Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2024-55931
Disclosure Date: January 27, 2025 (last updated January 28, 2025)
Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user's session is compromised.
The patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin.
0
Attacker Value
Unknown
CVE-2024-55930
Disclosure Date: January 23, 2025 (last updated January 27, 2025)
Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files
0
Attacker Value
Unknown
CVE-2024-55929
Disclosure Date: January 23, 2025 (last updated January 27, 2025)
A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources.
0
Attacker Value
Unknown
CVE-2024-55928
Disclosure Date: January 23, 2025 (last updated January 27, 2025)
Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption
0
Attacker Value
Unknown
CVE-2024-55927
Disclosure Date: January 23, 2025 (last updated January 27, 2025)
A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions.
0
Attacker Value
Unknown
CVE-2024-55926
Disclosure Date: January 23, 2025 (last updated January 27, 2025)
A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data
0
Attacker Value
Unknown
CVE-2024-55925
Disclosure Date: January 23, 2025 (last updated January 27, 2025)
In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints.
0