CVE-2020-37190
Awaiting Analysis Awaiting Analysis - Queue
Denial of Service via Input Overflow in Top Password Firefox

Publication date: 2026-02-11

Last updated on: 2026-02-12

Assigner: VulnCheck

Description
Top Password Firefox Password Recovery 2.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing input fields. Attackers can trigger the vulnerability by inserting 5000 characters into the User Name or Registration Code input fields.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-02-12
Generated
2026-05-07
AI Q&A
2026-02-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
top-password firefox_password_recovery 2.8
top-password pcunlocker *
top-password keyfinder_plus *
top-password outlook_password_recovery *
top-password sql_server_password_changer *
top-password protect_my_folders *
top_password firefox_password_recovery 2.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2020-37190 is a denial of service vulnerability in Top Password Firefox Password Recovery version 2.8 and earlier. It occurs because the application does not properly check the size of input data when copying it, leading to a buffer overflow.

An attacker can trigger this vulnerability by entering 5000 characters into either the User Name or Registration Code input fields, which causes the application to crash or become unresponsive.


How can this vulnerability impact me? :

This vulnerability can cause the Top Password Firefox Password Recovery application to crash or become unresponsive, resulting in a denial of service condition.

An attacker with local access can exploit this by inputting excessively long strings into specific fields, disrupting the normal operation of the software.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the denial of service condition on the Top Password Firefox Password Recovery application version 2.8 by inputting an excessively long string of 5000 characters into the User Name or Registration Code fields.'}, {'type': 'paragraph', 'content': "A proof-of-concept exploit involves using a simple script or command to input 5000 characters (such as the letter 'A') into these fields to see if the application crashes or becomes unresponsive."}, {'type': 'paragraph', 'content': "For example, a Python script can be used to create a file containing 5000 'A's which can then be used as input to the application."}, {'type': 'list_item', 'content': "Use a Python script to generate a test input file with 5000 characters: \n\n```python\nwith open('poc.txt', 'w') as f:\n f.write('A' * 5000)\n```\n\nThen input this file content into the User Name or Registration Code fields of the application to test for the crash."}] [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the input of excessively long strings (such as 5000 characters) into the User Name or Registration Code fields of Top Password Firefox Password Recovery version 2.8.

If possible, restrict or sanitize input lengths to prevent buffer overflow conditions.

Additionally, consider upgrading to a newer version of the software if available, or contact the vendor for patches or updates that address this denial of service vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart