{"id":"CVE-2024-10224","details":"Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval().","aliases":["GHSA-g597-359q-v529"],"modified":"2026-03-15T22:48:09.849870Z","published":"2024-11-19T18:15:19.773Z","related":["ALSA-2025:7350","openSUSE-SU-2025:14635-1"],"references":[{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Nov/17"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Nov/15"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-10224"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2024/11/19/1"},{"type":"EVIDENCE","url":"https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529"},{"type":"EVIDENCE","url":"https://www.qualys.com/2024/11/19/needrestart/needrestart.txt"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10224.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.36"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"fixed":"1.36"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}