Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Oracle iLearning Vendors:   Oracle
Oracle iLearning Bug in Learner Pages Lets Remote Users Partially Modify Data
SecurityTracker Alert ID:  1028798
SecurityTracker URL:
CVE Reference:   CVE-2013-3775   (Links to External Site)
Date:  Jul 17 2013
Impact:   Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.2.1, 6.0
Description:   A vulnerability was reported in Oracle iLearning. A remote user can partially modify data on the target system.

The Learner Pages component is affected.

The following researchers reported these and other Oracle product vulnerabilities:

Adam Willard of Foreground Security; Alexey Tyurin of ERPScan (Digital Security Research Group); Andrea Micalizzi aka rgod, working with HP's Zero Day Initiative; Ari Rubinstein of; Balint Varga-Perke of Silent Signal LLC; Borked of the Google Security Team; David Hoyt; Esteban Martinez Fayo of Application Security, Inc.; Guy Lichtman of McAfee Security Research; Joonas Kuorilehto of Codenomicon; Masashi Shiraishi of JPCERT/CC Vulnerability Handling Team; Michael Schaefer of Schutzwerk GmbH; Nicolas Grgoire of HP's Zero Day Initiative; Peter Babel of Schutzwerk GmbH; Richard Warren of NCC Group; Rohan Stelling of BAE Systems Detica; Takahiro Haruyama of Internet Initiative Japan Inc. via JPCERT/CC; and Travis Emmert via iDefense.

Impact:   A remote user can partially modify data on the target system.
Solution:   The vendor has issued a fix as part of the Oracle Critical Patch Update Advisory - July 2013.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Not specified

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC