Directory traversal vulnerability in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to read arbitrary files via directory traversal sequences in a filename in a GET_FILE message.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02810240 - Vendor Advisory | |
References | () http://osvdb.org/72195 - | |
References | () http://secunia.com/advisories/44402 - | |
References | () http://www.securityfocus.com/archive/1/517772/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/47638 - | |
References | () http://www.securitytracker.com/id?1025454 - | |
References | () http://zerodayinitiative.com/advisories/ZDI-11-152/ - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/67209 - |
Information
Published : 2011-05-07 19:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1736
Mitre link : CVE-2011-1736
CVE.ORG link : CVE-2011-1736
JSON object : View
Products Affected
hp
- openview_storage_data_protector
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')