Xerox

Workplace Suite

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.36%
  • Veröffentlicht 27.01.2025 12:15:27
  • Zuletzt bearbeitet 30.01.2026 21:30:11

Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user's session is compromised.  The patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be no...

  • EPSS 0.16%
  • Veröffentlicht 23.01.2025 18:15:32
  • Zuletzt bearbeitet 28.02.2026 01:22:35

Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption

  • EPSS 0.29%
  • Veröffentlicht 23.01.2025 18:15:32
  • Zuletzt bearbeitet 30.01.2026 21:29:46

A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources.

  • EPSS 0.12%
  • Veröffentlicht 23.01.2025 18:15:32
  • Zuletzt bearbeitet 30.01.2026 21:30:28

Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files

  • EPSS 0.55%
  • Veröffentlicht 23.01.2025 18:15:31
  • Zuletzt bearbeitet 28.02.2026 01:20:33

A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data

  • EPSS 0.15%
  • Veröffentlicht 23.01.2025 18:15:31
  • Zuletzt bearbeitet 28.02.2026 01:21:42

A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions.

  • EPSS 0.09%
  • Veröffentlicht 23.01.2025 17:15:15
  • Zuletzt bearbeitet 28.02.2026 01:19:44

In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gai...