{"api_version":"1","generated_at":"2026-04-22T23:31:35+00:00","cve":"CVE-2023-5129","urls":{"html":"https://cve.report/CVE-2023-5129","api":"https://cve.report/api/cve/CVE-2023-5129.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-5129","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-5129"},"summary":{"title":"CVE-2023-5129","description":"** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Duplicate of CVE-2023-4863.","state":"REJECT","assigner":"security@google.com","published_at":"2023-09-25 21:15:00","updated_at":"2023-11-07 04:23:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://chromium.googlesource.com/webm/libwebp/+/2af26267cdfcb63a88e5c74a85927a12d6ca1d76","name":"https://chromium.googlesource.com/webm/libwebp/+/2af26267cdfcb63a88e5c74a85927a12d6ca1d76","refsource":"MISC","tags":[],"title":"2af26267cdfcb63a88e5c74a85927a12d6ca1d76 - webm/libwebp - Git at Google","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/09/26/1","name":"http://www.openwall.com/lists/oss-security/2023/09/26/1","refsource":"MISC","tags":[],"title":"oss-security - Re: CVE-2023-4863: libwebp: Heap buffer overflow in\n WebP Codec","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a","name":"https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a","refsource":"MISC","tags":[],"title":"902bc9190331343b2017211debcec8d2ab87e17a - webm/libwebp - Git at Google","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-5129","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5129","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"5129","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webmproject","cpe5":"libwebp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-5129","qid":"284556","title":"Fedora Security Update for libwebp (FEDORA-2023-2a0668fe43)"},{"cve":"CVE-2023-5129","qid":"284562","title":"Fedora Security Update for chromium (FEDORA-2023-d66a01ad4f)"},{"cve":"CVE-2023-5129","qid":"284563","title":"Fedora Security Update for chromium (FEDORA-2023-0cd03c3746)"},{"cve":"CVE-2023-5129","qid":"284582","title":"Fedora Security Update for firefox (FEDORA-2023-97eea79acb)"},{"cve":"CVE-2023-5129","qid":"284597","title":"Fedora Security Update for firefox (FEDORA-2023-09ec498a2a)"},{"cve":"CVE-2023-5129","qid":"284625","title":"Fedora Security Update for libwebp (FEDORA-2023-e692a72898)"},{"cve":"CVE-2023-5129","qid":"356442","title":"Amazon Linux Security Advisory for thunderbird : ALAS2-2023-2291"},{"cve":"CVE-2023-5129","qid":"961034","title":"Rocky Linux Security Update for libwebp (RLSA-2023:5214)"},{"cve":"CVE-2023-5129","qid":"961036","title":"Rocky Linux Security Update for thunderbird (RLSA-2023:5201)"},{"cve":"CVE-2023-5129","qid":"995522","title":"Python (Pip) Security Update for pillow (GHSA-56pw-mpj4-fxww)"},{"cve":"CVE-2023-5129","qid":"995523","title":"Python (Pip) Security Update for imagecodecs (GHSA-94vc-p8w7-5p49)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-5129","ASSIGNER":"security@google.com","STATE":"REJECT"},"description":{"description_data":[{"lang":"eng","value":"** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Duplicate of CVE-2023-4863."}]}},"nvd":{"publishedDate":"2023-09-25 21:15:00","lastModifiedDate":"2023-11-07 04:23:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}