<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-24T05:27:55.909271+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ebc98c2b-9bbc-4f07-8d09-817cdc9d619b/export</id>
    <title>ebc98c2b-9bbc-4f07-8d09-817cdc9d619b</title>
    <updated>2026-05-24T05:27:56.272488+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ebc98c2b-9bbc-4f07-8d09-817cdc9d619b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6010", "type": "seen", "source": "https://t.me/cvedetector/5020", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6010 - WordPress Cost Calculator Builder PRO Unauthenticated Price Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-6010 \nPublished : Sept. 7, 2024, 12:15 p.m. | 41\u00a0minutes ago \nDescription : The Cost Calculator Builder PRO plugin for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.1.96. This is due to the plugin allowing the price field to be manipulated prior to processing via the 'create_cc_order' function, called from the Cost Calculator Builder plugin. This makes it possible for unauthenticated attackers to manipulate the price of orders submitted via the calculator. Note: this vulnerability was partially patched with the release of Cost Calculator Builder version 3.2.17. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T15:09:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ebc98c2b-9bbc-4f07-8d09-817cdc9d619b/export"/>
    <published>2024-09-07T15:09:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/409d576c-9bef-4ba9-87b6-d0d58a573151/export</id>
    <title>409d576c-9bef-4ba9-87b6-d0d58a573151</title>
    <updated>2026-05-24T05:27:56.265760+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "409d576c-9bef-4ba9-87b6-d0d58a573151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6010", "type": "seen", "source": "https://t.me/HackerArsenal/293", "content": "\u203c\ufe0f CVE-2024-6010 \u203c\ufe0f\n\nThe Cost Calculator Builder PRO plugin for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.1.96. This is due to the plugin allowing the price field to be manipulated prior to processing via the 'createccorder' function, called from the Cost Calculator Builder plugin. This makes it possible for unauthenticated attackers to manipulate the price of orders submitted via the calculator. Note this vulnerability was partially patched with the release of Cost Calculator Builder version 3.2.17.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"National Vulnerability Database\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity_CVEs", "creation_timestamp": "2024-09-07T16:30:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/409d576c-9bef-4ba9-87b6-d0d58a573151/export"/>
    <published>2024-09-07T16:30:38+00:00</published>
  </entry>
</feed>
