Browse all 3 CVE security advisories affecting SmartStar Software. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SmartStar Software develops enterprise resource planning (ERP) systems for mid-market companies, streamlining financial and operational workflows. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access controls. While no major public security incidents have been documented, the three recorded CVEs highlight ongoing challenges in secure coding practices. Their security posture typically includes regular patch releases and vulnerability disclosure programs, though the persistence of certain flaw types suggests deeper architectural considerations may be needed to address root causes.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-48376 | SmartStar Software CWS Web-Base - Arbitrary File Upload — CWS Web-BaseCWE-434 | 9.8 | Critical | 2023-12-15 |
| CVE-2023-48375 | SmartStar Software CWS Web-Base - Broken Access Control — CWS Web-BaseCWE-862 | 8.8 | High | 2023-12-15 |
| CVE-2023-48374 | SmartStar Software CWS Web-Base - Use of Hard-coded Credentials — CWS Web-BaseCWE-798 | 6.5 | Medium | 2023-12-15 |
This page lists every published CVE security advisory associated with SmartStar Software. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.