CVE-2020-36943
Denial of Service via Buffer Overflow in aSc TimeTables Subject Titles
Publication date: 2026-01-28
Last updated on: 2026-01-28
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| asc | timettables | 2021.6.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in aSc TimeTables 2021.6.2 is a denial of service issue where attackers can crash the application by inputting excessively long data into the subject title fields. Specifically, an attacker can paste a 10,000-character buffer into the subject title, causing the application to become unstable and potentially crash.
How can this vulnerability impact me? :
The vulnerability can cause the aSc TimeTables application to crash, leading to denial of service. This means legitimate users may be unable to access or use the application while it is unstable or down, potentially disrupting scheduling and related operations.