Filtered by vendor Creativeinteractivemedia
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-12620 | 1 Creativeinteractivemedia | 1 Animategl Animations | 2025-02-24 | 5.3 Medium |
The AnimateGL Animations for WordPress – Elementor & Gutenberg Blocks Animations plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'agl_json' AJAX action in all versions up to, and including, 1.4.23. This makes it possible for unauthenticated attackers to update the plugin's settings. | ||||
CVE-2024-37215 | 1 Creativeinteractivemedia | 1 Transition Slider | 2024-11-21 | 5.9 Medium |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in creativeinteractivemedia Transition Slider – Responsive Image Slider and Gallery allows Stored XSS.This issue affects Transition Slider – Responsive Image Slider and Gallery: from n/a through 2.20.3. | ||||
CVE-2016-10967 | 1 Creativeinteractivemedia | 1 Real3d Flipbook | 2024-11-21 | 6.1 Medium |
The real3d-flipbook-lite plugin 1.0 for WordPress has XSS via the wp-content/plugins/real3d-flipbook/includes/flipbooks.php bookId parameter. | ||||
CVE-2016-10966 | 1 Creativeinteractivemedia | 1 Real3d Flipbook | 2024-11-21 | 7.5 High |
The real3d-flipbook-lite plugin 1.0 for WordPress has bookName=../ directory traversal for file upload. | ||||
CVE-2016-10965 | 1 Creativeinteractivemedia | 1 Real3d Flipbook | 2024-11-21 | 7.5 High |
The real3d-flipbook-lite plugin 1.0 for WordPress has deleteBook=../ directory traversal for file deletion. | ||||
CVE-2024-9849 | 1 Creativeinteractivemedia | 1 Real3d Flipbook | 2024-11-19 | 8.8 High |
The 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'r3dfb_save_thumbnail_callback' function in all versions up to, and including, 4.6. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. |
Page 1 of 1.