Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Weekly Vulnerability Report: Cyble Urges Fixes in SolarWinds, Cisco, Ivanti & Microsoft

    Weekly Vulnerability Report: Cyble Urges Fixes in SolarWinds, Cisco, Ivanti & Microsoft

    July 29, 2024

    Cyble Research & Intelligence Labs (CRIL) researchers have analyzed more than 100 security vulnerabilities in the last two weeks, with flaws in IT products from SolarWinds, Cisco, Ivanti, Microsoft, Exim and GitLab warranting particularly close attention by security teams.

    To help security staff focus their patching and mitigation efforts on the most important threats, The Cyber Express partners with Cyble’s highly skilled dark web and threat intelligence researchers to highlight the vulnerabilities that are at higher risk of exploit and attack and should be prioritized.

    In this week’s vulnerability report, we’ll focus on 14 high-risk vulnerabilities, based on Cyble’s work since our last vulnerability update.

    Vulnerability Report: The Week’s Top Security Risks

    These are the 14 high-severity and critical vulnerabilities that Cyble researchers have highlighted recently.

    CVE-2024-29824: Ivanti Endpoint Manager

    Impact Analysis: A critical SQL Injection vulnerability in the Core server of Ivanti Endpoint Manager (EPM) 2022 SU5 allows an unauthenticated attacker within the same network to execute arbitrary code. With the availability of recently released public POC and exploit scripts, there are possibilities of exploitation of the vulnerability by threat actors (TAs) on a large scale.

    Internet Exposure? No

    Patch Available? Yes

    CVE-2024-23469, CVE-2024-23466, CVE-2024-23467, CVE-2024-28074, CVE-2024-23471, and CVE-2024-23470: SolarWinds ARM

    Impact Analysis: These critical vulnerabilities impact SolarWinds Access Rights Manager (ARM) software, a critical tool in enterprise environments that helps admins manage and audit access rights across their organization’s IT infrastructure to minimize threat impact. The flaws allow attackers without privileges to perform actions on unpatched systems by executing code or commands, with or without SYSTEM privileges, depending on the exploited flaw.

    Internet Exposure? No

    Patch Available? Yes

    CVE-2024-23475 and CVE-2024-23472: SolarWinds ARM

    Impact Analysis: In the same update, SolarWinds also addressed two critical directory traversal and information disclosure vulnerabilities in Access Rights Manager (ARM), which allow unauthenticated users to perform arbitrary file deletion and obtain sensitive information after accessing files or folders outside of restricted directories.

    Internet Exposure? No

    Patch Available? Yes

    CVE-2024-20401: Cisco Secure Email Gateway

    Impact Analysis: This critical vulnerability in Cisco Secure Email Gateway’s content scanning and message filtering features could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.

    Internet Exposure? No

    Patch Available? Yes

    CVE-2024-20419: Cisco Smart Software Manager On-Prem

    Impact Analysis: This 10.0 critical vulnerability in the authentication system of Cisco Smart Software Manager On-Prem (SSM On-Prem) license management solution could allow an unauthenticated, remote attacker to change the password of any user, including administrative users. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user.

    Internet Exposure? Yes

    Patch Available? Yes

    CVE-2024-38112: Microsoft MSHTML

    Impact Analysis: A high severity MSHTML platform spoofing vulnerability has been discovered impacting Microsoft’s Windows operating system. An attacker would have to send the victim a malicious file that the victim would need to execute to leverage the flaw. Researchers also disclosed that the zero-day vulnerability has been actively exploited in attacks for eighteen months to launch malicious scripts while bypassing built-in security features.

    Internet Exposure: No

    Patch Available? Yes

    CVE-2024-39929: Exim

    Impact Analysis: A medium severity vulnerability impacts Exim, a mail transfer agent (MTA). It occurs due to the incorrect parsing of multiline RFC2231 header filenames, which can let remote attackers deliver malicious executable attachments into end users’ mailboxes by circumventing the $mime_filename extension-blocking protection mechanism. With a large number of internet exposed instances and availability of proof of concept (POC), there are possibilities of exploitation of vulnerability by TAs in the future.

    Internet Exposure: Yes

    Patch? Follow progress at bugs.exim.org

    CVE-2024-6385: GitLab CE/EE

    Impact Analysis: A critical vulnerability is discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user under certain circumstances. Since the impacted product is utilized in multiple organizations worldwide, there are possibilities that the TAs could try to exploit vulnerability for illicit purposes.

    Internet Exposure? Yes

    Patch Available? Yes

    Dark Web Exploits, ICS Vulnerabilities & More

    The full Cyble report for subscribers also looks at 25 vulnerability exploits discussed on the dark web, 68 industrial control system (ICS) vulnerabilities, and the vulnerabilities with the highest number of web asset exposures, some numbering in the hundreds of thousands.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMalaysian Digital Ministry To Bolster National Cybersecurity Frameworks with Data Commission
    Next Article France Under Siege: Widespread Fiber Optic Cable Sabotage Disrupts Telecom Network

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Perficient Achieves AWS Glue Service Delivery Designation

    Development

    30+ Best Lightroom Presets for Stunning Portraits

    Learning Resources

    How Cyble is Leading the Fight Against Deepfakes with Real-Time Detection & Takedowns

    Development

    cheatshh – CLI tool to store commands

    Linux
    Hostinger

    Highlights

    Development

    Appium Inspector and Locating Elements for Mobile Automation

    April 21, 2024

    3. Appium Inspector and Locating ElementsAppium Inspector is a powerful tool that allows you to inspect and locate elements within a mobile application. In this tutorial, we will explore the Appium Inspector and learn how to locate elements using various strategies.

    3.1. Appium Inspector:i. Appium Inspector is a graphical user interface tool that provides a visual representation of the application’s user interface hierarchy.ii. It allows you to inspect and interact with individual elements within the app, making it easier to identify and locate elements for automation.3.2. Launching Appium Inspector:i. To launch the Appium Inspector, you need to start the Appium Server and ensure the desired capabilities are correctly configured.ii. Once the server is running, you can open the Appium Inspector either through the Appium Desktop application or by accessing the Inspector URL provided by the server.3.3. Inspecting Elements:i. In the Appium Inspector, you will see a representation of the application’s user interface, displaying the hierarchy of elements.ii. You can interact with the application directly in the Inspector by tapping on elements, scrolling, or performing other actions.iii. As you interact with the app, the Inspector highlights the corresponding element in the hierarchy, making it easier to identify and locate elements.3.4. Locating Elements:To automate interactions with elements, you need to locate them using appropriate strategies.
    Appium supports various element location strategies, including:ID: Locating elements using their unique IDs assigned by the application.Name: Locating elements using their displayed names.XPath: Locating elements using XPath expressions.CSS Selector: Locating elements using CSS selectors.Class Name: Locating elements using their class names.Accessibility ID: Locating elements using accessibility IDs assigned to elements.Find Element by IDTo find an element by its ID, you can use the findElementById() method of the driver object. For example:javaCopy codeMobileElement element = driver.findElementById(“com.example.app:id/button”);This will find an element with ID “button” and assign it to the “element” object.Find Element by NameTo find an element by its name, you can use the findElementByName() method of the driver object. For example:javaCopy codeMobileElement element = driver.findElementByName(“Button”);This will find an element with the name “Button” and assign it to the “element” object.Find Element by Class NameTo find an element by its class name, you can use the findElementByClassName() method of the driver object. For example:javaCopy codeMobileElement element = driver.findElementByClassName(“android.widget.Button”);This will find an element with the class name “android.widget.Button” and assign it to the “element” object.Find Element by Accessibility IDTo find an element by its accessibility ID, you can use the findElementByAccessibilityId() method of the driver object. For example:javaCopy codeMobileElement element = driver.findElementByAccessibilityId(“Button”);This will find an element with the accessibility ID “Button” and assign it to the “element” object.Find Element by XPathTo find an element by its XPath, you can use the findElementByXPath() method of the driver object. For example:javaCopy codeMobileElement element = driver.findElementByXPath(“//android.widget.Button[@text=’Login’]”);This will find an element with the text “Login” and assign it to the “element” object.Find Element by Custom AttributeYou can also find elements by their custom attributes using the findElementBy() method of the driver object. This method takes a MobileBy object as an argument, which is created using the MobileBy class. For example:javaCopy codeMobileElement element = driver.findElement(MobileBy.custom(“attribute”, “value”));This will find an element with a custom attribute “attribute” and a value of “value”, and assign it to the “element” object.3.5. Tools to Inspect Elements for AppiumTo inspect elements on a mobile application for Appium, you can use several tools that provide a visual representation of the application’s user interface and the elements on it. Here are some popular tools for inspecting elements on mobile applications:3.5.1. Appium DesktopAppium Desktop is a free and open-source tool that provides a graphical user interface (GUI) for Appium. It allows you to start and stop the Appium server, inspect elements on the mobile application, and create and execute test scripts. Appium Desktop provides a visual tree view of the application’s user interface, allowing you to select and inspect elements and view their properties.i. How to Use Appium Dekstop for inspecting elements?Appium Desktop is a tool that provides a graphical user interface (GUI) for Appium, making it easier to develop and test mobile applications. Here is a step-by-step guide on how to use Appium Desktop:Download and install Appium DesktopYou can download Appium Desktop from the official website: https://github.com/appium/appium-desktop/releases. Once you have downloaded the installation file, run it and follow the installation wizard to install Appium Desktop on your computer.Start the Appium serverLaunch Appium Desktop and click on the “Start Server” button. This will start the Appium server on your computer and display the logs in the console window.Create a new sessionClick on the “New Session” button to create a new session. This will open the “Desired Capabilities” window, where you can specify the settings for the session.Specify the desired capabilitiesIn the “Desired Capabilities” window, you can specify the settings for the session. These settings include the platform name, device name, app package and activity (for Android), app path (for iOS), and other options.For example, to test an Android application, you can specify the following desired capabilities:jsonCopy code{ “platformName”: “Android”, “deviceName”: “Android Emulator”, “appPackage”: “com.example.myapp”, “appActivity”: “.MainActivity” }Connect to the deviceTo connect to the device, you need to specify the IP address and port number of the Appium server. This can be done by clicking on the “Start Inspector Session” button.Inspect the elementsOnce you are connected to the device, Appium Desktop will display a visual representation of the application’s user interface. You can select individual elements by clicking on them, and Appium Desktop will display their properties.Run test scriptsOnce you have inspected the elements, you can use Appium Desktop to create and run test scripts. You can write the test scripts in any programming language supported by Appium (such as Java, Python, or JavaScript), and Appium Desktop will execute them on the connected device.3.5.2. UI Automator ViewerUI Automator Viewer is a tool provided by the Android SDK that allows you to inspect the elements of an Android application. It provides a hierarchical view of the application’s user interface and allows you to select and inspect individual elements. UI Automator Viewer can be launched from the command line or from Android Studio.3.5.3. Xcode’s Accessibility InspectorXcode’s Accessibility Inspector is a tool provided by Apple’s Xcode IDE that allows you to inspect the elements of an iOS application. It provides a hierarchical view of the application’s user interface and allows you to select and inspect individual elements. The Accessibility Inspector can be launched from Xcode’s “Developer Tools” menu.3.5.4. Selendroid InspectorSelendroid Inspector is a tool provided by the Selendroid project that allows you to inspect the elements of an Android application. It provides a graphical user interface that displays the elements of the application and allows you to select and inspect individual elements. Selendroid Inspector can be launched from the command line or from the Selendroid server.Overall, these tools provide a visual representation of the mobile application’s user interface and allow you to inspect and interact with the elements on it. They are essential for developing and testing mobile applications with Appium.Next >> Automating Native Mobile Apps with Appium CommandsAuthorVaneesh BehlPassionately writing and working in Tech Space for more than a decade.

    The best early Black Friday AirPods deals: Shop early deals

    November 4, 2024

    Russian Hackers Use Legit Remote Monitoring Software to Spy on Ukraine and Allies

    May 27, 2024

    Private Federated Learning In Real World Application – A Case Study

    February 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.