CVE-2025-43720
- EPSS 0.04%
- Veröffentlicht 21.07.2025 17:15:37
- Zuletzt bearbeitet 07.08.2025 18:16:03
Headwind MDM before 5.33.1 makes configuration details accessible to unauthorized users. The Configuration profile is exposed to the Observer user role, revealing the password requires to escape out of the MDM controlled device's profile.
CVE-2023-47312
- EPSS 0.04%
- Veröffentlicht 22.11.2023 17:15:22
- Zuletzt bearbeitet 21.11.2024 08:30:08
Headwind MDM Web panel 5.22.1 is vulnerable to Incorrect Access Control due to Login Credential Leakage via Audit Entries.
CVE-2023-47313
- EPSS 0.13%
- Veröffentlicht 22.11.2023 17:15:22
- Zuletzt bearbeitet 21.11.2024 08:30:08
Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal. The application uses an API call to move the uploaded temporary file to the file directory during the file upload process. This API call receives two input parameters, such as path a...
CVE-2023-47314
- EPSS 0.08%
- Veröffentlicht 22.11.2023 17:15:22
- Zuletzt bearbeitet 21.11.2024 08:30:08
Headwind MDM Web panel 5.22.1 is vulnerable to cross-site scripting (XSS). The file upload function allows APK and arbitrary files to be uploaded. By exploiting this issue, attackers may upload HTML files and share the download URL pointing to these ...
CVE-2023-47315
- EPSS 0.07%
- Veröffentlicht 22.11.2023 17:15:22
- Zuletzt bearbeitet 21.11.2024 08:30:08
Headwind MDM Web panel 5.22.1 is vulnerable to Incorrect Access Control due to a hard-coded JWT Secret. The secret is hardcoded into the source code available to anyone on Git Hub. This secret is used to sign the application’s JWT token and verify th...
CVE-2023-47316
- EPSS 0.06%
- Veröffentlicht 22.11.2023 17:15:22
- Zuletzt bearbeitet 21.11.2024 08:30:09
Headwind MDM Web panel 5.22.1 is vulnerable to Incorrect Access Control. The Web panel allows users to gain access to potentially sensitive API calls such as listing users and their data, file management API calls and audit-related API calls.