cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2011-4192,https://securityvulnerability.io/vulnerability/CVE-2011-4192,,"kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by ""double quotes in kiwi_oemtitle of .profile.""",Suse,"Studio Extension For System Z,Kiwi,Studio Onsite",,,0.0019099999917671084,false,,false,false,false,,,false,false,,2014-04-16T18:00:00.000Z,0 CVE-2011-4195,https://securityvulnerability.io/vulnerability/CVE-2011-4195,,"kiwi before 4.98.05, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in an image name.",Suse,"Studio Extension For System Z,Studio Onsite,Kiwi",,,0.006560000125318766,false,,false,false,false,,,false,false,,2014-04-16T18:00:00.000Z,0 CVE-2011-3180,https://securityvulnerability.io/vulnerability/CVE-2011-3180,,"kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.",Suse,"Studio Extension For System Z,Studio Onsite,Kiwi",,,0.006560000125318766,false,,false,false,false,,,false,false,,2014-04-16T18:00:00.000Z,0