First published: Wed Oct 16 2013(Updated: )
Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, 5.0 SP1a-b, 5.0.3, and 5.0.4 allows remote authenticated users to affect confidentiality via unknown vectors related to Cognos.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Industry Applications | =4.6-sp0 | |
Oracle Industry Applications | =4.6-sp0a | |
Oracle Industry Applications | =4.6-sp0b | |
Oracle Industry Applications | =4.6-sp0c | |
Oracle Industry Applications | =4.6-sp1 | |
Oracle Industry Applications | =4.6-sp1a | |
Oracle Industry Applications | =4.6-sp1b | |
Oracle Industry Applications | =4.6-sp1c | |
Oracle Industry Applications | =4.6-sp2 | |
Oracle Industry Applications | =4.6-sp2a | |
Oracle Industry Applications | =4.6-sp2b | |
Oracle Industry Applications | =4.6-sp2c | |
Oracle Industry Applications | =5.0-sp0 | |
Oracle Industry Applications | =5.0-sp0a | |
Oracle Industry Applications | =5.0-sp1 | |
Oracle Industry Applications | =5.0-sp1a | |
Oracle Industry Applications | =5.0-sp1b | |
Oracle Industry Applications | =5.0.3 | |
Oracle Industry Applications | =5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5837 has not been publicly assigned a CVSS score, but it is classified as a confidentiality vulnerability affecting Oracle Health Sciences InForm.
To mitigate CVE-2013-5837, users should apply the latest security patches provided by Oracle for affected versions of Oracle Health Sciences InForm.
CVE-2013-5837 affects users of various versions of Oracle Industry Applications, specifically Oracle Health Sciences InForm components.
CVE-2013-5837 impacts Oracle Industry Applications versions 4.6 SP0, 4.6 SP1, 4.6 SP2, and 5.0 SP0 to 5.0.4, among others.
CVE-2013-5837 allows remote authenticated users to potentially exploit the vulnerability, impacting the confidentiality of the application.