Lookup for vulnerable packages by Package URL.

GET /api/packages/107167?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/107167?format=api",
    "purl": "pkg:rpm/redhat/ghostscript@9.07-31.el7_6?arch=6",
    "type": "rpm",
    "namespace": "redhat",
    "name": "ghostscript",
    "version": "9.07-31.el7_6",
    "qualifiers": {
        "arch": "6"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73592?format=api",
            "vulnerability_id": "VCID-2xmb-g87r-kuah",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17961.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17961.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93506",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93531",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93534",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93515",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93523",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93522",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642578",
                    "reference_id": "1642578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642578"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910678",
                    "reference_id": "910678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910678"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-3",
                    "reference_id": "ASA-201811-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-786",
                    "reference_id": "AVG-786",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-786"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2",
                    "reference_id": "CVE-2018-17961",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45573.txt",
                    "reference_id": "CVE-2018-17961",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45573.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3803-1/",
                    "reference_id": "USN-3803-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3803-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-17961"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmb-g87r-kuah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51933?format=api",
            "vulnerability_id": "VCID-76r8-79qa-m7h3",
            "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93103",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93113",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93116",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93115",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93124",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93128",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93133",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93131",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652583",
                    "reference_id": "1652583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652583"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-12",
                    "reference_id": "GLSA-201811-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3831-1/",
                    "reference_id": "USN-3831-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3831-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-19409"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76r8-79qa-m7h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73595?format=api",
            "vulnerability_id": "VCID-98kc-jhsa-ykh9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18073.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18073.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51357",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51453",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51487",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51466",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51407",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51434",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51444",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642584",
                    "reference_id": "1642584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642584"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910758",
                    "reference_id": "910758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910758"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-3",
                    "reference_id": "ASA-201811-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-786",
                    "reference_id": "AVG-786",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-786"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3803-1/",
                    "reference_id": "USN-3803-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3803-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-18073"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98kc-jhsa-ykh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51931?format=api",
            "vulnerability_id": "VCID-dr9w-w81e-qugn",
            "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76579",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76582",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76611",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76592",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76623",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76635",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76661",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76641",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76632",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627959",
                    "reference_id": "1627959",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627959"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-12",
                    "reference_id": "GLSA-201811-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3768-1/",
                    "reference_id": "USN-3768-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3768-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-16802"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dr9w-w81e-qugn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51916?format=api",
            "vulnerability_id": "VCID-g57e-a8z2-k3dx",
            "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15911.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15911.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85817",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85839",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85857",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85867",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85882",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85879",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85874",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625832",
                    "reference_id": "1625832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625832"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332",
                    "reference_id": "907332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-12",
                    "reference_id": "GLSA-201811-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3768-1/",
                    "reference_id": "USN-3768-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3768-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-15911"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g57e-a8z2-k3dx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76076?format=api",
            "vulnerability_id": "VCID-p54p-uq6s-17g4",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19134.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19134.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79793",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79794",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.798",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79751",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79758",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79787",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19134"
                },
                {
                    "reference_url": "https://bugs.ghostscript.com/show_bug.cgi?id=700141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.ghostscript.com/show_bug.cgi?id=700141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html"
                },
                {
                    "reference_url": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf"
                },
                {
                    "reference_url": "https://www.ghostscript.com/doc/9.26/News.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.ghostscript.com/doc/9.26/News.htm"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106278"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655599",
                    "reference_id": "1655599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655599"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19134",
                    "reference_id": "CVE-2018-19134",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-19134"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p54p-uq6s-17g4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51924?format=api",
            "vulnerability_id": "VCID-wpws-24gy-j7g8",
            "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16541.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16541.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63721",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63783",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63809",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63766",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63817",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63835",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63849",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63834",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63801",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625846",
                    "reference_id": "1625846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625846"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332",
                    "reference_id": "907332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-12",
                    "reference_id": "GLSA-201811-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3768-1/",
                    "reference_id": "USN-3768-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3768-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-16541"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpws-24gy-j7g8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74680?format=api",
            "vulnerability_id": "VCID-xg6e-rnfz-9qd6",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17183.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17183.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73491",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73499",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73493",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7353",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73543",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73566",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73542",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17183"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632471",
                    "reference_id": "1632471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3773-1/",
                    "reference_id": "USN-3773-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3773-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-17183"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg6e-rnfz-9qd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51932?format=api",
            "vulnerability_id": "VCID-zbxc-g59q-vyab",
            "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18284.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18284.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56076",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56116",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56093",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56051",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56071",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56101",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56105",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642940",
                    "reference_id": "1642940",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642940"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911175",
                    "reference_id": "911175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911175"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-3",
                    "reference_id": "ASA-201811-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-786",
                    "reference_id": "AVG-786",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-12",
                    "reference_id": "GLSA-201811-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3803-1/",
                    "reference_id": "USN-3803-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3803-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-18284"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zbxc-g59q-vyab"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ghostscript@9.07-31.el7_6%3Farch=6"
}