Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
openjpeg Vendor: uclouvain

About This Product

openjpeg is a software product offered by uclouvain. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 82 known vulnerabilities affecting uclouvain openjpeg. This includes 5 critical-severity issues and 31 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2012 to 2025, indicating a sustained research interest and ongoing security attention. 44 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-1499 2012-04-11 2025-04-11 - 9.3 Likely
CVE-2009-5030 2012-07-18 2025-04-11 - 6.8 Likely
CVE-2012-3358 2012-07-18 2025-04-11 - 10.0 Likely
CVE-2012-3535 2012-09-05 2025-04-11 - 6.8 Likely
CVE-2013-1447 2013-12-12 2025-04-11 - 5.0 Likely
CVE-2013-6045 2013-12-12 2025-04-11 - 7.5 Likely
CVE-2013-6052 2013-12-12 2025-04-11 - 5.0 Likely
CVE-2013-6054 2013-12-12 2025-04-11 - 7.5 Likely
CVE-2013-4289 2014-04-18 2025-04-12 - 10.0 Likely
CVE-2013-4290 2014-04-18 2025-04-12 - 10.0 Likely
CVE-2013-6887 2014-04-27 2025-04-12 - 6.4 Likely
CVE-2013-6053 2014-04-27 2025-04-12 - 5.0 Likely
CVE-2016-1923 2016-01-27 2025-04-12 6.5 4.3 Likely
CVE-2016-1924 2016-01-27 2025-04-12 6.5 4.3 Likely
CVE-2015-8871 2016-09-21 2025-04-12 9.8 7.5 Likely
CVE-2016-7163 2016-09-21 2025-04-12 7.8 6.8 Likely
CVE-2016-7445 2016-10-03 2025-04-12 7.5 5.0 Likely
CVE-2016-8332 2016-10-28 2025-04-12 7.5 6.8 Likely
CVE-2016-9112 2016-10-29 2025-04-12 7.5 5.0 Likely
CVE-2016-9113 2016-10-30 2025-04-12 7.5 5.0 Likely
CVE-2016-9114 2016-10-30 2025-04-12 7.5 5.0 Likely
CVE-2016-9115 2016-10-30 2025-04-12 6.5 4.3 Likely
CVE-2016-9116 2016-10-30 2025-04-12 6.5 4.3 Likely
CVE-2016-9117 2016-10-30 2025-04-12 6.5 4.3 Likely
CVE-2016-9118 2016-10-30 2025-04-12 5.3 5.0 Likely
CVE-2016-9675 2016-12-22 2025-04-12 7.8 6.8 Likely
CVE-2016-3183 2017-02-03 2025-04-20 5.5 4.3 Likely
CVE-2016-4796 2017-02-03 2025-04-20 5.5 4.3 Likely
CVE-2016-4797 2017-02-03 2025-04-20 5.5 4.3 Likely
CVE-2017-12982 2017-08-21 2025-04-20 5.5 4.3 Likely
CVE-2016-10504 2017-08-30 2025-04-20 6.5 4.3 Likely
CVE-2016-10505 2017-08-30 2025-04-20 6.5 4.3 Likely
CVE-2016-10506 2017-08-30 2025-04-20 6.5 4.3 Likely
CVE-2016-10507 2017-08-30 2025-04-20 6.5 4.3 Likely
CVE-2017-14039 2017-08-30 2025-04-20 8.8 6.8 Likely
CVE-2017-14040 2017-08-30 2025-04-20 8.8 6.8 Likely
CVE-2017-14041 2017-08-30 2025-04-20 8.8 6.8 Likely
CVE-2017-14151 2017-09-05 2025-04-20 8.8 6.8 Likely
CVE-2017-14152 2017-09-05 2025-04-20 8.8 6.8 Likely
CVE-2017-14164 2017-09-06 2025-04-20 8.8 6.8 Likely
CVE-2015-1239 2017-10-18 2025-04-20 6.5 4.3 Likely
CVE-2017-17479 2017-12-08 2025-04-20 9.8 7.5 Likely
CVE-2017-17480 2017-12-08 2025-04-20 9.8 7.5 Likely
CVE-2018-5727 2018-01-16 2024-11-21 6.5 4.3 Likely
CVE-2018-5785 2018-01-19 2024-11-21 6.5 4.3 Likely
CVE-2018-6616 2018-02-04 2024-11-21 5.5 4.3 Likely
CVE-2018-7648 2018-03-02 2024-11-21 9.8 7.5 Likely
CVE-2014-0158 2018-04-10 2024-11-21 8.8 6.8 Likely
CVE-2018-14423 2018-07-19 2024-11-21 7.5 5.0 Likely
CVE-2016-9573 2018-08-01 2024-11-21 6.5 5.8 Likely
CVE-2016-9581 2018-08-01 2024-11-21 3.3 6.8 Likely
CVE-2016-9572 2018-08-01 2024-11-21 5.9 4.3 Likely
CVE-2016-9580 2018-08-01 2024-11-21 3.3 6.8 Likely
CVE-2018-16375 2018-09-03 2024-11-21 8.8 6.8 Likely
CVE-2018-16376 2018-09-03 2024-11-21 8.8 6.8 Likely
CVE-2018-18088 2018-10-09 2024-11-21 6.5 4.3 Likely
CVE-2019-6988 2019-01-28 2024-11-21 6.5 4.3 Likely
CVE-2018-20845 2019-06-26 2024-11-21 6.5 4.3 Likely
CVE-2018-20846 2019-06-26 2024-11-21 6.5 4.3 Likely
CVE-2018-20847 2019-06-26 2024-11-21 8.8 6.8 Likely
CVE-2019-12973 2019-06-26 2024-11-21 5.5 4.3 Likely
CVE-2018-21010 2019-09-05 2024-11-21 8.8 6.8 Likely
CVE-2020-6851 2020-01-13 2024-11-21 7.5 5.0 Likely
CVE-2020-8112 2020-01-28 2024-11-21 8.8 6.8 Likely
CVE-2016-3182 2020-02-20 2024-11-21 5.5 4.3 Likely
CVE-2020-15389 2020-06-29 2024-11-21 6.5 5.8 Likely
CVE-2020-27841 2021-01-05 2024-11-21 5.5 4.3 Likely
CVE-2020-27842 2021-01-05 2024-11-21 5.5 4.3 Likely
CVE-2020-27843 2021-01-05 2024-11-21 5.5 7.1 Likely
CVE-2020-27844 2021-01-05 2024-11-21 7.8 8.3 Likely
CVE-2020-27845 2021-01-05 2024-11-21 5.5 4.3 Likely
CVE-2020-27814 2021-01-26 2024-11-21 7.8 6.8 Likely
CVE-2021-29338 2021-04-14 2025-11-03 5.5 4.3 Likely
CVE-2020-27824 2021-05-13 2024-11-21 5.5 4.3 Likely
CVE-2020-27823 2021-05-13 2024-11-21 7.8 6.8 Likely
CVE-2021-3575 2022-03-04 2025-11-03 7.8 6.8 Likely
CVE-2022-1122 2022-03-29 2025-11-03 5.5 4.3 Likely
CVE-2023-39328 2024-07-09 2025-08-18 5.5 - -
CVE-2023-39327 2024-07-13 2026-03-09 4.3 - -
CVE-2023-39329 2024-07-13 2026-03-09 6.5 - -
CVE-2025-54874 2025-08-05 2025-09-26 9.8 - -
CVE-2025-50952 2025-08-07 2025-12-29 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for uclouvain openjpeg by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.