Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://zerodayinitiative.com/advisories/ZDI-11-152/", "name": "http://zerodayinitiative.com/advisories/ZDI-11-152/", "tags": [], "refsource": "MISC"}, {"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02810240", "name": "HPSBMA02668", "tags": ["Vendor Advisory"], "refsource": "HP"}, {"url": "http://osvdb.org/72195", "name": "72195", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.securityfocus.com/bid/47638", "name": "47638", "tags": [], "refsource": "BID"}, {"url": "http://secunia.com/advisories/44402", "name": "44402", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.securitytracker.com/id?1025454", "name": "1025454", "tags": [], "refsource": "SECTRACK"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67209", "name": "openview-data-code-exec(67209)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/517772/100/0/threaded", "name": "20110429 ZDI-11-152: HP Data Protector Backup Client Service GET_FILE Directory Traversal Vulnerability", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Directory traversal vulnerability in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to read arbitrary files via directory traversal sequences in a filename in a GET_FILE message."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-22"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2011-1736", "ASSIGNER": "hp-security-alert@hp.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 8.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 7.8, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2011-05-07T19:55Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-09T19:31Z"}