{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T14:19:15.907","vulnerabilities":[{"cve":{"id":"CVE-2025-3051","sourceIdentifier":"9b29abf9-4ab0-4765-b253-1875cd9b441e","published":"2025-04-01T03:15:18.693","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.\n\nIf an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution.\n\nLinux::Statm::Tiny uses Mite to produce the affected code section due to CVE-2025-30672"},{"lang":"es","value":"Linux::Statm::Tiny para Perl anterior a la versión 0.0701 permite cargar código no confiable del directorio de trabajo actual ('.') de forma similar a CVE-2016-1238. Si un atacante coloca un archivo malicioso en el directorio de trabajo actual, este podría cargarse en lugar del archivo deseado, lo que podría provocar la ejecución de código arbitrario. Linux::Statm::Tiny utiliza Mite para generar la sección de código afectada debido a CVE-2025-30672."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"9b29abf9-4ab0-4765-b253-1875cd9b441e","type":"Secondary","description":[{"lang":"en","value":"CWE-427"}]}],"references":[{"url":"https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e"},{"url":"https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0700/source/lib/Linux/Statm/Tiny/Mite.pm#L82","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e"},{"url":"https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0701/changes","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e"}]}}]}