Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

xerox

About This Vendor

xerox is a technology vendor producing software and infrastructure products. As a software provider, xerox's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of xerox's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 119 known vulnerabilities from xerox. This includes 22 critical-severity issues and 45 high-severity issues that represent significant risk. These vulnerabilities affect 443 distinct products across xerox's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1999 through 2026, indicating decades of continuous security attention and research. Organizations deploying xerox products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-1343 1999-10-13 2025-04-03 - 5.0 Likely
CVE-2001-1134 2001-08-09 2025-04-03 - 5.0 Likely
CVE-2002-1833 2002-12-31 2025-04-03 - 7.5 Likely
CVE-2002-1834 2002-12-31 2025-04-03 - 6.4 Likely
CVE-2002-1835 2002-12-31 2025-04-03 - 7.5 Likely
CVE-2002-1836 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2005-0703 2005-03-07 2025-04-03 - 5.0 Likely
CVE-2005-1179 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-1936 2005-06-13 2025-04-03 - 7.5 Likely
CVE-2005-2200 2005-07-11 2025-04-03 - 7.5 Likely
CVE-2005-2201 2005-07-11 2025-04-03 - 6.4 Likely
CVE-2005-2202 2005-07-11 2025-04-03 - 4.3 Likely
CVE-2005-2645 2005-08-23 2025-04-03 - 7.5 Likely
CVE-2005-2646 2005-08-23 2025-04-03 - 6.4 Likely
CVE-2005-2647 2005-08-23 2025-04-03 - 4.3 Likely
CVE-2006-0825 2006-02-21 2025-04-03 - 7.5 Likely
CVE-2006-0826 2006-02-21 2025-04-03 - 5.0 Likely
CVE-2006-0827 2006-02-21 2025-04-03 - 5.0 Likely
CVE-2006-0828 2006-02-21 2025-04-03 - 5.0 Likely
CVE-2006-1136 2006-03-10 2025-04-03 - 5.0 Likely
CVE-2006-1137 2006-03-10 2025-04-03 - 5.0 Likely
CVE-2006-1138 2006-03-10 2025-04-03 - 5.0 Likely
CVE-2006-1139 2006-03-10 2025-04-03 - 6.4 Likely
CVE-2006-5290 2006-10-13 2025-04-09 - 7.5 Likely
CVE-2006-6427 2006-12-10 2025-04-09 - 7.5 Likely
CVE-2006-6428 2006-12-10 2025-04-09 - 7.5 Likely
CVE-2006-6429 2006-12-10 2025-04-09 - 5.0 Likely
CVE-2006-6430 2006-12-10 2025-04-09 - 7.8 Likely
CVE-2006-6431 2006-12-10 2025-04-09 - 5.0 Likely
CVE-2006-6432 2006-12-10 2025-04-09 - 5.0 Likely
CVE-2006-6433 2006-12-10 2025-04-09 - 5.0 Likely
CVE-2006-6434 2006-12-10 2025-04-09 - 7.5 Likely
CVE-2006-6435 2006-12-10 2025-04-09 - 7.5 Likely
CVE-2006-6436 2006-12-10 2025-04-09 - 6.8 Likely
CVE-2006-6437 2006-12-10 2025-04-09 - 7.8 Likely
CVE-2006-6438 2006-12-10 2025-04-09 - 4.9 Unknown
CVE-2006-6439 2006-12-10 2025-04-09 - 7.8 Likely
CVE-2006-6440 2006-12-10 2025-04-09 - 7.5 Likely
CVE-2006-6441 2006-12-10 2025-04-09 - 4.6 Unknown
CVE-2006-6467 2006-12-11 2025-04-09 - 5.8 Unknown
CVE-2006-6468 2006-12-11 2025-04-09 - 5.8 Unknown
CVE-2006-6469 2006-12-11 2025-04-09 - 5.8 Unknown
CVE-2006-6470 2006-12-11 2025-04-09 - 10.0 Likely
CVE-2006-6471 2006-12-11 2025-04-09 - 10.0 Likely
CVE-2006-6472 2006-12-11 2025-04-09 - 10.0 Likely
CVE-2006-6473 2006-12-11 2025-04-09 - 10.0 Likely
CVE-2008-2743 2008-06-17 2025-04-09 - 4.3 Likely
CVE-2008-2824 2008-06-23 2025-04-09 - 10.0 Likely
CVE-2008-2825 2008-06-23 2025-04-09 - 4.3 Likely
CVE-2008-3121 2008-07-10 2025-04-09 - 4.3 Likely
CVE-2008-3122 2008-07-10 2025-04-09 - 6.5 Likely
CVE-2008-3571 2008-08-10 2025-04-09 - 7.8 Likely
CVE-2008-5225 2008-11-25 2025-04-09 - 4.3 Likely
CVE-2008-6436 2009-03-06 2025-04-09 - 4.3 Likely
CVE-2009-1656 2009-05-16 2025-04-09 - 10.0 Likely
CVE-2009-3913 2009-11-09 2025-04-09 - 7.5 Likely
CVE-2010-0548 2010-02-04 2025-04-11 - 5.0 Likely
CVE-2010-0549 2010-02-04 2025-04-11 - 5.0 Likely
CVE-2012-0773 2012-03-28 2025-04-11 - 9.3 Likely
CVE-2012-0569 2013-01-17 2025-04-11 - 3.3 Unknown
CVE-2013-0407 2013-01-17 2025-04-11 - 4.6 Unknown
CVE-2013-0415 2013-01-17 2025-04-11 - 6.0 Unknown
CVE-2014-3138 2014-05-02 2025-04-12 - 6.5 Likely
CVE-2018-17172 2019-01-03 2024-11-21 9.8 7.5 Likely
CVE-2018-20767 2019-02-10 2024-11-21 8.8 6.5 Likely
CVE-2018-20768 2019-02-10 2024-11-21 9.8 7.5 Likely
CVE-2018-20769 2019-02-10 2024-11-21 7.5 5.0 Likely
CVE-2018-20770 2019-02-10 2024-11-21 9.8 7.5 Likely
CVE-2018-20771 2019-02-10 2024-11-21 9.8 7.5 Likely
CVE-2019-10880 2019-04-12 2024-11-21 9.8 10.0 Likely
CVE-2018-15530 2019-05-13 2024-11-21 6.1 4.3 Likely
CVE-2019-17184 2019-10-04 2024-11-21 9.8 7.5 Likely
CVE-2019-19832 2019-12-18 2024-11-21 8.8 6.8 Likely
CVE-2013-6362 2020-02-13 2024-11-21 9.8 5.0 Likely
CVE-2020-9330 2020-02-21 2024-11-21 8.8 4.0 Likely
CVE-2019-13165 2020-03-13 2024-11-21 9.8 10.0 Likely
CVE-2019-13166 2020-03-13 2024-11-21 7.5 5.0 Likely
CVE-2019-13167 2020-03-13 2024-11-21 6.1 4.3 Likely
CVE-2019-13168 2020-03-13 2024-11-21 9.8 10.0 Likely
CVE-2019-13169 2020-03-13 2024-11-21 9.8 10.0 Likely
CVE-2019-13170 2020-03-13 2024-11-21 6.5 4.3 Likely
CVE-2019-13171 2020-03-13 2024-11-21 9.8 10.0 Likely
CVE-2019-13172 2020-03-13 2024-11-21 9.8 10.0 Likely
CVE-2016-11061 2020-04-29 2024-11-21 9.8 10.0 Likely
CVE-2020-26162 2020-10-09 2024-11-21 6.1 4.3 Likely
CVE-2020-36201 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2019-18628 2021-03-04 2024-11-21 4.9 4.0 Likely
CVE-2019-18629 2021-03-04 2024-11-21 8.1 6.8 Likely
CVE-2019-18630 2021-03-04 2024-11-21 7.5 5.0 Likely
CVE-2021-28670 2021-03-29 2024-11-21 9.1 6.4 Likely
CVE-2021-28668 2021-03-29 2024-11-21 9.8 7.5 Likely
CVE-2021-28669 2021-03-29 2024-11-21 7.5 5.0 Likely
CVE-2021-28673 2021-03-29 2024-11-21 9.8 7.5 Likely
CVE-2021-28671 2021-03-29 2024-11-21 9.8 7.5 Likely
CVE-2021-28672 2021-03-29 2024-11-21 9.8 7.5 Likely
CVE-2019-10881 2021-04-13 2024-11-21 9.8 7.5 Likely
CVE-2022-23968 2022-01-26 2024-11-21 7.5 7.8 Likely
CVE-2022-23320 2022-02-07 2024-11-21 7.5 5.0 Likely
CVE-2022-23321 2022-02-10 2024-11-21 4.8 3.5 Unknown
CVE-2021-37354 2022-02-15 2024-11-21 9.8 7.5 Likely
CVE-2022-26572 2022-04-04 2024-11-21 7.5 5.0 Likely
CVE-2022-45897 2023-01-31 2025-03-28 6.5 - -
CVE-2023-46327 2023-11-02 2024-11-21 5.9 - -
CVE-2024-47556 2024-10-07 2024-10-16 8.3 - -
CVE-2024-47557 2024-10-07 2024-10-16 8.3 - -
CVE-2024-47558 2024-10-07 2024-10-16 7.6 - -
CVE-2024-47559 2024-10-07 2024-10-16 7.6 - -
CVE-2024-55925 2025-01-23 2026-02-28 7.5 - -
CVE-2024-55926 2025-01-23 2026-02-28 7.6 - -
CVE-2024-55927 2025-01-23 2026-02-28 7.6 - -
CVE-2024-55928 2025-01-23 2026-02-28 6.5 - -
CVE-2024-55929 2025-01-23 2026-01-30 5.3 - -
CVE-2024-55930 2025-01-23 2026-01-30 6.7 - -
CVE-2024-55931 2025-01-27 2026-01-30 6.5 - -
CVE-2025-8355 2025-08-08 2025-08-14 7.5 - -
CVE-2025-8356 2025-08-08 2025-08-18 9.8 - -
CVE-2026-1769 2026-02-06 2026-02-24 5.3 - -
CVE-2026-2251 2026-02-27 2026-03-02 9.8 - -
CVE-2026-2252 2026-02-27 2026-03-02 7.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for xerox by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with xerox's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.