{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T10:41:21.785","vulnerabilities":[{"cve":{"id":"CVE-2018-10232","sourceIdentifier":"cve@mitre.org","published":"2018-07-11T17:29:00.257","lastModified":"2024-11-21T03:41:03.883","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site request forgery (CSRF) vulnerability in TOPdesk before 8.05.017 (June 2018 version) and before 5.7.SR9 allows remote attackers to hijack the authentication of authenticated users for requests that can obtain sensitive information via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de Cross-Site Request Forgery (CSRF) en TOPdesk en versiones anteriores a la 8.05.017 (versión de junio de 2018) y versiones anteriores a la 5.7.SR9 permite que atacantes remotos secuestren la autenticación de usuarios autenticados para las peticiones que pueden obtener información sensible mediante vectores sin especificar."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:*:*:*:*:*:*:*:*","versionStartIncluding":"8.05.001","versionEndExcluding":"8.05.017","matchCriteriaId":"A2059545-53A1-42E0-A60F-DB188C77A01D"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:-:*:*:*:*:*:*","matchCriteriaId":"56CB5F6B-9B25-47DA-82D1-44CEBAF7F8CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release1:*:*:*:*:*:*","matchCriteriaId":"ABA02FCA-FEA0-4B7D-9D1C-248C6CCD6BE8"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release2:*:*:*:*:*:*","matchCriteriaId":"3F815228-4F86-42C1-86BB-E26B1B2D11D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release3:*:*:*:*:*:*","matchCriteriaId":"8775D1B0-B213-45EE-BD24-97E55CCF7805"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release4:*:*:*:*:*:*","matchCriteriaId":"F1333AAE-4C77-414D-A124-DCDF8C770CED"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release5:*:*:*:*:*:*","matchCriteriaId":"E476D386-26AB-4092-9094-A2DBB59022F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release6:*:*:*:*:*:*","matchCriteriaId":"223F7759-F511-4425-A9F3-AF5114AF83C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release7:*:*:*:*:*:*","matchCriteriaId":"884A19F5-28AE-4F1E-90E5-0D68592FBBD1"},{"vulnerable":true,"criteria":"cpe:2.3:a:topdesk:topdesk:5.7:service_release8:*:*:*:*:*:*","matchCriteriaId":"B46DE353-C151-4F42-971D-885AE15379E3"}]}]}],"references":[{"url":"https://page.topdesk.com/cve-2018-10231-and-cve-2018-10232?hs_preview=slNSCcfI-5931819551","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://page.topdesk.com/cve-2018-10231-and-cve-2018-10232?hs_preview=slNSCcfI-5931819551","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}