Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docutech 6110 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2002-1834
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 allows remote malicious users to connect to the web server and (1) submit print jobs directly into the "print now" queue or (2) read the scanner job history.
Xerox Docutech 6115
Xerox Docutech 6110
7.5
CVSSv2
CVE-2002-1835
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 running Solaris 8.0 has a large number of unnecessary services enabled such as RPC and sprayd, which could allow remote malicious users to obtain access to the device.
Xerox Docutech 6115
Xerox Docutech 6110
5
CVSSv2
CVE-2002-1836
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 exports certain NFS shares to the world with world writable permissions, which may allow remote malicious users to modify sensitive files.
Xerox Docutech 6110
Xerox Docutech 6115
7.5
CVSSv2
CVE-2002-1833
The default configurations for DocuTech 6110 and DocuTech 6115 have a default administrative password of (1) "service!" on Solaris 8.0 or (2) "administ" on Windows NT, which allows remote malicious users to gain privileges.
Xerox Docutech 6110
Xerox Docutech 6115
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started