CVE-2021-47784
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-01-15

Assigner: VulnCheck

Description
Cyberfox Web Browser 52.9.1 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the search bar with excessive data. Attackers can generate a 9,000,000 byte payload and paste it into the search bar to trigger an application crash.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-01-15
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
8pecxstudios cyberfox 52.9.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a denial of service (DoS) issue in Cyberfox Web Browser version 52.9.1. An attacker can cause the browser to crash by overflowing the search bar with an excessively large amount of dataβ€”specifically, by pasting a payload of 9,000,000 bytes into the search bar. This overflow triggers the application to crash, disrupting its normal operation. [2]


How can this vulnerability impact me? :

The impact of this vulnerability is a denial of service condition where the Cyberfox browser crashes and becomes unusable when the search bar is flooded with a large payload. This can interrupt your browsing activities and cause loss of any unsaved data or session information within the browser. Since the exploit requires local access to paste the payload, it may be used by someone with physical or remote access to your machine to disrupt your browser usage. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to reproduce the denial of service condition locally. A proof-of-concept involves creating a large payload file with 9,000,000 repetitions of the character 'A' and pasting its contents into the Cyberfox browser's search bar to see if the application crashes. The provided Python script in Resource 2 can be used to generate this payload file named 'output.txt'. There are no specific network detection commands since the exploit is local and requires user interaction. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding pasting or inputting excessively large data into the Cyberfox browser's search bar to prevent triggering the crash. Since the vulnerability is local and requires user interaction, restricting access to the affected system and educating users about this risk can help. Additionally, updating to a newer, patched version of the browser if available or switching to a different browser may mitigate the risk. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart