The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
http://zerodayinitiative.com/advisories/ZDI-11-055/
http://www.vupen.com/english/advisories/2011/0308
http://www.securityfocus.com/bid/46234
http://securityreason.com/securityalert/8329
http://securityreason.com/securityalert/8323
http://securityreason.com/securityalert/8261
http://marc.info/?l=bugtraq&m=130391284726795&w=2
http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp