4 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

The default configuration of Xerox DocuTech 6110 and DocuTech 6115 running Solaris 8.0 has a large number of unnecessary services enabled such as RPC and sprayd, which could allow remote attackers to obtain access to the device. • http://online.securityfocus.com/archive/1/273029 http://totally.righteous.net/jedgar/overview_of_security.pdf http://www.iss.net/security_center/static/9108.php http://www.securityfocus.com/bid/4765 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

The default configuration of Xerox DocuTech 6110 and DocuTech 6115 exports certain NFS shares to the world with world writable permissions, which may allow remote attackers to modify sensitive files. • http://online.securityfocus.com/archive/1/273029 http://online.securityfocus.com/archive/1/273089 http://totally.righteous.net/jedgar/overview_of_security.pdf http://www.iss.net/security_center/static/9108.php http://www.securityfocus.com/bid/4765 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

The default configurations for DocuTech 6110 and DocuTech 6115 have a default administrative password of (1) "service!" on Solaris 8.0 or (2) "administ" on Windows NT, which allows remote attackers to gain privileges. • http://online.securityfocus.com/archive/1/273029 http://online.securityfocus.com/archive/1/273078 http://online.securityfocus.com/archive/1/273079 http://online.securityfocus.com/archive/1/273089 http://www.iss.net/security_center/static/9108.php http://www.securityfocus.com/bid/4765 http://www.securityfocus.com/bid/4766 •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

The default configuration of Xerox DocuTech 6110 and DocuTech 6115 allows remote attackers to connect to the web server and (1) submit print jobs directly into the "print now" queue or (2) read the scanner job history. • http://online.securityfocus.com/archive/1/273029 http://online.securityfocus.com/archive/1/273078 http://www.iss.net/security_center/static/9108.php http://www.securityfocus.com/bid/4766 •