The following table lists the changes that have been made to the
CVE-2025-3051 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 9b29abf9-4ab0-4765-b253-1875cd9b441eApr. 01, 2025
Action Type Old Value New Value Added Description Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory (‘.’) to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution.
Linux::Statm::Tiny uses Mite to produce the affected code section due to CVE-2025-30672
Added CWE CWE-427 Added Reference https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html Added Reference https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0700/source/lib/Linux/Statm/Tiny/Mite.pm#L82 Added Reference https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0701/changes