{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T19:45:44.632","vulnerabilities":[{"cve":{"id":"CVE-2015-4362","sourceIdentifier":"cve@mitre.org","published":"2015-06-15T14:59:16.607","lastModified":"2026-05-06T22:30:45.220","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site request forgery (CSRF) vulnerability in tracking_code.admin.inc in the Tracking Code module 7.x-1.x before 7.x-1.6 for Drupal allows remote attackers to hijack the authentication of administrators for requests that disable tracking codes via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de CSRF en tracking_code.admin.inc en el módulo Tracking Code 7.x-1.x anterior a 7.x-1.6 para Drupal permite a atacantes remotos secuestrar la autenticación de administradores para solicitudes que deshabilitan los códigos de rastreo a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tracking_code_project:tracking_code:7.x-1.x:dev:*:*:*:drupal:*:*","matchCriteriaId":"A4534D4F-A21E-4166-8B88-3041D597B855"}]}]}],"references":[{"url":"http://cgit.drupalcode.org/tracking_code/commit/?id=77c8c3d","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2015/04/25/6","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/72958","source":"cve@mitre.org"},{"url":"https://www.drupal.org/node/2445961","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://www.drupal.org/node/2450135","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.drupal.org/node/2453079","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://cgit.drupalcode.org/tracking_code/commit/?id=77c8c3d","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2015/04/25/6","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/72958","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.drupal.org/node/2445961","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.drupal.org/node/2450135","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.drupal.org/node/2453079","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}