-
Lectora®
- Quick Win Tutorials
- Getting Started
- Modular Development (ModDev)
- Quick Guides
- Best Practices
- Navigating the Workplace
- Building a Title
- Importing Content
- Working With Text
- Working with Images
- Working With Objects
- Actions and Variables
- Tests, Surveys, and Questions
- Working with Web Windows or HTML Extensions
- Publishing a Title
- Creating Web-based, Accessible Content (Section 508/WCAG)
- Lectora Layouts
- Managing Titles
- Managing your Assignments
- Managing Your Notifications
- Communicating
- Admin Guide
- Lectora Player Skins
- Lectora Interactions and Scenarios
- Games
- Misc.
- Programming
- General
- Using Tracking for Progress, Status, etc
- Working with BranchTrack
- Trouble Shooting
- Working with Audio and Video
-
CenarioVR®
-
The Training Arcade®
- Arcades™
- Video Overviews
- FAQ's
- Recent Feature Videos
- Game Analytics
- Customer Feedback
- Demo Information
- General Admin
- Building Your Game
- Analytics
- Compatibility and Integrations
- Data, Security, and Privacy Policy
- JEOPARDY!®
- Jump
- Scenarios
- Trivia
- Trivia Virtual Instructor-Led Mode (VILT)
- Sort-It
- Scramble
- Recall
- Match
- Detective
- Translations
- New User Information
- Custom Branding Opportunities
- Registration and Leaderboard
- JEOPARDY!® Virtual Instructor-Led Mode (VILT)
-
MicroBuilder™
-
Asset Libraries
-
Rockstar Learning Platform
-
Rehearsal
-
Off-the-Shelf Training
-
ReviewLink®
-
The Learning Creation Studio
-
CourseMill®
-
General Topics
-
xAPI
-
Template Styles
-
Misc.
-
Articulate Storyline
-
Customizable Courseware
-
Course Starters
-
Camtasia
-
Group Administration
-
General
-
Can't find the answer? Ask our Customer Solutions team.
STATEMENT FROM ELB LEARNING REGARDING “LOG4J” VULNERABILITY
12 December 2021
On December 9, 2021, a severe remote code execution vulnerability within Apache's Log4j was announced (AKA log4shell). Log4j is a widely used logging framework that could impact any application that directly uses, or relies on an application that uses, Java and this framework.
ELB Learning has conducted an analysis of the possible impact on all software applications we offer. We are pleased to state that there are NO VULNERABILITIES to our software applications.
Applications:
Asset Library - NOT VULNERABLE
CenarioVR - NOT VULNERABLE
CourseMill - NOT VULNERABLE *
eLearning Brothers Account Portal - NOT VULNERABLE
Lectora Desktop - NOT VULNERABLE
Lectora Online - NOT VULNERABLE
ReviewLink - NOT VULNERABLE
Rockstar Community - NOT VULNERABLE
Rockstar Learning Platform - NOT VULNERABLE
The Game Agency / The Training Arcade® - NOT VULNERABLE
If you need any further information regarding this matter, please feel free to email info@elblearning.com.
Note: Content published by Lectora or Lectora Online is NOT VULNERABLE.
Note: for CourseMill Enterprise versions prior to 8.5.7 customers, log4j-core is loaded as a library, but it is not used anywhere within the application. This file may be deleted. Delete: WEB-INF/lib/log4j-core-2.0-rc1.jar Restart tomcat.
Reference:
Log4j Vulnerability https://logging.apache.org/log4j/2.x/security.html