Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      AI and its impact on the developer experience, or ‘where is the joy?’

      July 23, 2025

      Google launches OSS Rebuild tool to improve trust in open source packages

      July 23, 2025

      Atomic Design Certification Course

      July 24, 2025

      How to streamline GitHub API calls in Azure Pipelines

      July 24, 2025

      Reform Collective: A New Website, Designed to Be Seen

      July 24, 2025

      Motion Highlights #11

      July 24, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 24, 2025
      Recent

      The details of TC39’s last meeting

      July 24, 2025

      Building Scalable APIs with Node.js and TypeScript

      July 24, 2025

      What’s new in ECMAScript 2025

      July 24, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How to Open Control Panel in Windows 11

      July 24, 2025
      Recent

      How to Open Control Panel in Windows 11

      July 24, 2025

      How to Shut Down Windows 11

      July 24, 2025

      What is Digital Music?

      July 24, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2024-42699 – OpenCMS Cross-Site Scripting (XSS)

    CVE-2024-42699 – OpenCMS Cross-Site Scripting (XSS)

    April 21, 2025

    CVE ID : CVE-2024-42699

    Published : April 21, 2025, 3:15 p.m. | 3 hours, 47 minutes ago

    Description : Cross Site Scripting vulnerability in Create/Modify article function in Alkacon OpenCMS 17.0 allows remote attacker to inject javascript payload via image title sub-field in the image field

    Severity: 6.5 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2024-12863 – OpenText Content Management CE Stored Cross-Site Scripting Vulnerability
    Next Article CVE-2024-12862 – OpenText Content Server Unauthorized Deletion

    Related Posts

    Development

    UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

    July 24, 2025
    Development

    Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access

    July 24, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Rilasciato Labwc 0.9: Il compositore Wayland ispirato a Openbox

    Linux

    Build an MCP application with Mistral models on AWS

    Machine Learning

    I challenge you to find a better pair of budget wireless earbuds than this

    News & Updates

    CVE-2025-4965 – WordPress WPBakery Page Builder Stored Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-5685 – Tenda CH22 Stack-Based Buffer Overflow Vulnerability

    June 5, 2025

    CVE ID : CVE-2025-5685

    Published : June 5, 2025, 8:15 p.m. | 1 hour, 52 minutes ago

    Description : A vulnerability, which was classified as critical, was found in Tenda CH22 1.0.0.1. This affects the function formNatlimit of the file /goform/Natlimit. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-49852 – ControlID iDSecure Server-Side Request Forgery

    June 24, 2025

    This new tech could be for AI agents what HTML was to the open web

    May 19, 2025

    CVE-2025-23097 – Samsung Mobile Processor Exynos 1380 Out-of-Bounds Write Vulnerability

    June 3, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.