Security Advisories (3)
CVE-2016-1238 (2016-07-27)

Loading optional modules from . (current directory).

CVE-2021-36770 (2021-07-17)

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVE-2011-2939 (2012-01-13)

Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.

Changes for version 1.11

  • t/encoding.t
  • t/jperl.t ! MANIFEST Missing files from the MANIFEST fixed. Message-Id: <20020401010156.H10509@alpha.hut.fi> Version incremented just to make CPAN happy.

Documentation

Perl Encode Module Generator
iconv(1), reinvented in perl
Supported encodings by Encode

Modules

Single Byte Encodings
China-based Chinese Encodings
EBCDIC Encodings
character encodings
Japanese Encodings
Korean Encodings
Symbol Encodings
Taiwan-based Chinese Encodings
allows you to write your script in non-asii or non-utf8
for internal use only
alias defintions to encodings
Internally used by Encode::??::ISO_2022_*
internally used by Encode::CN
Encode Implementation Base Class
for internal use only
internally used by Encode::JP
internally used by Encode::JP
internally used by Encode::JP::2022_JP*
internally used by Encode::JP
for internal use only
for internal use only
for internal use only
for internal use only

Provides

in lib/Encode/KR/2022_KR.pm