Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
1509 Results
Critical Vulnerability in WordPress Better Search Replace Plugin
WP Engine released a security update to address a Critical Vulnerability in the WordPress Better Search Replace Plugin. An attacker could exploit this vulnerability to delete arbitrary files, retrieve sensitive data, or execute code.
Vulnerabilities in Multiple Mozilla Products
Mozilla released security updates to address vulnerabilities in multiple Mozilla products. An attacker could exploit some of these vulnerabilities to take control of an affected system.For a complete description of the vulnerabilities and affected systems go to: Mozilla Foundation Security Advisories.IT Security
High Vulnerability in Splunk Enterprise for Windows
Splunk released security updates to address High vulnerability in Splunk Enterprise for Windows. A malicious user could exploit this vulnerability to execute malicious code on an affected system.
Vulnerabilities in Chrome
Google has released new versions of Chrome.For a complete description of the vulnerabilities and affected systems go to: Chrome Releases.IT SecurityRead more about IT Security service offerings.
Vulnerability Affecting Juniper Junos OS and Junos OS Evolved
Juniper Networks released security updates to address a vulnerability affecting Junos OS and Junos OS Evolved. A cyber threat actor could exploit this vulnerability to cause a Denial if Service (DoS) condition in the backup RE.
Vulnerabilities in Multiple Cisco Products
Cisco has released security updates to address vulnerabilities in Multiple Cisco Products. For a complete description of the vulnerabilities and affected systems go to: Cisco Security Advisories.IT SecurityRead more about IT Security service offerings.
Actively Exploited Zero-Day and Other Vulnerabilities in Multiple Apple Products
Apple has released security updates to address Actively Exploited Zero-Day and Other Vulnerabilities in multiple Apple products. Successful exploitation enables threat actors to execute arbitrary malicious code on devices running vulnerable iOS, macOS, and tvOS versions after opening a malicious web page.For a complete description of the vulnerabilities and affected systems go to: Apple Security Updates.IT Security
Critical Vulnerabilities in Multiple Unified Communications Products
Cisco released a security advisory to address a vulnerability (CVE-2024-20253) affecting multiple Unified Communications Products. A cyber threat actor could exploit this vulnerability to take control of an affected system.
Critical Vulnerability Impacting GoAnywhere MFT
The newly disclosed flaw is tracked as CVE-2024-0204 and is rated critical with a CVSS v3.1 score of 9.8 as it is remotely exploitable, allowing an unauthorized user to create admin users via the product’s administration portal. Creating arbitrary accounts with administrative privileges can lead to a complete device takeover. In the case of Go Anywhere MFT, that would allow attackers to access sensitive data, introduce malware, and potentially enable further attacks within the network.
Ed-IT Learning & Activity Hub
Create and lead versatile multi-purpose online activities and resources for your program by using the UCSF Collaborative Learning Environment (CLE). Education IT provides this service to you at no cost.