mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-1829",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "EAServer Manager in Sybase EAServer 5.2 and 5.3 allows remote authenticated users, possibly guests, to obtain password credentials of arbitrary users via unspecified vectors involving (1) connection caches, (2) open password prompts, and (3) stored custom connection profiles."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "easerver-password-disclosure(25777)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25777"
|
|
},
|
|
{
|
|
"name": "17508",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/17508"
|
|
},
|
|
{
|
|
"name": "19605",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/19605"
|
|
},
|
|
{
|
|
"name": "ADV-2006-1344",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/1344"
|
|
},
|
|
{
|
|
"name": "http://www.sybase.com/detail?id=1040117",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.sybase.com/detail?id=1040117"
|
|
},
|
|
{
|
|
"name": "1015913",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1015913"
|
|
}
|
|
]
|
|
}
|
|
} |