{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T03:03:54.636","vulnerabilities":[{"cve":{"id":"CVE-2022-45179","sourceIdentifier":"cve@mitre.org","published":"2024-02-21T16:15:49.173","lastModified":"2025-03-28T16:15:21.360","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in LIVEBOX Collaboration vDesk through v031. A basic XSS vulnerability exists under the /api/v1/vdeskintegration/todo/createorupdate endpoint via the title parameter and /dashboard/reminders. A remote user (authenticated to the product) can store arbitrary HTML code in the reminder section title in order to corrupt the web page (for example, by creating phishing sections to exfiltrate victims' credentials)."},{"lang":"es","value":"Se descubrió un problema en LIVEBOX Collaboration vDesk hasta v031. Existe una vulnerabilidad XSS básica en el endpoint /api/v1/vdeskintegration/todo/createorupdate a través del parámetro title y /dashboard/reminders. Un usuario remoto (autenticado en el producto) puede almacenar código HTML arbitrario en el título de la sección de recordatorio para corromper la página web (por ejemplo, creando secciones de phishing para extraer las credenciales de las víctimas)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*","versionEndIncluding":"031","matchCriteriaId":"258E49A5-480F-463A-A7AE-891A918FA851"}]}]}],"references":[{"url":"https://www.gruppotim.it/it/footer/red-team.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.gruppotim.it/it/footer/red-team.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}