The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6185