{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T02:18:24.457","vulnerabilities":[{"cve":{"id":"CVE-2011-1736","sourceIdentifier":"hp-security-alert@hp.com","published":"2011-05-07T19:55:01.497","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to read arbitrary files via directory traversal sequences in a filename in a GET_FILE message."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en OmniInet.exe en Backup Client Service en HP OpenView Storage Data Protector v6.00, v6.10, y v6.11 permite a atacantes remotos leer archivos arbitrarios a través de secuencias de salto de directorio en un nombre de fichero en un mensaje GET_FILE."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:P","baseScore":8.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":7.8,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*","matchCriteriaId":"DD25EB53-4062-4054-BBB9-AF0676E86C98"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*","matchCriteriaId":"2F55A6FD-8104-4A26-A803-F8971AED5940"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*","matchCriteriaId":"42BAF885-79EF-418C-A391-751AA8593E85"}]}]}],"references":[{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02810240","source":"hp-security-alert@hp.com","tags":["Vendor Advisory"]},{"url":"http://osvdb.org/72195","source":"hp-security-alert@hp.com"},{"url":"http://secunia.com/advisories/44402","source":"hp-security-alert@hp.com"},{"url":"http://www.securityfocus.com/archive/1/517772/100/0/threaded","source":"hp-security-alert@hp.com"},{"url":"http://www.securityfocus.com/bid/47638","source":"hp-security-alert@hp.com"},{"url":"http://www.securitytracker.com/id?1025454","source":"hp-security-alert@hp.com"},{"url":"http://zerodayinitiative.com/advisories/ZDI-11-152/","source":"hp-security-alert@hp.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/67209","source":"hp-security-alert@hp.com"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02810240","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://osvdb.org/72195","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/44402","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/517772/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/47638","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1025454","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://zerodayinitiative.com/advisories/ZDI-11-152/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/67209","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}