{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:34:45.372","vulnerabilities":[{"cve":{"id":"CVE-2008-3685","sourceIdentifier":"cve@mitre.org","published":"2009-10-22T16:00:00.500","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en aws_tmxn.exe en el servicio Admin Agent en el servidor en EMC Documentum ApplicationXtender Workflow, posiblemente v5.40 SP1 y anteriores, permite a atacantes remotos subir ficheros arbitrarios y ejecutar código de forma arbitraria a través de secuencias de salto de directorio en peticiones al puerto TCP 2606."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:emc:documentum_applicationxtender_workflow_manager:*:sp1:*:*:*:*:*:*","versionEndIncluding":"5.40","matchCriteriaId":"5303D4A1-B701-4B63-AB78-F5B79AD81668"}]}]}],"references":[{"url":"http://secunia.com/advisories/37070","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-08-095/","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/37070","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-08-095/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}