Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:nsasoft:nsauditor:3.0.28:*:*:*:*:*:*:* cpe:2.3:a:nsasoft:nsauditor:3.2.1.0:*:*:*:*:*:*:* |
Fri, 06 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nsasoft
Nsasoft nsauditor |
|
| Vendors & Products |
Nsasoft
Nsasoft nsauditor |
Thu, 05 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nsauditor 3.0.28 and 3.2.1.0 contains a buffer overflow vulnerability in the DNS Lookup tool that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious DNS query payload to trigger a three-byte overwrite, bypass ASLR, and execute shellcode through a carefully constructed exploit. | |
| Title | Nsauditor 3.2.1.0 - Buffer Overflow (SEH+ASLR bypass (3 bytes overwrite)) | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:05:18.864Z
Reserved: 2026-02-03T16:27:45.303Z
Link: CVE-2020-37119
Updated: 2026-02-06T20:33:09.285Z
Status : Analyzed
Published: 2026-02-05T17:16:06.357
Modified: 2026-02-09T22:08:04.473
Link: CVE-2020-37119
No data.
OpenCVE Enrichment
Updated: 2026-02-06T12:05:23Z