We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval().
Reserved 2024-10-21 | Published 2024-11-19 | Updated 2024-12-03 | Assigner canonicalQualys
Roderich Schupp
Mark Esler
www.cve.org/CVERecord?id=CVE-2024-10224
github.com/...anDeps/security/advisories/GHSA-g597-359q-v529
www.qualys.com/2024/11/19/needrestart/needrestart.txt
Support options