We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. Linux::Statm::Tiny uses Mite to produce the affected code section due to CVE-2025-30672
Reserved 2025-03-31 | Published 2025-04-01 | Updated 2025-04-01 | Assigner CPANSecCWE-427 Uncontrolled Search Path Element
metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0701/changes
metacpan.org/...y-0.0700/source/lib/Linux/Statm/Tiny/Mite.pm
blogs.perl.org/...o/2016/11/what-happened-to-dot-in-inc.html
Support options