Vulnerable Systems:
* Hewlett-Packard Data Protector
User interaction is not required to exploit this vulnerability.
The specific flaw exists within the filtering of the EXEC_CMD command. The Data Protector client only verifies file names, not their contents. By supplying malicious code within specific script files, arbitrary code execution is possible under the context of the current user.