{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T07:18:45.218","vulnerabilities":[{"cve":{"id":"CVE-2024-44903","sourceIdentifier":"cve@mitre.org","published":"2025-03-25T06:15:39.790","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["exclusively-hosted-service"]}],"descriptions":[{"lang":"en","value":"SQL Injection can occur in the SirsiDynix Horizon Information Portal (IPAC20) through 3.25_9382; however, a patch is available from the vendor. This is in ipac.jsp in a SELECT WHERE statement, in a part of the uri= variable in the second part of the full= inner variable."},{"lang":"es","value":"La inyección de SQL puede ocurrir en el SirsiDynix Horizon Information Portal (IPAC20) hasta la versión 3.25_9382; sin embargo, el proveedor ofrece un parche. Este se encuentra en ipac.jsp, en una instrucción SELECT WHERE, en una parte de la variable uri=, en la segunda parte de la variable interna full=."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"references":[{"url":"https://www.artresilia.com/cve-2024-44903-sql-injection-vulnerability-in-horizon-information-portal/","source":"cve@mitre.org"},{"url":"https://www.artresilia.com/cve-2024-44903-sql-injection-vulnerability-in-horizon-information-portal/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}