CVEbuzz logo
This website displays data collected from external sources, and is not responsible for any aspect of it. Read more...

Security / vulnerability advisories for NDoc Software NDoc 7.4

Titles listed in dictionary

CPE for product: cpe:2.3:a:ndocsoftware:ndoc:7.4:*:*:*:*:*:*:*

Showing 1-1 of 1
Maximal damage 9.8
Very easy to exploit
(other affected products) Published: Thu Oct 26 20:29:00 2017 UTC. Last Modified: Thu Oct 3 00:03:00 2019 UTC
CPE matches: cpe:2.3:a:ndocsoftware:ndoc:*:*:*:*:*:*:*:* && versionEndIncluding=7.4


Before Thornberry NDoc version 8.0, laptop clients and the server have default database (Cache) users set up with a single password. This password is left behind in a cleartext log file during client installation on laptops. This password can be used to gain full admin/system access to client devices (if no firewall is present) or the NDoc server itself. Once the password is known to an attacker, local access is not required.


Attack conditions

Damage and attack conditions obtained from CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (CVSSv3)

Type of bug(s)