cve-2011-2939
Vulnerability from cvelistv5
Published
2012-01-13 18:00
Modified
2024-08-06 23:15
Severity ?
Summary
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
References
secalert@redhat.comhttp://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
secalert@redhat.comhttp://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5Exploit, Patch
secalert@redhat.comhttp://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29
secalert@redhat.comhttp://secunia.com/advisories/46172
secalert@redhat.comhttp://secunia.com/advisories/46989
secalert@redhat.comhttp://secunia.com/advisories/51457
secalert@redhat.comhttp://secunia.com/advisories/55314
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:008
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/18/8
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/19/17Patch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1424.html
secalert@redhat.comhttp://www.securityfocus.com/bid/49858
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1643-1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=731246Patch
af854a3a-2127-422b-91ae-364da2661108http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
af854a3a-2127-422b-91ae-364da2661108http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46172
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46989
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51457
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55314
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:008
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/18/8
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/19/17Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1424.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/49858
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1643-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=731246Patch
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.951Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46989",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46989"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
          },
          {
            "name": "55314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55314"
          },
          {
            "name": "USN-1643-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1643-1"
          },
          {
            "name": "49858",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/49858"
          },
          {
            "name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
          },
          {
            "name": "46172",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46172"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29"
          },
          {
            "name": "MDVSA-2012:008",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
          },
          {
            "name": "RHSA-2011:1424",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
          },
          {
            "name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
          },
          {
            "name": "51457",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51457"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-17T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "46989",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46989"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
        },
        {
          "name": "55314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55314"
        },
        {
          "name": "USN-1643-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1643-1"
        },
        {
          "name": "49858",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/49858"
        },
        {
          "name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
        },
        {
          "name": "46172",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46172"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29"
        },
        {
          "name": "MDVSA-2012:008",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
        },
        {
          "name": "RHSA-2011:1424",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
        },
        {
          "name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
        },
        {
          "name": "51457",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51457"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2939",
    "datePublished": "2012-01-13T18:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.951Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-2939\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-01-13T18:55:02.987\",\"lastModified\":\"2024-11-21T01:29:19.240\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Error \\\"Off-by-one\\\" en la funci\u00f3n decode_xs en Unicode/Unicode.xs en el m\u00f3dulo Encode anterior a v2.44,  utilizado en Perl anterior a v5.15.6 , podr\u00eda permitir a atacantes dependientes de contexto  causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un cadena de Unicode especialmente creada, provocando un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.43\",\"matchCriteriaId\":\"23343380-F5F0-4DB9-B36D-9BD9A856DCDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:0.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB0FAA45-165C-49B6-8FA3-45014E968CEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:0.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEAA1BA-E531-4119-8723-D46420636D79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:0.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14AD913-D028-4D04-A55E-4FD7DB11F76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:0.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B36219E-A5FC-41ED-80AC-007E43E95B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:0.97:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D3B13C-7333-4FFE-9C20-645560B76F26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:0.98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D4DA4E-8B1B-49C6-A2C0-1FC800633282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:0.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6337FDFD-262E-40D0-80D4-B8D3C9070718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D27B48BF-A9AE-4AA5-897D-5D0F4705F361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E90A39E-23A7-4387-B17C-3EFAC440B9FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F228758-CA6D-4228-ACCF-D2483535E9E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9761D4BA-4307-4EF7-9BB9-F5576806FDDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC64031-55DA-4B54-ABCD-EBD80A1A0040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2EDB2F-775B-4CBD-9F14-7DC9E6FE1289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015226C-63CC-4F17-ADA4-7F7DD6DF47EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF91D347-7305-4FBA-8334-A34BF6E1EBFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97EE437D-ADCD-4AD4-846A-0C5B8D2664F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"905DAED7-33EE-4EEF-99A3-81BA9F3E3124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC222DEE-AE58-411B-8EAC-57234FF70BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49931341-5E98-4295-A6A7-0BC1B6F9ADE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3095E4F-6BA2-4F87-BABC-4D6340294575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFDA3D7-0E68-4319-8DBA-467C32C4128E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E52CBCA7-F8CC-461A-936F-AB2498D88FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EE81428-9030-417D-A557-A2B6F7061372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E60DB35-48DD-4660-8BB5-A307193688DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5D2BEEC-F6A0-411E-A524-7BF0A6CF26E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC200E4-4EA8-4891-9540-3D6D7B62D497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E90392A-ED00-48C4-B091-A5A5438A2D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF8384C-283F-4B18-9E39-579397F3E418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0185F681-2BA2-4DCF-B737-5A5065D32D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0A8712D-8C6A-498A-8F35-79CD0642137F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EA599B4-E7F0-421C-BF64-F74E827D27C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BA4200C-0355-429A-82F8-4BC90091D9C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB647828-E946-4627-98F5-01218FAE65D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B540908-5419-4F32-B252-E62A67403452\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50836D06-5FC5-4E71-AFA7-2487A5E841F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD5F10EC-70A9-4D5D-97D6-66D2A3F2BA5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03B165C-421F-4B94-8B02-D2582FF780F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F862D3-A61D-4CA1-8FAF-4A6368C515C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D88707B-2345-42F2-B906-EED96926E14E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5449D0E-E7AB-4DE0-A657-2285046F84BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBFF477-F35D-4AE0-BCD3-E50C66502E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31D8A6EB-1A14-456C-BDB3-47EA202980D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EB2CE5-88D7-41B2-948C-B7A4D37DEDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E8C6E6-DDD2-483B-8CA9-5FA10E10B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95D6FD71-53C6-4AAF-9F97-D42E80C6F69B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431FF64D-03C1-4E66-B5C0-DD373778B08D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B57F16-18AF-40F1-BFCB-FC3E7200FD25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CF6920-9E2E-4A4C-A271-47CD1075EB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47618894-4544-4F22-8005-2C2F58793AA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C73DA11-31A0-416F-9853-59C82F72D822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C04B436-B71D-467D-95A9-254C59E5FAC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDC5667E-D4AA-4645-BCC7-C148F60EEF55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA110759-1728-4BCD-93CA-052037CF1599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25438F7D-A683-47D5-AB8C-16B1FC266383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962B545B-A962-4143-A24A-7FC066B390E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238741B3-A4A5-4A19-9573-74D5DF7FF40B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7016CC69-8034-413A-BD79-14047B0C3847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108CCE2F-50A0-406B-B082-536556EC5D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB3A78B9-B1BC-4EFA-BA05-4D671F4C308A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7143F1DC-20A2-42E1-9132-B5C3097BC41B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.86:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F558DE5-F39C-47E0-A369-CC515DCB2678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D58BC3-9DFA-4EE4-86C0-49068246C04B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.88:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3515296-AC71-4EC8-A59B-209078314757\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.89:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49927F8D-D387-4742-B0CA-F9101497DAAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6AF0CAA-C03A-449A-8E75-F12E8721A964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E144DD8-EB87-4D42-AE6E-1CEDE2614332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF5B388A-D7D1-4371-9A08-E792EC918C7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C81AD6D9-80A3-4218-B3FD-8B3ED48F44E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983E0EE0-DA5C-447D-B6E2-2D165C74C0A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F86D10-83C4-488C-9380-D4A7C056879E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BADA05F7-DA93-40F3-A281-890002D8BA4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.97:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD150F64-462B-420C-BC88-B8BF30C2B296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133C7F0C-E3C2-4733-8004-05714DC643B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:1.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"963C689B-72F8-4310-BDAD-1860560EB726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE081501-0933-4C1D-88F2-182134E03EB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2405CC1-9009-4E00-88D5-4CC24F5BFBDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B2262D-01E7-4748-A567-5BF66EF90526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04866020-8327-4F5F-907E-ED404A5B91C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15F5F4A0-3B46-4E05-AE11-3953E1A83332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B40204C-F16F-4108-A065-C7F1FE5FE598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"499AFE0E-6B9C-44CE-BDC1-9445A5F46D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B23AD9C-F4FB-40EB-829D-4DD8869EB9CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2956E57-2FC9-4B01-83CD-B793136D4658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BFB614-13DC-48AD-A9B2-18785AD91FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB086C28-A86B-4DA2-A03C-45729469B441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93659981-81CD-408C-A4BC-0E7EB9F6F056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5AE4F9D-8302-469A-B564-B050581EEA1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1D845C-B499-42FD-A5F1-E39A215A56FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98567153-1D89-44E1-9C19-B7EC9AB1A31A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F16E666-8B84-4A7B-A71E-92AF341CC9F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009EBDA-D9C8-4B8A-99D1-EA51A2BE91C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88AE4748-F054-4D9C-BCD4-89160237AB10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7030EEC-7426-44E1-900C-A4B381EFF4A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC0EBF0-6804-424A-A131-23965F4874A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEDA775A-9AD8-4B1F-B6B6-F7B89AF3945C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1861342-EB74-44CD-BB51-78F2233E0F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22BB1E7B-AFEF-4BD6-9B5A-267326963595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F47C0CF2-2D3A-4309-82A5-87E733271B24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B4A90A7-6D67-4373-B220-7B9BFFFBA1FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FCB23B-5B66-421B-8B10-DD05DAA344A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95B47D61-F2AE-4A68-BF96-5E176D21EF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C8332F-1E58-44D0-B076-AC4340303EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B057F456-189A-49F1-952D-0EFBC16D5A79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC64DAE-208E-4FFD-BD03-43917CE4CC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48E88B4-0663-4C8E-A48B-FDA4087E24E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E890C2-2657-4BD6-B3AD-F9023D4AF08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95C665C-B2E4-4129-A107-E6897969CF2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2244E758-9D3F-4D0F-A2CA-023E62B49F4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C199B35-4F8F-4AA6-864E-81B2F0BF4DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C5B8993-43F4-45D2-B7E9-AA6722EF555F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B477187B-559C-4011-BF92-3A7F2AF8B301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8C5D47-DC01-4202-B9FF-32024E329848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF82AC9-AE7B-4B65-A170-D085267E0EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428762B2-E0BE-4804-BF28-F1292AC87FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F5682F2-5E0B-4D9E-BF7F-04D8C5EE12F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B2D4B6-BE40-45E3-9AE9-568E1DD3D1C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dan_kogai:encode_module:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F148F0BF-49F1-4E5E-B92F-FEB83C1B0157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.14.2\",\"matchCriteriaId\":\"AE55A238-C38C-4C74-B2D4-D4A5EBBA32B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70CBBC87-F6F7-45AF-9B54-95402D03C75F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B34EA51-64A3-483A-AF99-01358F6BE8D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E0DBA5-360F-463E-A840-365168A1FCC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA80F25-A108-4B65-BE25-56DE17B930EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECB2B6E2-890E-4B6E-833F-DF40E6D77E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53F0358E-0722-48A6-A2C6-470229602089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8DFDF97-EF44-448F-A5CA-021B2D64605F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E98D2706-99B7-4153-925B-77A8CECD7CFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10AD15E-6275-48AB-8757-FB5A735C82D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B358BF3-55AC-477E-A4B5-3960C449C011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF69341A-4D00-424E-AD0F-FA7515278770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"777EC860-FB16-4B15-A8BE-3EAE9FD8A99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B84C088-F29F-4498-A390-187505361962\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"17E86767-47EB-4A39-B8E1-A4B9AB4BC20E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB77E3D6-9F24-4C51-86E4-CD014DF0F66E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D67E248-C0B8-4713-9D9A-47097885A2C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32436EE-DA64-41AD-B967-26C6D4973FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF46E50D-AE29-49FD-884B-488D9EB879D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77B23E85-8167-4B17-8D76-BD807067BB4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8355C16E-16D4-4A68-BFD3-125892E3FA1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85FFA753-4B14-4B52-941F-C33D41451EF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B99FD006-688D-43BB-901A-FB9192157947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD582A1-DCCF-4D54-8177-45E861A0C263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AF4FAA-A591-43FB-A9B1-FD47EF0AC622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC3F8EA-BE60-4EAB-A9B9-DB1368B5430C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D13359-AC5F-40CB-B906-8E03526CE045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E92FB2-7C21-4F06-AE3F-562551A758AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D213529E-33EF-43D1-A673-3C94191427D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6539E09-4DC5-4C53-AFF1-70D06BBA9E7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D8DF08-AE73-4529-B212-CA31F02A719E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA054FCE-FABC-4EB5-9759-F77C6F250B44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5DDFC6-4EDF-452A-B561-C9115D91FB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DBAB61-4BFB-4664-98CF-77C617F982A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A7580C2-44DE-48E5-AC26-A221537C95D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54E04A5E-BE90-4A31-8C1D-09A91DD3E7DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A52ADD6-05DE-4A16-9745-D92CD5F46502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF99954-5B94-4092-83B9-7D17EEDB30A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A25AC3-1C81-4234-8B7E-0D59EA1F103B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"93E670B7-6956-4A13-A2A8-F675C0B093FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F1C64E-1446-409D-9F53-1C03724A10E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93813F8D-F22F-43E3-B894-BEB7FA6204F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B280339A-1CED-4FBD-8B3C-A48B07FE9BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC85766E-3A59-4711-85C9-62AC01F2A87D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AC9AA38-4A25-4825-9EDD-E93353A8B195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"388E8952-47B7-426E-AE35-0216FD60CC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"105AB2DD-5E61-4369-8383-B7BF13B85444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF2F4C5C-2B56-450A-813F-254019FBB854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226424B4-7299-4E28-BBB1-0FCC9E2602E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16C918C-A1C4-425B-9C0C-B239B3482A77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5393E265-60C1-43A6-9EFE-505A115053DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DD50D93-8395-4698-A12B-D9CAAB022BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04EE04B4-71DD-4A87-BA2D-79954AEF5DD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A968B30-8456-49C2-A9B0-6CF55CB3C7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BF9787-C734-43DA-B8BF-FF6D6F4E802A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D94BF151-572F-4C50-8E47-9B8BCDD16A77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5114F054-E5AF-4905-83DD-459E1D56B5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B91435-67DA-49E1-A37F-7839728F17BC\"}]}]}],\"references\":[{\"url\":\"http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/46172\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/46989\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51457\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/55314\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:008\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/08/18/8\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/08/19/17\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1424.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/49858\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1643-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=731246\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/46172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/46989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/55314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:008\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/08/18/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/08/19/17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1424.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/49858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1643-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=731246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.