CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “nec”

639 vulnerabilities found for “nec”

Page 1 of 32

CVE-2023-22387
HIGH7.8

Arbitrary memory overwrite when VM gets compromised in TX write leading to Memory Corruption.

qualcomm / 315_5g_iot_firmware+270
Local
Published Jul 4, 2023
Page 1 of 32
CVE-2023-21635
MEDIUM6.7

Memory Corruption in Data Network Stack & Connectivity when sim gets detected on telephony.

qualcomm / aqt1000_firmware+48
Local
Published Jul 4, 2023
CVE-2023-21633
MEDIUM6.7

Memory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request.

qualcomm / apq8064au_firmware+96
Local
Published Jul 4, 2023
CVE-2023-21629
MEDIUM6.8

Memory Corruption in Modem due to double free while parsing the PKCS15 sim files.

qualcomm / 315_5g_firmware+211
Physical
Published Jul 4, 2023
CVE-2023-22386
HIGH7.8

Memory Corruption in WLAN HOST while processing WLAN FW request to allocate memory.

qualcomm / ar8035_firmware+200
Local
Published Jul 4, 2023
CVE-2023-21631
HIGH7.5

Weak Configuration due to improper input validation in Modem while processing LTE security mode command message received from network.

qualcomm / 315_5g_firmware+159
Network
Published Jul 4, 2023
CVE-2023-21624
MEDIUM6.2

Information disclosure in DSP Services while loading dynamic module.

qualcomm / fastconnect_6700_firmware+66
Local
Published Jul 4, 2023
CVE-2023-21637
MEDIUM6.7

Memory corruption in Linux while calling system configuration APIs.

qualcomm / aqt1000_firmware+54
Local
Published Jul 4, 2023
CVE-2023-21672
HIGH8.4

Memory corruption in Audio while running concurrent tunnel playback or during concurrent audio tunnel recording sessions.

qualcomm / fastconnect_6700_firmware+56
Local
Published Jul 4, 2023
CVE-2023-21641
MEDIUM6.6

An app with non-privileged access can change global system brightness and cause undesired system behavior.

qualcomm / fastconnect_6900_firmware+14
Local
Published Jul 4, 2023
CVE-2023-21638
MEDIUM6.7

Memory corruption in Video while calling APIs with different instance ID than the one received in initialization.

qualcomm / aqt1000_firmware+35
Local
Published Jul 4, 2023
CVE-2023-21640
MEDIUM6.7

Memory corruption in Linux when the file upload API is called with parameters having large buffer.

qualcomm / fastconnect_6900_firmware+5
Local
Published Jul 4, 2023
CVE-2022-23305
CRITICAL9.8

By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

apache / log4j+41
Network
Published Jan 18, 2022
CVE-2022-23307
HIGH8.8

CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.

apache / chainsaw+38
Network
Published Jan 18, 2022
CVE-2022-23302
HIGH8.8

JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

apache / log4j+39
Network
Published Jan 18, 2022
CVE-2021-45105
MEDIUM5.9

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

apache / log4j+207
Network
Published Dec 18, 2021
CVE-2020-24750
HIGH8.1

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.

fasterxml / jackson-databind+36
Network
Published Sep 17, 2020
CVE-2020-24616
HIGH8.1

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).

fasterxml / jackson-databind+32
Network
Published Aug 25, 2020
CVE-2019-0222
HIGH7.5

In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.

apache / activemq+12
Network
Published Mar 28, 2019
CVE-2018-15756
HIGH7.5

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.

vmware / spring_framework+113
Network
Published Oct 18, 2018