Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T18:09:01.902Z
Reserved: 2008-08-14T00:00:00Z
Link: CVE-2008-3685

No data.

Status : Modified
Published: 2009-10-22T16:00:00.500
Modified: 2024-11-21T00:49:52.440
Link: CVE-2008-3685

No data.