The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7424
https://bugzilla.redhat.com/show_bug.cgi?id=576508
http://www.vupen.com/english/advisories/2010/3075
http://www.redhat.com/support/errata/RHSA-2010-0458.html
http://www.redhat.com/support/errata/RHSA-2010-0457.html
http://www.openwall.com/lists/oss-security/2010/05/20/5
http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
http://www.mandriva.com/security/advisories?name=MDVSA-2010:115
http://securitytracker.com/id?1024062
http://secunia.com/advisories/42402
http://secunia.com/advisories/40052
http://secunia.com/advisories/40049
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes
http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in
http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html