Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
    • Digital Accessibility Compliance Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (21)
    • Homepage (1)
    • How-To (656)
    • Landing Page (54)
    • News (142)
    • (-) Other Content (658)
    • Service (169)
    • Standard & Guideline (42)
    • Status (851)

    Service Category

    • Access & Identity (0)
    • Business Applications (0)
    • Desktop Support (0)
    • Education Applications (0)
    • Email & Collaboration (0)
    • Health Systems (0)
    • Hosting & Computing (0)
    • Network & Wireless (0)
    • Phones & Pager (0)
    • Research Services (0)
    • Security (0)
    • Web Services (0)

    658 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    02/12/25: High and Other Vulnerabilities Affecting Multiple SAP Products

    SAP released its February 2025 updates to address High and other vulnerabilities in multiple SAP products.For a complete description of the vulnerabilities and affected systems, go to SAP Security Patch Day – February 2025.IT SecurityRead more about IT Security service offerings.

    Other Content

    02/12/25: Vulnerabilities in Multiple Adobe products

    Adobe has released security updates to address vulnerabilities in multiple Adobe products.For a complete description of the vulnerabilities and affected systems, go to Adobe Security Bulletins.IT SecurityRead more about IT Security service offerings.

    Other Content

    02/10/25: Code Injection Attacks Using Publicly Disclosed ASP.NET Machine Keys

    Microsoft published threat intelligence about the exploitation of publicly disclosed ASP.NET machine keys. An attacker can exploit these vulnerabilities to inject malicious code and deliver the Godzilla post-exploitation framework. For a complete description of the vulnerabilities and affected systems go to Code injection attacks using publicly disclosed ASP.NET machine keys.IT Security

    Other Content

    02/07/25: 0-Day Vulnerability in Linux Kernel

    CISA has ordered federal agencies to secure their systems within three weeks against a high-severity Linux kernel flaw actively exploited in attacks. An attacker could exploit this vulnerability to perform out of bounds writes.For a complete description of the vulnerabilities and affected systems go to CVE-2024-53104 Detail.IT SecurityRead more about IT Security service offerings.

    Other Content

    02/7/25: Vulnerability in the WordPress ASE Plugin

    WordPress released security updates to address a vulnerability in the WordPress ASE Plugin. An attacker could exploit this vulnerability to escalate privileges. 

    Other Content

    Feb 2025: Truist Bank and Plaid-themed Credential Phishing

    Other Content

    02/05/25: Vulnerabilities in Google Chrome

    Google has released new versions of Chrome to address vulnerabilities in Google Chrome.For a complete description of the vulnerabilities and affected systems go to Chrome Releases.IT SecurityRead more about IT Security service offerings.

    Other Content

    02/05/25: High Vulnerabilities in TeamViewer Remote Access Solutions for Windows

    TeamViewer has released new versions of the TeamViewer remote access solutions for Windows to address High vulnerabilities.For a complete description of the vulnerabilities and affected systems go to TV-2025-1001 Improper Neutralization of Argument Delimiters in TeamViewer Clients.IT SecurityRead more about IT Security service offerings.

    Other Content

    02/05/25: High Vulnerabilities in VMware Aria Operations and Aria Operations for Logs Products

    VMware has released security updates to address High vulnerabilities affecting VMware Aria Operations and Aria Operations for Logs products. An attacker could exploit these vulnerabilities to gain admin access.

    Other Content

    02/05/25: Critical 0-Day and Other Vulnerabilities in Android Devices

    Google released its February Android update to address Critical 0-Day and other vulnerabilities in Android devices.

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 15
    • Page 16
    • Page 17
    • Page 18
    • Current page 19
    • Page 20
    • Page 21
    • Page 22
    • Page 23
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California