manager: CVE-2024-45593 Allows Arbitrary File Write with Root Permissions.\n\n#CyberBulletin", "creation_timestamp": "2024-09-16T09:16:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a47b42ac-e5ac-4a8e-ba38-a1153891090b/export"/>
    <published>2024-09-16T09:16:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/709f65aa-fb6f-4296-a5a5-53d56c1a5b00/export</id>
    <title>709f65aa-fb6f-4296-a5a5-53d56c1a5b00</title>
    <updated>2026-05-07T08:12:04.678323+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "709f65aa-fb6f-4296-a5a5-53d56c1a5b00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45593", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/13184", "content": "\u200aCritical Flaw in NixOS Package Manager: CVE-2024-45593 Allows Arbitrary File Write with Root Permissions\n\nhttps://securityonline.info/critical-flaw-in-nixos-package-manager-cve-2024-45593-allows-arbitrary-file-write-with-root-permissions/", "creation_timestamp": "2024-09-16T14:39:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/709f65aa-fb6f-4296-a5a5-53d56c1a5b00/export"/>
    <published>2024-09-16T14:39:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9f471a3a-41f1-4e93-92bd-ea35b9e35b39/export</id>
    <title>9f471a3a-41f1-4e93-92bd-ea35b9e35b39</title>
    <updated>2026-05-07T08:12:04.673953+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9f471a3a-41f1-4e93-92bd-ea35b9e35b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45593", "type": "seen", "source": "https://t.me/codeby_sec/8388", "content": "\u2753 \u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0434\u0432\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Performance Co-Pilot (PCP). \u041f\u0435\u0440\u0432\u0430\u044f, CVE-2024-45770, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0443\u0442\u0438\u043b\u0438\u0442\u043e\u0439 pmpost \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root, \u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u0435\u0441\u043b\u0438 \u0443 \u043d\u0438\u0445 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u0412\u0442\u043e\u0440\u0430\u044f, CVE-2024-45769, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 pcmd \u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 PCP 6.3.1 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043e\u0431\u0430 \u0440\u0438\u0441\u043a\u0430.\n\n\u23fa\ufe0f\u0422\u0430\u043a\u0436\u0435 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Nix (CVE-2024-45593), \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u0430\u0440\u0445\u0438\u0432\u044b NAR \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0432 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 Nix 2.24.6.\n\n\ud83c\udf1a \u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435\u0441\u044c, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.", "creation_timestamp": "2024-09-26T10:10:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9f471a3a-41f1-4e93-92bd-ea35b9e35b39/export"/>
    <published>2024-09-26T10:10:56+00:00</published>
  </entry>
</feed>
