Lookup for vulnerable packages by Package URL.

GET /api/packages/923066?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "ghostscript",
    "version": "9.26~dfsg-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "9.26a~dfsg-1",
    "latest_non_vulnerable_version": "10.07.0~dfsg-2",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51933?format=api",
            "vulnerability_id": "VCID-76r8-79qa-m7h3",
            "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93103",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93113",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93116",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93115",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93124",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93128",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93133",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93131",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9315",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652583",
                    "reference_id": "1652583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652583"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-12",
                    "reference_id": "GLSA-201811-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3831-1/",
                    "reference_id": "USN-3831-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3831-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-j6nh-rfbg-z7f7"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-19409"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76r8-79qa-m7h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76077?format=api",
            "vulnerability_id": "VCID-7w82-m8sf-dbbg",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19475.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19475.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.984",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98403",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98408",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98411",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98412",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98416",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.63587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98421",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654459",
                    "reference_id": "1654459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0229",
                    "reference_id": "RHSA-2019:0229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0229"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3831-1/",
                    "reference_id": "USN-3831-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3831-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-j6nh-rfbg-z7f7"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-19475"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7w82-m8sf-dbbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80954?format=api",
            "vulnerability_id": "VCID-bp4n-15wn-hbcf",
            "summary": "ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14373.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14373.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37706",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37888",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37912",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37791",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37841",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37854",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37832",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37807",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873239",
                    "reference_id": "1873239",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873239"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1852",
                    "reference_id": "RHSA-2021:1852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1852"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-j6nh-rfbg-z7f7"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-14373"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bp4n-15wn-hbcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76080?format=api",
            "vulnerability_id": "VCID-cb98-64e8-afcm",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74378",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74382",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74409",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74385",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74434",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74456",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74427",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74464",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654468",
                    "reference_id": "1654468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654468"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0229",
                    "reference_id": "RHSA-2019:0229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0229"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3831-1/",
                    "reference_id": "USN-3831-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3831-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-j6nh-rfbg-z7f7"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-19477"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cb98-64e8-afcm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76081?format=api",
            "vulnerability_id": "VCID-mb3e-psz1-tugh",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19478.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19478.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70561",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70669",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70653",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70638",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70624",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70575",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70591",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70569",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70615",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7063",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19478"
                },
                {
                    "reference_url": "https://bugs.ghostscript.com/show_bug.cgi?id=699856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html"
                },
                {
                    "reference_url": "https://www.ghostscript.com/doc/9.26/History9.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.ghostscript.com/doc/9.26/History9.htm"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106445",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106445"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655607",
                    "reference_id": "1655607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655607"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19478",
                    "reference_id": "CVE-2018-19478",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-j6nh-rfbg-z7f7"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-19478"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3e-psz1-tugh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76076?format=api",
            "vulnerability_id": "VCID-p54p-uq6s-17g4",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19134.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19134.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7982",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.798",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79793",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79751",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79758",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79787",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79794",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19134"
                },
                {
                    "reference_url": "https://bugs.ghostscript.com/show_bug.cgi?id=700141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.ghostscript.com/show_bug.cgi?id=700141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html"
                },
                {
                    "reference_url": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf"
                },
                {
                    "reference_url": "https://www.ghostscript.com/doc/9.26/News.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.ghostscript.com/doc/9.26/News.htm"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106278"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655599",
                    "reference_id": "1655599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655599"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19134",
                    "reference_id": "CVE-2018-19134",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3834",
                    "reference_id": "RHSA-2018:3834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3834"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-j6nh-rfbg-z7f7"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-19134"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p54p-uq6s-17g4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76079?format=api",
            "vulnerability_id": "VCID-rbpv-s7ks-37f9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19476.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19476.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74378",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74382",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74409",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74385",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74434",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74456",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74427",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00823",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74464",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654464",
                    "reference_id": "1654464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0229",
                    "reference_id": "RHSA-2019:0229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0229"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3831-1/",
                    "reference_id": "USN-3831-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3831-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923066?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api",
                    "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-j6nh-rfbg-z7f7"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1nh4-crmx-jfb5"
                        },
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-rdmp-hfbg-2kh5"
                        },
                        {
                            "vulnerability": "VCID-t3n4-wrgr-bkdy"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k837-n44h-pkbm"
                        },
                        {
                            "vulnerability": "VCID-wzad-uxqp-63h3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api",
                    "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-19476"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rbpv-s7ks-37f9"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"
}