Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
2162 Results
FeedbackFruits (FbF)
Description FeedbackFruits
- Faculty
- Staff
- Student
- Education Applications
Scheduled Maintenance
Incident Reporting System (RL Solutions)
Planned
25Live
Description 25Live is an online classroom request system that allows users to submit most classroom schedule requests without the need for paper forms. In addition to the online interface, 25Live allows for greater flexibility in publishing online calendars.
- Faculty
- Staff
- Student
- Education Applications
Campus IT Operating Model (ITOM) Program
- Affiliate
- Faculty
- Research Staff
- Researcher
- Staff
- Technical Partner
Real Time Location System
- Affiliate
- Faculty
- Researcher
- Staff
- Student
Vulnerabilities in Multiple Cisco Products
Cisco has released security updates to address vulnerabilities in multiple Cisco Products. An authenticated attacker could exploit these vulnerabilities to take control of an affected system.For a complete description of the vulnerabilities and affected systems go to Cisco Security Advisories.IT Security
Vulnerabilities in Multiple Adobe Products
Adobe has released security updates to address vulnerabilities in multiple Adobe products.For a complete description of the vulnerabilities and affected systems go to Adobe Security Bulletins.IT SecurityRead more about IT Security service offerings.
Vulnerabilities in Intel Products
Intel released advisories to address multiple vulnerabilities in multiple Intel Products.For a complete description of the vulnerabilities and affected systems go to Intel® Product Security Center Advisories.IT Security
Vulnerabilities in Multiple Apple Products
Apple has released security updates to address vulnerabilities in multiple Apple products. A cyber threat actor could exploit these vulnerabilities to take over an affected system.For a complete description of the vulnerabilities and affected systems go to Apple Security Updates.IT Security
Actively Exploited and Other Vulnerabilities in Google Chrome
Google has released new versions of Chrome to address an Actively Exploited High and other vulnerabilities in Google Chrome. Successful exploitation could allow for arbitrary code execution.For a complete description of the vulnerabilities and affected systems go to Chrome Releases.IT SecurityRead more about IT Security service offerings.