Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FC791FD-B20C-4428-82A0-0E8174B8AB03", "versionEndIncluding": "13.050.02.000", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:*:*:pro:*:*:*:*:*", "matchCriteriaId": "628B8A80-E06B-4C8A-BC89-AAF760F28B89", "versionEndIncluding": "13.050.02.000", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:*:*:*:*:*:*:*:*", "matchCriteriaId": "9562CF49-A540-4EA5-9120-B7DC007ED78C", "versionEndIncluding": "14.050.02.000", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:*:*:pro:*:*:*:*:*", "matchCriteriaId": "4F7027CD-45A4-4759-AAA4-6B069DD2ED38", "versionEndIncluding": "14.050.02.000", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The httpd.conf file in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 configures port 443 to be always active, which has unknown impact and remote attack vectors."}, {"lang": "es", "value": "El fichero httpd.conf en Xerox WorkCentre y WorkCentre Pro anterior a 12.050.03.000, 13.x anterior a 13.050.03.000, y 14.x anterior a 14.050.03.000 configura el puerto 443 para estar siempre activo, lo cual tiene impacto y vectores de ataque remotos desconocidos."}], "id": "CVE-2006-6472", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2006-12-11T18:28:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/23265"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/23265"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}