Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
We have discovered 36,191 live websites that are affected by CVE-2021-36770.
Product | ![]() |
Category | Programming Languages |
Vulnerable Domains | 36,191 live websites (93.70% of Perl install base) |
Vulnerable Versions |
|
Vulnerable Versions Count | 56 versions ( 82.35% of all versions) |
![]() | 10,031 websites |
![]() | 3,811 websites |
![]() | 2,747 websites |
![]() | 2,532 websites |
![]() | 1,903 websites |
![]() | 1,420 websites |
![]() | 1,391 websites |
![]() | 1,098 websites |
![]() | 1,059 websites |
.com | 13,448 websites |
.ru | 3,161 websites |
.org | 2,282 websites |
.net | 1,977 websites |
.de | 1,848 websites |
.fi | 1,054 websites |
.cz | 744 websites |
.edu | 716 websites |
.fr | 543 websites |
.at | 519 websites |
Domain | Country | Rank | Contacts |
---|---|---|---|
******.********.***.uk | ![]() | *,*** | |
***.***.org | ![]() | *,*** | |
******.com | ![]() | *,*** | |
**********.org | ![]() | *,*** | |
*****.com | ![]() | *,*** | |
**********.*****.de | ![]() | *,*** | |
*****.********.edu | ![]() | *,*** | |
********************.org | ![]() | **,*** | |
****.***.edu | ![]() | **,*** | |
*********.com | ![]() | **,*** |