Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

nec

About This Vendor

nec is a technology vendor producing software and infrastructure products. As a software provider, nec's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of nec's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 117 known vulnerabilities from nec. This includes 30 critical-severity issues and 62 high-severity issues that represent significant risk. These vulnerabilities affect 616 distinct products across nec's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1995 through 2024, indicating decades of continuous security attention and research. Organizations deploying nec products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-0208 1995-12-12 2025-04-03 - 10.0 Likely
CVE-1999-0078 1996-04-18 2025-04-03 - 1.9 Unknown
CVE-1999-0138 1996-06-26 2025-04-03 - 7.2 Unknown
CVE-1999-0043 1996-12-04 2025-04-03 9.8 10.0 Likely
CVE-1999-0048 1997-01-27 2025-04-03 - 10.0 Likely
CVE-1999-0868 1997-02-20 2025-04-03 - 7.2 Unknown
CVE-1999-0040 1997-05-01 2025-04-03 - 7.2 Unknown
CVE-1999-0024 1997-08-13 2025-04-03 - 5.0 Likely
CVE-1999-0009 1998-04-08 2025-04-03 - 10.0 Likely
CVE-1999-0010 1998-04-08 2025-04-03 - 5.0 Likely
CVE-1999-0011 1998-04-08 2025-04-09 5.4 10.0 Likely
CVE-1999-1435 1998-07-10 2025-04-03 - 7.2 Unknown
CVE-2000-1183 2001-01-09 2025-04-03 - 7.2 Unknown
CVE-2002-0666 2002-11-04 2025-04-03 - 5.0 Likely
CVE-2002-2368 2002-12-31 2025-04-03 - 10.0 Likely
CVE-2005-4465 2005-12-22 2025-04-03 - 7.5 Likely
CVE-2006-6946 2007-01-23 2025-04-09 - 7.5 Likely
CVE-2006-6947 2007-01-23 2025-04-09 - 7.8 Likely
CVE-2007-5557 2007-10-18 2025-04-09 - 7.8 Likely
CVE-2008-0378 2008-01-22 2025-04-09 - 6.8 Likely
CVE-2010-1941 2010-05-19 2025-04-11 - 7.8 Likely
CVE-2010-1943 2010-05-19 2025-04-11 - 7.8 Likely
CVE-2011-1323 2011-05-09 2025-04-11 - 7.8 Likely
CVE-2013-0706 2013-02-22 2025-04-11 - 9.0 Likely
CVE-2013-0717 2013-03-19 2025-04-11 - 6.8 Likely
CVE-2013-7314 2014-01-23 2025-04-11 - 6.8 Likely
CVE-2016-1145 2016-01-30 2025-04-12 7.5 7.8 Likely
CVE-2018-11741 2018-12-26 2024-11-21 9.8 5.0 Likely
CVE-2018-11742 2018-12-26 2024-11-21 9.8 5.0 Likely
CVE-2018-0625 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0626 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0627 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0628 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0629 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0630 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0631 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0632 2019-01-09 2024-11-21 7.2 6.5 Likely
CVE-2018-0633 2019-01-09 2024-11-21 7.2 6.5 Likely
CVE-2018-0634 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0635 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0636 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0637 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0638 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0639 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-0640 2019-01-09 2024-11-21 7.2 6.5 Likely
CVE-2018-0641 2019-01-09 2024-11-21 7.2 6.5 Likely
CVE-2018-16192 2019-01-09 2024-11-21 6.5 3.3 Unknown
CVE-2018-16193 2019-01-09 2024-11-21 5.4 3.5 Unknown
CVE-2018-16194 2019-01-09 2024-11-21 7.2 9.0 Likely
CVE-2018-16195 2019-01-09 2024-11-21 8.8 8.3 Unknown
CVE-2020-5524 2020-02-21 2024-11-21 8.8 8.3 Unknown
CVE-2020-5525 2020-02-21 2024-11-21 8.0 7.7 Unknown
CVE-2020-5533 2020-02-21 2024-11-21 6.1 4.3 Likely
CVE-2020-5534 2020-02-21 2024-11-21 8.0 7.7 Unknown
CVE-2020-12695 2020-06-08 2024-11-21 7.5 7.8 Likely
CVE-2020-10917 2020-07-22 2024-11-21 9.8 7.5 Likely
CVE-2019-20025 2020-07-29 2024-11-21 9.8 10.0 Likely
CVE-2019-20026 2020-07-29 2024-11-21 7.5 5.0 Likely
CVE-2019-20027 2020-07-29 2024-11-21 9.8 7.5 Likely
CVE-2019-20028 2020-07-29 2024-11-21 7.5 5.0 Likely
CVE-2019-20029 2020-07-29 2024-11-21 8.8 6.5 Likely
CVE-2019-20030 2020-07-29 2024-11-21 7.8 4.6 Unknown
CVE-2019-20031 2020-07-29 2024-11-21 9.1 6.4 Likely
CVE-2019-20032 2020-07-29 2024-11-21 6.5 4.0 Likely
CVE-2019-20033 2020-07-29 2024-11-21 9.8 7.5 Likely
CVE-2020-17408 2020-09-10 2024-11-21 7.5 5.0 Likely
CVE-2020-5632 2020-10-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-5684 2020-12-24 2024-11-21 4.8 5.8 Likely
CVE-2020-5633 2021-01-13 2024-11-21 9.8 9.0 Likely
CVE-2020-5685 2021-01-13 2024-11-21 9.8 10.0 Likely
CVE-2020-5686 2021-01-13 2024-11-21 7.5 5.0 Likely
CVE-2020-27859 2021-01-20 2024-11-21 7.5 5.0 Likely
CVE-2021-20653 2021-02-17 2024-11-21 5.3 5.0 Likely
CVE-2021-20680 2021-04-26 2024-11-21 6.1 4.3 Likely
CVE-2021-20708 2021-04-26 2024-11-21 7.2 9.0 Likely
CVE-2021-20709 2021-04-26 2024-11-21 7.2 9.0 Likely
CVE-2021-20711 2021-04-26 2024-11-21 9.8 10.0 Likely
CVE-2021-20712 2021-04-26 2024-11-21 5.3 5.0 Likely
CVE-2021-20740 2021-06-28 2024-11-21 8.8 9.0 Likely
CVE-2021-20700 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-20701 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-20702 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-20703 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-20704 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-20705 2021-11-03 2024-11-21 7.5 5.0 Likely
CVE-2021-20706 2021-11-03 2024-11-21 7.5 5.0 Likely
CVE-2021-20707 2021-11-03 2024-11-21 7.5 5.0 Likely
CVE-2021-44746 2022-02-01 2024-11-21 5.3 5.0 Likely
CVE-2022-25621 2022-03-11 2024-11-21 9.8 7.5 Likely
CVE-2022-34822 2022-11-08 2025-05-02 9.8 - -
CVE-2022-34823 2022-11-08 2025-05-02 9.8 - -
CVE-2022-34824 2022-11-08 2025-05-01 9.8 - -
CVE-2022-34825 2022-11-08 2025-05-01 9.8 - -
CVE-2023-25011 2023-02-15 2025-03-19 7.8 - -
CVE-2023-3330 2023-06-28 2024-11-21 4.3 - -
CVE-2023-3331 2023-06-28 2024-11-21 5.4 - -
CVE-2023-3332 2023-06-28 2024-11-21 4.8 - -
CVE-2023-3333 2023-06-28 2024-11-21 7.2 - -
CVE-2023-39341 2023-08-09 2024-11-21 3.3 - -
CVE-2023-39544 2023-11-17 2024-11-21 8.8 - -
CVE-2023-39545 2023-11-17 2024-11-21 8.8 - -
CVE-2023-39546 2023-11-17 2024-11-21 8.8 - -
CVE-2023-39547 2023-11-17 2024-11-21 8.8 - -
CVE-2023-39548 2023-11-17 2024-11-21 8.8 - -
CVE-2023-3741 2023-11-30 2024-11-21 9.8 - -
CVE-2024-28005 2024-03-28 2025-09-29 4.7 - -
CVE-2024-28006 2024-03-28 2025-09-29 5.3 - -
CVE-2024-28007 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28008 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28009 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28010 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28011 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28012 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28013 2024-03-28 2025-09-29 5.3 - -
CVE-2024-28014 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28015 2024-03-28 2025-09-29 9.8 - -
CVE-2024-28016 2024-03-28 2025-09-29 6.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for nec by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with nec's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.