Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
    • Digital Accessibility Compliance Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (21)
    • Homepage (1)
    • How-To (651)
    • Landing Page (54)
    • News (141)
    • (-) Other Content (658)
    • Service (169)
    • Standard & Guideline (42)
    • Status (851)

    Service Category

    • Access & Identity (0)
    • Business Applications (0)
    • Desktop Support (0)
    • Education Applications (0)
    • Email & Collaboration (0)
    • Health Systems (0)
    • Hosting & Computing (0)
    • Network & Wireless (0)
    • Phones & Pager (0)
    • Research Services (0)
    • Security (0)
    • Web Services (0)

    658 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    Critical Vulnerabilities in the WordPress WPLMS and VibeBP Plugins

    WordPress released  security updates to address Critical vulnerabilities in the WordPress WPLMS and VibeBP Plugins. These vulnerabilities could be exploited to perform unauthorized file uploads, privilege escalation and SQL injection attacks.

    Other Content

    High Vulnerability in Adobe ColdFusion

    Adobe released a security update to address a High Vulnerability in Adobe ColdFusion. Successful exploitation of this vulnerability could lead to arbitrary file system read.For a complete description of the vulnerabilities and affected systems go to Security updates available for Adobe ColdFusion | APSB24-107. IT Security Read more about IT Security service offerings.

    Other Content

    High Vulnerability in Cisco NX-OS Software

    Cisco has released security updates to address a High vulnerability in Cisco NX-OS Software. Exploitation of the vulnerability could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification.

    Other Content

    Critical and High Vulnerabilities in Adobe Acrobat and Reader

    Adobe has released security updates to address Critical and High Vulnerabilities in Adobe Acrobat and Reader. Successful exploitation of these vulnerabilities could lead to arbitrary code execution, memory leak, and application denial-of-service.

    Other Content

    Critical 0-day Vulnerability in Apache Struts

    Apache released a security update to address a Critical 0-day vulnerability in Apache Struts. A remote attacker could exploit this vulnerability to perform Remote Code Execution (RCE).For a complete description of the vulnerabilities and affected systems go to Apache Security Bulletin S2-067. IT Security Read more about IT Security service offerings.

    Other Content

    Vulnerabilities in Google Chrome

    Google has released new versions of Chrome to address vulnerabilities in Google Chrome.For a complete description of the vulnerabilities and affected systems go to Chrome Releases. IT Security Read more about IT Security service offerings.

    Other Content

    Dec 2024: Use of Legitimate Payment Services with TOAD: telephone-oriented attack delivery

    Real Payment Services Phish using TOAD

     

    Thr

    Other Content

    Dec 2024: LURES TRICK RECIPIENTS Into Executing Malicious Commands

    Other Content

    Dec 2024: CHARITABLE SUPPORT Lures Lead to Malware Installation

    Other Content

    Vulnerabilities in Multiple Apple Products

    Apple has released security updates to address vulnerabilities in multiple Apple products.  A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. 

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 19
    • Page 20
    • Page 21
    • Page 22
    • Current page 23
    • Page 24
    • Page 25
    • Page 26
    • Page 27
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California