All the vulnerabilites related to dan_kogai - encode_module
cve-2011-2939
Vulnerability from cvelistv5
Published
2012-01-13 18:00
Modified
2024-08-06 23:15
Severity ?
Summary
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.951Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46989",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46989"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
          },
          {
            "name": "55314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55314"
          },
          {
            "name": "USN-1643-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1643-1"
          },
          {
            "name": "49858",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/49858"
          },
          {
            "name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
          },
          {
            "name": "46172",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46172"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29"
          },
          {
            "name": "MDVSA-2012:008",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
          },
          {
            "name": "RHSA-2011:1424",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
          },
          {
            "name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
          },
          {
            "name": "51457",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51457"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-17T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "46989",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46989"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
        },
        {
          "name": "55314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55314"
        },
        {
          "name": "USN-1643-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1643-1"
        },
        {
          "name": "49858",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/49858"
        },
        {
          "name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
        },
        {
          "name": "46172",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46172"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29"
        },
        {
          "name": "MDVSA-2012:008",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
        },
        {
          "name": "RHSA-2011:1424",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
        },
        {
          "name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
        },
        {
          "name": "51457",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51457"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2939",
    "datePublished": "2012-01-13T18:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.951Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-01-13 18:55
Modified
2024-11-21 01:29
Severity ?
Summary
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
References
secalert@redhat.comhttp://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
secalert@redhat.comhttp://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5Exploit, Patch
secalert@redhat.comhttp://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29
secalert@redhat.comhttp://secunia.com/advisories/46172
secalert@redhat.comhttp://secunia.com/advisories/46989
secalert@redhat.comhttp://secunia.com/advisories/51457
secalert@redhat.comhttp://secunia.com/advisories/55314
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:008
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/18/8
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/19/17Patch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1424.html
secalert@redhat.comhttp://www.securityfocus.com/bid/49858
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1643-1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=731246Patch
af854a3a-2127-422b-91ae-364da2661108http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
af854a3a-2127-422b-91ae-364da2661108http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46172
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46989
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51457
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55314
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:008
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/18/8
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/19/17Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1424.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/49858
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1643-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=731246Patch
Impacted products
Vendor Product Version
dan_kogai encode_module *
dan_kogai encode_module 0.93
dan_kogai encode_module 0.94
dan_kogai encode_module 0.95
dan_kogai encode_module 0.96
dan_kogai encode_module 0.97
dan_kogai encode_module 0.98
dan_kogai encode_module 0.99
dan_kogai encode_module 1.00
dan_kogai encode_module 1.01
dan_kogai encode_module 1.10
dan_kogai encode_module 1.11
dan_kogai encode_module 1.20
dan_kogai encode_module 1.21
dan_kogai encode_module 1.25
dan_kogai encode_module 1.26
dan_kogai encode_module 1.28
dan_kogai encode_module 1.30
dan_kogai encode_module 1.31
dan_kogai encode_module 1.32
dan_kogai encode_module 1.33
dan_kogai encode_module 1.34
dan_kogai encode_module 1.40
dan_kogai encode_module 1.41
dan_kogai encode_module 1.42
dan_kogai encode_module 1.50
dan_kogai encode_module 1.51
dan_kogai encode_module 1.52
dan_kogai encode_module 1.53
dan_kogai encode_module 1.54
dan_kogai encode_module 1.55
dan_kogai encode_module 1.56
dan_kogai encode_module 1.57
dan_kogai encode_module 1.58
dan_kogai encode_module 1.59
dan_kogai encode_module 1.60
dan_kogai encode_module 1.61
dan_kogai encode_module 1.62
dan_kogai encode_module 1.63
dan_kogai encode_module 1.64
dan_kogai encode_module 1.65
dan_kogai encode_module 1.66
dan_kogai encode_module 1.67
dan_kogai encode_module 1.68
dan_kogai encode_module 1.69
dan_kogai encode_module 1.70
dan_kogai encode_module 1.71
dan_kogai encode_module 1.72
dan_kogai encode_module 1.73
dan_kogai encode_module 1.74
dan_kogai encode_module 1.75
dan_kogai encode_module 1.76
dan_kogai encode_module 1.77
dan_kogai encode_module 1.78
dan_kogai encode_module 1.79
dan_kogai encode_module 1.80
dan_kogai encode_module 1.81
dan_kogai encode_module 1.82
dan_kogai encode_module 1.83
dan_kogai encode_module 1.84
dan_kogai encode_module 1.85
dan_kogai encode_module 1.86
dan_kogai encode_module 1.87
dan_kogai encode_module 1.88
dan_kogai encode_module 1.89
dan_kogai encode_module 1.90
dan_kogai encode_module 1.91
dan_kogai encode_module 1.92
dan_kogai encode_module 1.93
dan_kogai encode_module 1.94
dan_kogai encode_module 1.95
dan_kogai encode_module 1.96
dan_kogai encode_module 1.97
dan_kogai encode_module 1.98
dan_kogai encode_module 1.99
dan_kogai encode_module 2.0
dan_kogai encode_module 2.01
dan_kogai encode_module 2.02
dan_kogai encode_module 2.03
dan_kogai encode_module 2.04
dan_kogai encode_module 2.05
dan_kogai encode_module 2.06
dan_kogai encode_module 2.07
dan_kogai encode_module 2.08
dan_kogai encode_module 2.09
dan_kogai encode_module 2.10
dan_kogai encode_module 2.11
dan_kogai encode_module 2.12
dan_kogai encode_module 2.13
dan_kogai encode_module 2.14
dan_kogai encode_module 2.15
dan_kogai encode_module 2.16
dan_kogai encode_module 2.17
dan_kogai encode_module 2.18
dan_kogai encode_module 2.19
dan_kogai encode_module 2.20
dan_kogai encode_module 2.21
dan_kogai encode_module 2.22
dan_kogai encode_module 2.23
dan_kogai encode_module 2.24
dan_kogai encode_module 2.25
dan_kogai encode_module 2.26
dan_kogai encode_module 2.27
dan_kogai encode_module 2.28
dan_kogai encode_module 2.29
dan_kogai encode_module 2.30
dan_kogai encode_module 2.31
dan_kogai encode_module 2.32
dan_kogai encode_module 2.33
dan_kogai encode_module 2.34
dan_kogai encode_module 2.35
dan_kogai encode_module 2.36
dan_kogai encode_module 2.37
dan_kogai encode_module 2.38
dan_kogai encode_module 2.39
dan_kogai encode_module 2.40
dan_kogai encode_module 2.41
dan_kogai encode_module 2.42
perl perl *
perl perl 5.8.1
perl perl 5.8.2
perl perl 5.8.3
perl perl 5.8.4
perl perl 5.8.5
perl perl 5.8.6
perl perl 5.8.7
perl perl 5.8.8
perl perl 5.8.9
perl perl 5.8.10
perl perl 5.9.2
perl perl 5.10
perl perl 5.10.0
perl perl 5.10.0
perl perl 5.10.0
perl perl 5.10.1
perl perl 5.10.1
perl perl 5.10.1
perl perl 5.11.0
perl perl 5.11.1
perl perl 5.11.2
perl perl 5.11.3
perl perl 5.11.4
perl perl 5.11.5
perl perl 5.12.0
perl perl 5.12.0
perl perl 5.12.0
perl perl 5.12.0
perl perl 5.12.0
perl perl 5.12.0
perl perl 5.12.0
perl perl 5.12.1
perl perl 5.12.1
perl perl 5.12.1
perl perl 5.12.2
perl perl 5.12.2
perl perl 5.12.3
perl perl 5.12.3
perl perl 5.12.3
perl perl 5.12.3
perl perl 5.13.0
perl perl 5.13.1
perl perl 5.13.2
perl perl 5.13.3
perl perl 5.13.4
perl perl 5.13.5
perl perl 5.13.6
perl perl 5.13.7
perl perl 5.13.8
perl perl 5.13.9
perl perl 5.13.10
perl perl 5.13.11
perl perl 5.14.0
perl perl 5.14.0
perl perl 5.14.0
perl perl 5.14.0
perl perl 5.14.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23343380-F5F0-4DB9-B36D-9BD9A856DCDD",
              "versionEndIncluding": "2.43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB0FAA45-165C-49B6-8FA3-45014E968CEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEAA1BA-E531-4119-8723-D46420636D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14AD913-D028-4D04-A55E-4FD7DB11F76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B36219E-A5FC-41ED-80AC-007E43E95B30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5D3B13C-7333-4FFE-9C20-645560B76F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D4DA4E-8B1B-49C6-A2C0-1FC800633282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "6337FDFD-262E-40D0-80D4-B8D3C9070718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27B48BF-A9AE-4AA5-897D-5D0F4705F361",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90A39E-23A7-4387-B17C-3EFAC440B9FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F228758-CA6D-4228-ACCF-D2483535E9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9761D4BA-4307-4EF7-9BB9-F5576806FDDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC64031-55DA-4B54-ABCD-EBD80A1A0040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2EDB2F-775B-4CBD-9F14-7DC9E6FE1289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7015226C-63CC-4F17-ADA4-7F7DD6DF47EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF91D347-7305-4FBA-8334-A34BF6E1EBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "97EE437D-ADCD-4AD4-846A-0C5B8D2664F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "905DAED7-33EE-4EEF-99A3-81BA9F3E3124",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC222DEE-AE58-411B-8EAC-57234FF70BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "49931341-5E98-4295-A6A7-0BC1B6F9ADE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3095E4F-6BA2-4F87-BABC-4D6340294575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCFDA3D7-0E68-4319-8DBA-467C32C4128E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52CBCA7-F8CC-461A-936F-AB2498D88FE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EE81428-9030-417D-A557-A2B6F7061372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E60DB35-48DD-4660-8BB5-A307193688DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D2BEEC-F6A0-411E-A524-7BF0A6CF26E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC200E4-4EA8-4891-9540-3D6D7B62D497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E90392A-ED00-48C4-B091-A5A5438A2D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBF8384C-283F-4B18-9E39-579397F3E418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "0185F681-2BA2-4DCF-B737-5A5065D32D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0A8712D-8C6A-498A-8F35-79CD0642137F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA599B4-E7F0-421C-BF64-F74E827D27C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA4200C-0355-429A-82F8-4BC90091D9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB647828-E946-4627-98F5-01218FAE65D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B540908-5419-4F32-B252-E62A67403452",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "50836D06-5FC5-4E71-AFA7-2487A5E841F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5F10EC-70A9-4D5D-97D6-66D2A3F2BA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03B165C-421F-4B94-8B02-D2582FF780F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F862D3-A61D-4CA1-8FAF-4A6368C515C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D88707B-2345-42F2-B906-EED96926E14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5449D0E-E7AB-4DE0-A657-2285046F84BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBFF477-F35D-4AE0-BCD3-E50C66502E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D8A6EB-1A14-456C-BDB3-47EA202980D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EB2CE5-88D7-41B2-948C-B7A4D37DEDA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E8C6E6-DDD2-483B-8CA9-5FA10E10B08A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D6FD71-53C6-4AAF-9F97-D42E80C6F69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "431FF64D-03C1-4E66-B5C0-DD373778B08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B57F16-18AF-40F1-BFCB-FC3E7200FD25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CF6920-9E2E-4A4C-A271-47CD1075EB9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "47618894-4544-4F22-8005-2C2F58793AA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C73DA11-31A0-416F-9853-59C82F72D822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C04B436-B71D-467D-95A9-254C59E5FAC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDC5667E-D4AA-4645-BCC7-C148F60EEF55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA110759-1728-4BCD-93CA-052037CF1599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "25438F7D-A683-47D5-AB8C-16B1FC266383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "962B545B-A962-4143-A24A-7FC066B390E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "238741B3-A4A5-4A19-9573-74D5DF7FF40B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "7016CC69-8034-413A-BD79-14047B0C3847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "108CCE2F-50A0-406B-B082-536556EC5D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB3A78B9-B1BC-4EFA-BA05-4D671F4C308A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "7143F1DC-20A2-42E1-9132-B5C3097BC41B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F558DE5-F39C-47E0-A369-CC515DCB2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D58BC3-9DFA-4EE4-86C0-49068246C04B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3515296-AC71-4EC8-A59B-209078314757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "49927F8D-D387-4742-B0CA-F9101497DAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AF0CAA-C03A-449A-8E75-F12E8721A964",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E144DD8-EB87-4D42-AE6E-1CEDE2614332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5B388A-D7D1-4371-9A08-E792EC918C7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "C81AD6D9-80A3-4218-B3FD-8B3ED48F44E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "983E0EE0-DA5C-447D-B6E2-2D165C74C0A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F86D10-83C4-488C-9380-D4A7C056879E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "BADA05F7-DA93-40F3-A281-890002D8BA4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD150F64-462B-420C-BC88-B8BF30C2B296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "133C7F0C-E3C2-4733-8004-05714DC643B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "963C689B-72F8-4310-BDAD-1860560EB726",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE081501-0933-4C1D-88F2-182134E03EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2405CC1-9009-4E00-88D5-4CC24F5BFBDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "39B2262D-01E7-4748-A567-5BF66EF90526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "04866020-8327-4F5F-907E-ED404A5B91C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F5F4A0-3B46-4E05-AE11-3953E1A83332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B40204C-F16F-4108-A065-C7F1FE5FE598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "499AFE0E-6B9C-44CE-BDC1-9445A5F46D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B23AD9C-F4FB-40EB-829D-4DD8869EB9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2956E57-2FC9-4B01-83CD-B793136D4658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6BFB614-13DC-48AD-A9B2-18785AD91FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB086C28-A86B-4DA2-A03C-45729469B441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "93659981-81CD-408C-A4BC-0E7EB9F6F056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5AE4F9D-8302-469A-B564-B050581EEA1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD1D845C-B499-42FD-A5F1-E39A215A56FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "98567153-1D89-44E1-9C19-B7EC9AB1A31A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F16E666-8B84-4A7B-A71E-92AF341CC9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009EBDA-D9C8-4B8A-99D1-EA51A2BE91C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "88AE4748-F054-4D9C-BCD4-89160237AB10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7030EEC-7426-44E1-900C-A4B381EFF4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC0EBF0-6804-424A-A131-23965F4874A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDA775A-9AD8-4B1F-B6B6-F7B89AF3945C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1861342-EB74-44CD-BB51-78F2233E0F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "22BB1E7B-AFEF-4BD6-9B5A-267326963595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47C0CF2-2D3A-4309-82A5-87E733271B24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B4A90A7-6D67-4373-B220-7B9BFFFBA1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FCB23B-5B66-421B-8B10-DD05DAA344A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "95B47D61-F2AE-4A68-BF96-5E176D21EF4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C8332F-1E58-44D0-B076-AC4340303EF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "B057F456-189A-49F1-952D-0EFBC16D5A79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC64DAE-208E-4FFD-BD03-43917CE4CC7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48E88B4-0663-4C8E-A48B-FDA4087E24E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E890C2-2657-4BD6-B3AD-F9023D4AF08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95C665C-B2E4-4129-A107-E6897969CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "2244E758-9D3F-4D0F-A2CA-023E62B49F4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C199B35-4F8F-4AA6-864E-81B2F0BF4DD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5B8993-43F4-45D2-B7E9-AA6722EF555F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "B477187B-559C-4011-BF92-3A7F2AF8B301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D8C5D47-DC01-4202-B9FF-32024E329848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF82AC9-AE7B-4B65-A170-D085267E0EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "428762B2-E0BE-4804-BF28-F1292AC87FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F5682F2-5E0B-4D9E-BF7F-04D8C5EE12F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B2D4B6-BE40-45E3-9AE9-568E1DD3D1C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "F148F0BF-49F1-4E5E-B92F-FEB83C1B0157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE55A238-C38C-4C74-B2D4-D4A5EBBA32B2",
              "versionEndIncluding": "5.14.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "70CBBC87-F6F7-45AF-9B54-95402D03C75F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B34EA51-64A3-483A-AF99-01358F6BE8D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0DBA5-360F-463E-A840-365168A1FCC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EA80F25-A108-4B65-BE25-56DE17B930EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB2B6E2-890E-4B6E-833F-DF40E6D77E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F0358E-0722-48A6-A2C6-470229602089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8DFDF97-EF44-448F-A5CA-021B2D64605F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E98D2706-99B7-4153-925B-77A8CECD7CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B10AD15E-6275-48AB-8757-FB5A735C82D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B358BF3-55AC-477E-A4B5-3960C449C011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF69341A-4D00-424E-AD0F-FA7515278770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "777EC860-FB16-4B15-A8BE-3EAE9FD8A99D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B84C088-F29F-4498-A390-187505361962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "17E86767-47EB-4A39-B8E1-A4B9AB4BC20E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "DB77E3D6-9F24-4C51-86E4-CD014DF0F66E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D67E248-C0B8-4713-9D9A-47097885A2C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B32436EE-DA64-41AD-B967-26C6D4973FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "CF46E50D-AE29-49FD-884B-488D9EB879D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B23E85-8167-4B17-8D76-BD807067BB4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8355C16E-16D4-4A68-BFD3-125892E3FA1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FFA753-4B14-4B52-941F-C33D41451EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99FD006-688D-43BB-901A-FB9192157947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD582A1-DCCF-4D54-8177-45E861A0C263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AF4FAA-A591-43FB-A9B1-FD47EF0AC622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC3F8EA-BE60-4EAB-A9B9-DB1368B5430C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "C0D13359-AC5F-40CB-B906-8E03526CE045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A5E92FB2-7C21-4F06-AE3F-562551A758AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D213529E-33EF-43D1-A673-3C94191427D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E6539E09-4DC5-4C53-AFF1-70D06BBA9E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "52D8DF08-AE73-4529-B212-CA31F02A719E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "EA054FCE-FABC-4EB5-9759-F77C6F250B44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5DDFC6-4EDF-452A-B561-C9115D91FB3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B1DBAB61-4BFB-4664-98CF-77C617F982A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8A7580C2-44DE-48E5-AC26-A221537C95D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E04A5E-BE90-4A31-8C1D-09A91DD3E7DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1A52ADD6-05DE-4A16-9745-D92CD5F46502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFF99954-5B94-4092-83B9-7D17EEDB30A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "38A25AC3-1C81-4234-8B7E-0D59EA1F103B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "93E670B7-6956-4A13-A2A8-F675C0B093FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "23F1C64E-1446-409D-9F53-1C03724A10E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "93813F8D-F22F-43E3-B894-BEB7FA6204F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B280339A-1CED-4FBD-8B3C-A48B07FE9BAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC85766E-3A59-4711-85C9-62AC01F2A87D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC9AA38-4A25-4825-9EDD-E93353A8B195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "388E8952-47B7-426E-AE35-0216FD60CC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "105AB2DD-5E61-4369-8383-B7BF13B85444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF2F4C5C-2B56-450A-813F-254019FBB854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "226424B4-7299-4E28-BBB1-0FCC9E2602E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16C918C-A1C4-425B-9C0C-B239B3482A77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5393E265-60C1-43A6-9EFE-505A115053DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD50D93-8395-4698-A12B-D9CAAB022BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "04EE04B4-71DD-4A87-BA2D-79954AEF5DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A968B30-8456-49C2-A9B0-6CF55CB3C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66BF9787-C734-43DA-B8BF-FF6D6F4E802A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D94BF151-572F-4C50-8E47-9B8BCDD16A77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5114F054-E5AF-4905-83DD-459E1D56B5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B91435-67DA-49E1-A37F-7839728F17BC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "Error \"Off-by-one\" en la funci\u00f3n decode_xs en Unicode/Unicode.xs en el m\u00f3dulo Encode anterior a v2.44,  utilizado en Perl anterior a v5.15.6 , podr\u00eda permitir a atacantes dependientes de contexto  causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un cadena de Unicode especialmente creada, provocando un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap)."
    }
  ],
  "id": "CVE-2011-2939",
  "lastModified": "2024-11-21T01:29:19.240",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-13T18:55:02.987",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/46172"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/46989"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/51457"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/55314"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/49858"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1643-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/46172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/46989"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/51457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/55314"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/49858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1643-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}