Cyber Posture

CVE-2020-37196

HighPublic PoC

Published: 11 February 2026

Published
11 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0001 2.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37196 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Nsasoft Domain Name Search Software. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 2.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-120

Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.

NVD Description

Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers to crash the application by providing an oversized registration key. Attackers can generate a 1000-character buffer payload and paste it into the registration key field to…

more

trigger an application crash.

Deeper analysisAI

CVE-2020-37196 is a denial-of-service vulnerability affecting Dnss Domain Name Search Software. The issue arises from a buffer overflow condition (CWE-120) triggered by providing an oversized registration key, such as a 1000-character payload pasted into the registration key field, which causes the application to crash. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high impact on availability with no effects on confidentiality or integrity.

Remote attackers can exploit this vulnerability over the network without privileges, authentication, or user interaction by simply entering the oversized payload into the registration key field. Successful exploitation results in a denial of service, crashing the application and disrupting its functionality.

Advisories and related resources include a VulnCheck advisory at https://www.vulncheck.com/advisories/dnss-domain-name-search-software-key-denial-of-service, a proof-of-concept exploit documented on Exploit-DB at https://www.exploit-db.com/exploits/47856, and the vendor site at http://www.nsauditor.com/. No specific patch or mitigation details are provided in the available information.

Details

CWE(s)

Affected Products

nsasoft
domain name search software
all versions

CVEs Like This One

CVE-2020-37197Same product: Nsasoft Domain Name Search Software
CVE-2020-37207Same vendor: Nsasoft
CVE-2020-37130Same vendor: Nsasoft
CVE-2020-37212Same vendor: Nsasoft
CVE-2021-47814Same vendor: Nsasoft
CVE-2020-37201Same vendor: Nsasoft
CVE-2020-37206Same vendor: Nsasoft
CVE-2020-37199Same vendor: Nsasoft
CVE-2020-37211Same vendor: Nsasoft
CVE-2021-47815Same vendor: Nsasoft

References