Armis Vulnerability Intelligence Database
By combining AI with human insight, Armis Vulnerability Intelligence Database offers extended coverage for vulnerabilities that matter to you, your industry, and provides you with clear remediation instructions.
| CVE Name | Severity Score A numerical rating that indicates how dangerous this vulnerability is. | Published Date | CISA KEV |
|---|---|---|---|
| CVE-2020-37052 | 9.8Critical | Jan 30, 2026 | None |
| CVE-2020-37056 | 9.8Critical | Jan 30, 2026 | None |
| CVE-2020-37057 | 8.2High | Jan 30, 2026 | None |
| CVE-2020-37050 | 9.8Critical | Jan 30, 2026 | None |
| CVE-2020-37043 | 9.8Critical | Jan 30, 2026 | None |
| CVE-2020-37049 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37051 | 8.2High | Jan 30, 2026 | None |
| CVE-2020-37042 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37036 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37040 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37032 | 8.8High | Jan 30, 2026 | None |
| CVE-2020-37031 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37029 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37033 | 8.2High | Jan 30, 2026 | None |
| CVE-2020-37035 | 8.2High | Jan 30, 2026 | None |
| CVE-2020-37027 | 9.8Critical | Jan 30, 2026 | None |
| CVE-2020-37028 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37025 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37024 | 8.4High | Jan 30, 2026 | None |
| CVE-2020-37023 | 8.8High | Jan 30, 2026 | None |
Take These Insights to the Next Level
Armis now offers direct API access to Armis Vulnearability Intelligence Database through the AWS Marketplace, transforming it from a powerful research tool into an integrated component of your proactive security posture.
- Seamless Integration: Directly feed Armis's contextual data into your existing stack.
- Automated Workflows: Automate vulnerability lookups in real-time.
- Custom Solutions: Use the raw data to build custom dashboards, reports, alerts.

Perspectives, Insights, and News

This Year Vulnerability Management Moves from the Basement to the C-suite
The evolution of cybersecurity practices are reshaping how organizations tackle vulnerabilities.
READ BLOG→
Closing the Loop
Making security everyone's business with prioritization and collaboration.
READ CASE STUDY→