Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourceforge
Sourceforge data Center Audit |
|
| Vendors & Products |
Sourceforge
Sourceforge data Center Audit |
Fri, 06 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Data Center Audit 2.6.2 contains a cross-site request forgery vulnerability that allows attackers to reset administrator passwords without authentication by submitting crafted POST requests. Attackers can send requests to dca_resetpw.php with parameters updateuser, pass, pass2, and submit_reset to change the admin account password and gain administrative access. | |
| Title | Data Center Audit 2.6.2 Cross-Site Request Forgery via dca_resetpw.php | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-09T15:24:21.368Z
Reserved: 2026-03-06T11:47:51.827Z
Link: CVE-2018-25177
Updated: 2026-03-09T15:24:14.625Z
Status : Deferred
Published: 2026-03-06T13:15:59.677
Modified: 2026-04-15T14:53:58.147
Link: CVE-2018-25177
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:07:50Z