# jiNa OCR Image to Text 1.0 - Denial of Service (PoC) ## Vulnerability Overview * **Vulnerability Type**: Denial of Service (DoS) * **EDB-ID**: 45380 * **Author**: Gionathan "John" Reale * **Publication Date**: 2018-09-12 * **Affected Versions**: 1.0 ## Impact Scope * **Platform**: Windows x86 6 * **Affected Application**: jiNa OCR Image to Text 1.0 ## Remediation * No specific remediation or patch information is provided on the page. ## POC Code ```python # Exploit Title: jiNa OCR Image to Text 1.0 - Denial of Service (PoC) # Author: Gionathan "John" Reale # Discovery Date: 2018-09-10 # Software Link: http://www.convertimagetotext.net/downloadsoftware.php # Tested Version: 1.0 # Tested on OS: Windows 7 32-bit # Steps to Reproduce: Run the python exploit script, it will create a new # file with the name "exploit.png"; # Now start the program. Now when you are inside of the program attempt to convert the file "exploit.png" to pdf. # Now wait and you will see a crash! #!/usr/bin/python ```