Filtered by vendor Creativeinteractivemedia Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-12620 1 Creativeinteractivemedia 1 Animategl Animations 2025-02-24 5.3 Medium
The AnimateGL Animations for WordPress – Elementor & Gutenberg Blocks Animations plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'agl_json' AJAX action in all versions up to, and including, 1.4.23. This makes it possible for unauthenticated attackers to update the plugin's settings.
CVE-2024-37215 1 Creativeinteractivemedia 1 Transition Slider 2024-11-21 5.9 Medium
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in creativeinteractivemedia Transition Slider – Responsive Image Slider and Gallery allows Stored XSS.This issue affects Transition Slider – Responsive Image Slider and Gallery: from n/a through 2.20.3.
CVE-2016-10967 1 Creativeinteractivemedia 1 Real3d Flipbook 2024-11-21 6.1 Medium
The real3d-flipbook-lite plugin 1.0 for WordPress has XSS via the wp-content/plugins/real3d-flipbook/includes/flipbooks.php bookId parameter.
CVE-2016-10966 1 Creativeinteractivemedia 1 Real3d Flipbook 2024-11-21 7.5 High
The real3d-flipbook-lite plugin 1.0 for WordPress has bookName=../ directory traversal for file upload.
CVE-2016-10965 1 Creativeinteractivemedia 1 Real3d Flipbook 2024-11-21 7.5 High
The real3d-flipbook-lite plugin 1.0 for WordPress has deleteBook=../ directory traversal for file deletion.
CVE-2024-9849 1 Creativeinteractivemedia 1 Real3d Flipbook 2024-11-19 8.8 High
The 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'r3dfb_save_thumbnail_callback' function in all versions up to, and including, 4.6. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.