{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-04-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"EAServer Manager in Sybase EAServer 5.2 and 5.3 allows remote authenticated users, possibly guests, to obtain password credentials of arbitrary users via unspecified vectors involving (1) connection caches, (2) open password prompts, and (3) stored custom connection profiles."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-19T15:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"easerver-password-disclosure(25777)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25777"},{"name":"17508","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/17508"},{"name":"19605","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19605"},{"name":"ADV-2006-1344","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1344"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.sybase.com/detail?id=1040117"},{"name":"1015913","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015913"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-1829","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"EAServer Manager in Sybase EAServer 5.2 and 5.3 allows remote authenticated users, possibly guests, to obtain password credentials of arbitrary users via unspecified vectors involving (1) connection caches, (2) open password prompts, and (3) stored custom connection profiles."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"easerver-password-disclosure(25777)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25777"},{"name":"17508","refsource":"BID","url":"http://www.securityfocus.com/bid/17508"},{"name":"19605","refsource":"SECUNIA","url":"http://secunia.com/advisories/19605"},{"name":"ADV-2006-1344","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1344"},{"name":"http://www.sybase.com/detail?id=1040117","refsource":"CONFIRM","url":"http://www.sybase.com/detail?id=1040117"},{"name":"1015913","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015913"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T17:27:29.383Z"},"title":"CVE Program Container","references":[{"name":"easerver-password-disclosure(25777)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25777"},{"name":"17508","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/17508"},{"name":"19605","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19605"},{"name":"ADV-2006-1344","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1344"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.sybase.com/detail?id=1040117"},{"name":"1015913","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015913"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-1829","datePublished":"2006-04-19T16:00:00.000Z","dateReserved":"2006-04-19T00:00:00.000Z","dateUpdated":"2024-08-07T17:27:29.383Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}