Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 15 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aizuda
Aizuda snail-job |
|
| Vendors & Products |
Aizuda
Aizuda snail-job |
Sun, 14 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vulnerability is the function QLExpressEngine.doEval of the file snail-job-common/snail-job-common-core/src/main/java/com/aizuda/snailjob/common/core/expression/strategy/QLExpressEngine.java. The manipulation results in injection. The attack can be launched remotely. Upgrading to version 1.7.0-beta1 addresses this issue. The patch is identified as 978f316c38b3d68bb74d2489b5e5f721f6675e86. The affected component should be upgraded. | |
| Title | aizuda snail-job QLExpressEngine.java QLExpressEngine.doEval injection | |
| Weaknesses | CWE-707 CWE-74 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-15T19:43:25.833Z
Reserved: 2025-12-13T16:42:54.308Z
Link: CVE-2025-14674
Updated: 2025-12-15T19:43:12.038Z
Status : Awaiting Analysis
Published: 2025-12-14T18:15:43.977
Modified: 2025-12-15T18:22:13.783
Link: CVE-2025-14674
No data.
OpenCVE Enrichment
Updated: 2025-12-15T14:06:06Z