Office Product Key Finder is offline product key finder software and allows to recover and find microsoft office 25 character product key for Microsoft Office 2013, Microsoft Office 2010, Microsoft Office 2007 and Microsoft Office 2003 installed on your PC or on network computers. An attacker can exploit this vulnerability by creating a malicious file containing a large number of 'A' characters followed by a large number of 'O' characters and then copying the content of the file to the clipboard. The attacker then opens Office Product Key Finder, selects 'Find Product Key', pastes the clipboard content into the 'Product Name' field and clicks 'Find Product Key'. This will cause the application to crash.
NBMonitor is vulnerable to a denial of service attack when a malicious user sends a large amount of data to the 'Key' field. This causes the application to crash.
RemShutdown 2.9.0.0 is vulnerable to a denial of service attack when a maliciously crafted string of 1000 characters is pasted into the 'Name' field when registering the software. This causes the software to crash.
RemShutdown 2.9.0.0 is vulnerable to a denial of service attack when a maliciously crafted string is entered into the 'Key' field. An attacker can exploit this vulnerability by creating a file containing a maliciously crafted string and then entering the contents of the file into the 'Key' field. This will cause the application to crash.
A buffer overflow vulnerability exists in TextCrawler Pro 3.1.1 when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a file containing a large amount of data and then opening it in TextCrawler Pro. This will cause the application to crash, resulting in a denial of service condition.
NetShareWatcher 1.5.8.0 is vulnerable to a denial of service attack when a maliciously crafted string is pasted into the 'Key' field when registering the software. This causes the software to crash.
A denial of service vulnerability exists in ShareAlarmPro Advanced Network Access Control when a maliciously crafted 'Key' is entered into the 'Register -> Enter Registration Code' field, resulting in a crash of the application.
BlueAuditor is prone to a denial-of-service vulnerability because the application fails to properly handle user-supplied input. An attacker can exploit this issue to crash the application, denying service to legitimate users.
A denial of service vulnerability exists in Dnss Domain Name Search Software, caused by a long string of characters being pasted into the 'Key' field when registering the software. A successful exploit could cause the application to crash.
A malicious user can cause a denial of service (DoS) by sending a specially crafted file (poc.txt) containing 1000 'A' characters to the 'Key' field of the SpotIE 2.9.5 software, which will cause the software to crash.