Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://packetstorm.news/files/id/182449/ |
|
| https://smarts-srl.com |
|
Mon, 21 Apr 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smarts-srl
Smarts-srl smart Agent |
|
| CPEs | cpe:2.3:a:smarts-srl:smart_agent:1.1.0:*:*:*:pro:*:*:* cpe:2.3:a:smarts-srl:smart_agent:1.1.0:*:*:*:qoe:*:*:* |
|
| Vendors & Products |
Smarts-srl
Smarts-srl smart Agent |
Sat, 28 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Fri, 27 Dec 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection vulnerability in Smart Agent v.1.1.0 allows a remote attacker to execute arbitrary code via the id parameter in the /sendPushManually.php component. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-28T18:09:07.685Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-50716
Updated: 2024-12-28T18:09:01.650Z
Status : Analyzed
Published: 2024-12-27T21:15:08.063
Modified: 2025-04-21T15:17:24.477
Link: CVE-2024-50716
No data.
OpenCVE Enrichment
No data.