Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
docutech 6115 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-1833
The default configurations for DocuTech 6110 and DocuTech 6115 have a default administrative password of (1) "service!" on Solaris 8.0 or (2) "administ" on Windows NT, which allows remote malicious users to gain privileges.
Xerox Docutech 6110
Xerox Docutech 6115
570
VMScore
CVE-2002-1834
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 allows remote malicious users to connect to the web server and (1) submit print jobs directly into the "print now" queue or (2) read the scanner job history.
Xerox Docutech 6115
Xerox Docutech 6110
668
VMScore
CVE-2002-1835
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 running Solaris 8.0 has a large number of unnecessary services enabled such as RPC and sprayd, which could allow remote malicious users to obtain access to the device.
Xerox Docutech 6115
Xerox Docutech 6110
445
VMScore
CVE-2002-1836
The default configuration of Xerox DocuTech 6110 and DocuTech 6115 exports certain NFS shares to the world with world writable permissions, which may allow remote malicious users to modify sensitive files.
Xerox Docutech 6110
Xerox Docutech 6115
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started