There are multiple ways for SQL query modification and to execute user-supplied perl file.
vulners.com/securityvulns/securityvulns:doc:2761
vulners.com/securityvulns/securityvulns:doc:2762
vulners.com/securityvulns/securityvulns:doc:2800