{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42585?format=json","vulnerability_id":"VCID-as99-e7pb-eqcw","summary":"Multiple vulnerabilities in Mesa could result in execution of\n    arbitrary code or Denial of Service.","aliases":[{"alias":"CVE-2012-5129"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930767?format=json","purl":"pkg:deb/debian/mesa@8.0.5-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@8.0.5-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1035455?format=json","purl":"pkg:deb/debian/mesa@8.0.5-4%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@8.0.5-4%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/930764?format=json","purl":"pkg:deb/debian/mesa@20.3.5-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@20.3.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930762?format=json","purl":"pkg:deb/debian/mesa@22.3.6-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@22.3.6-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930766?format=json","purl":"pkg:deb/debian/mesa@25.0.7-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@25.0.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930765?format=json","purl":"pkg:deb/debian/mesa@26.0.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000454?format=json","purl":"pkg:deb/debian/mesa@26.0.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067581?format=json","purl":"pkg:deb/debian/mesa@26.0.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088703?format=json","purl":"pkg:deb/debian/mesa@26.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/76086?format=json","purl":"pkg:ebuild/media-libs/mesa@9.1.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/mesa@9.1.4"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035447?format=json","purl":"pkg:deb/debian/mesa@2.6-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@2.6-3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035448?format=json","purl":"pkg:deb/debian/mesa@3.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@3.0-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1035449?format=json","purl":"pkg:deb/debian/mesa@3.1-17","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@3.1-17"},{"url":"http://public2.vulnerablecode.io/api/packages/1035450?format=json","purl":"pkg:deb/debian/mesa@3.4.2.1-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@3.4.2.1-4"},{"url":"http://public2.vulnerablecode.io/api/packages/1035451?format=json","purl":"pkg:deb/debian/mesa@5.0.0-5.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@5.0.0-5.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1035452?format=json","purl":"pkg:deb/debian/mesa@6.5.1-0.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@6.5.1-0.6"},{"url":"http://public2.vulnerablecode.io/api/packages/1035453?format=json","purl":"pkg:deb/debian/mesa@7.0.3-7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@7.0.3-7"},{"url":"http://public2.vulnerablecode.io/api/packages/1035454?format=json","purl":"pkg:deb/debian/mesa@7.7.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-as99-e7pb-eqcw"},{"vulnerability":"VCID-au65-xxvr-c7hr"},{"vulnerability":"VCID-gers-qjkn-2fhn"},{"vulnerability":"VCID-qqd6-hfbc-3fgt"},{"vulnerability":"VCID-zkay-7cyh-nkb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@7.7.1-6"}],"references":[{"reference_url":"http://googlechromereleases.blogspot.com/2012/11/stable-update-for-chrome-os_30.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2012/11/stable-update-for-chrome-os_30.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5129.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5129","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63508","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63261","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63348","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63365","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63384","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63412","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63464","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63429","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63456","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5129"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=145525","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=145525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5129"},{"reference_url":"http://www.ubuntu.com/usn/USN-1818-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1818-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695248","reference_id":"695248","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695248"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=883243","reference_id":"883243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=883243"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome:23.0.1271.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome:23.0.1271.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5129","reference_id":"CVE-2012-5129","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5129"},{"reference_url":"https://security.gentoo.org/glsa/201404-06","reference_id":"GLSA-201404-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-06"},{"reference_url":"https://usn.ubuntu.com/1818-1/","reference_id":"USN-1818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1818-1/"}],"weaknesses":[{"cwe_id":122,"name":"Heap-based Buffer Overflow","description":"A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc()."},{"cwe_id":119,"name":"Improper Restriction of Operations within the Bounds of a Memory Buffer","description":"The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer."}],"exploits":[],"severity_range_score":"7.5 - 7.5","exploitability":"0.5","weighted_severity":"6.8","risk_score":3.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-as99-e7pb-eqcw"}