Browse all 3 CVE security advisories affecting OpenCV. AI-powered Chinese analysis, POCs, and references for each vulnerability.
OpenCV serves as a foundational computer vision library widely used for image and video processing across industries. Historically, it has been susceptible to memory corruption vulnerabilities, including buffer overflows and use-after-free flaws, which could enable remote code execution. While not a frequent target for high-profile incidents, its extensive deployment means vulnerabilities can impact numerous applications. The library's C++ foundation and complex codebase contribute to potential memory safety issues. With three current CVEs, ongoing vigilance is required, particularly for applications processing untrusted input. Its modular design allows for selective hardening, though comprehensive security remains challenging given its broad functionality and integration into critical systems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-2618 | OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeHanziSegment memory leak — wechat_qrcode ModuleCWE-401 | 5.3 | Medium | 2023-05-10 |
| CVE-2023-2617 | OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeByteSegment null pointer dereference — wechat_qrcode ModuleCWE-476 | 5.3 | Medium | 2023-05-10 |
This page lists every published CVE security advisory associated with OpenCV. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.