The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp
http://marc.info/?l=bugtraq&m=130391284726795&w=2
http://securityreason.com/securityalert/8261
http://securityreason.com/securityalert/8323
http://securityreason.com/securityalert/8329
http://www.securityfocus.com/bid/46234