Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
We have discovered 31,881 live websites that are affected by CVE-2020-10878.
Product | ![]() |
Category | Programming Languages |
Vulnerable Domains | 31,881 live websites (82.54% of Perl install base) |
Vulnerable Versions |
|
Vulnerable Versions Count | 52 versions ( 76.47% of all versions) |
![]() | 8,833 websites |
![]() | 3,775 websites |
![]() | 2,350 websites |
![]() | 1,898 websites |
![]() | 1,410 websites |
![]() | 1,352 websites |
![]() | 1,077 websites |
![]() | 918 websites |
![]() | 873 websites |
.com | 11,010 websites |
.ru | 3,131 websites |
.org | 2,043 websites |
.net | 1,843 websites |
.de | 1,735 websites |
.fi | 1,047 websites |
.edu | 635 websites |
.cz | 601 websites |
.at | 515 websites |
.jp | 495 websites |
Domain | Country | Rank | Contacts |
---|---|---|---|
***.***.org | ![]() | *,*** | |
******.com | ![]() | *,*** | |
**********.org | ![]() | *,*** | |
*****.com | ![]() | *,*** | |
**********.*****.de | ![]() | *,*** | |
*****.********.edu | ![]() | *,*** | |
********************.org | ![]() | **,*** | |
****.***.edu | ![]() | **,*** | |
*********.com | ![]() | **,*** | |
**********.com | ![]() | **,*** |
FAQ