Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docutech 6115 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-1835
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 running Solaris 8.0 has a large number of unnecessary services enabled such as RPC and sprayd, which could allow remote malicious users to obtain access to the device.
Xerox Docutech 6115
Xerox Docutech 6110
5
CVSSv2
CVE-2002-1836
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 exports certain NFS shares to the world with world writable permissions, which may allow remote malicious users to modify sensitive files.
Xerox Docutech 6110
Xerox Docutech 6115
7.5
CVSSv2
CVE-2002-1833
The default configurations for DocuTech 6110 and DocuTech 6115 have a default administrative password of (1) "service!" on Solaris 8.0 or (2) "administ" on Windows NT, which allows remote malicious users to gain privileges.
Xerox Docutech 6110
Xerox Docutech 6115
6.4
CVSSv2
CVE-2002-1834
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 allows remote malicious users to connect to the web server and (1) submit print jobs directly into the "print now" queue or (2) read the scanner job history.
Xerox Docutech 6115
Xerox Docutech 6110
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3400
CVE-2023-7252
CVE-2024-21111
denial of service
CVE-2024-29661
CVE-2024-22856
remote attackers
encryption
CVE-2023-38299
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started