Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (20)
    • Homepage (1)
    • How-To (624)
    • Landing Page (56)
    • News (134)
    • (-) Other Content (617)
    • Service (162)
    • Standard & Guideline (41)
    • Status (821)

    Service Category

    • Access & Identity (0)
    • Business Applications (0)
    • Desktop Support (0)
    • Education Applications (0)
    • Email & Collaboration (0)
    • Health Systems (0)
    • Hosting & Computing (0)
    • Network & Wireless (0)
    • Phones & Pager (0)
    • Research Services (0)
    • Security (0)
    • Web Services (0)

    617 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    04/03/25: Vulnerabilities in Splunk Products

    Splunk released security updates to address vulnerabilities in Splunk products. An attacker could exploit these vulnerabilities to perform remote code execution (RCE).For a complete description of the vulnerabilities and affected systems, go to Splunk Security Advisories Archive.IT Security Read more about IT Security service offerings.

    Other Content

    04/03/25: Vulnerabilities in Mozilla Firefox

    Mozilla released security updates to address vulnerabilities in Firefox products.For a complete description of the vulnerabilities and affected systems, go to Security Vulnerabilities fixed in Firefox.IT Security Read more about IT Security service offerings.

    Other Content

    Mar 2025: CRITICAL UPDATES “REQUIRED” LURE

    Other Content

    03/27/25: Critical Vulnerability Kubernetes Nginx Controller

    VMware has released security updates to address vulnerabilities in VMware Tools for Windows. An attacker could exploit this vulnerability to bypass authentication.For a complete description of the vulnerabilities and affected systems, go to Ingress Nightmare: 9.8 Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress NGINX.IT Security 

    Other Content

    03/27/25: Critical Vulnerability in Next.js

    A security update was released to address a Critical vulnerability in Next.js. An attacker could exploit this vulnerability to bypass authorization checks.For a complete description of the vulnerabilities and affected systems, go to Next.js and the corrupt middleware: the authorizing artifact.IT Security Read more about IT Security service offerings.

    Other Content

    03/27/25: Vulnerabilities in Google Chrome

    Google has released new versions of Chrome to address vulnerabilities in Google Chrome.For a complete description of the vulnerabilities and affected systems, go toIT Security Read more about IT Security service offerings.

    Other Content

    03/27/25: Critical Vulnerability in Veeam Backup & Replication

    A security update was released to address a Critical vulnerability in Veeam Backup & Replication. An attacker could exploit this vulnerability to perform remote code execution (RCE).For a complete description of the vulnerabilities and affected systems, go to KB 4724 CVE-2025-23120.IT Security Read more about IT Security service offerings.

    Other Content

    03/27/25: Supply Chain Compromise of Third-Party GitHub Action

    A security update was released to address a vulnerability in Github Action, tj-actions/changed-files. An attacker could exploit this vulnerability to disclosure of Github Personal Access Tokens (PATs), npm tokens, and private RSA keys.For a complete description of the vulnerabilities and affected systems, go toIT Security Read more about IT Security service offerings.

    Other Content

    03/27/25: Vulnerability in SAML

    A new version of the OpenSAML library package has been released to address vulnerabilities. If exploited, this vulnerability could enable full account takeovers across organizations relying on SAML-based single sign-on (SSO).For a complete description of the vulnerabilities and affected systems, go to Shibboleth Service Provider Security Advisory.IT Security 

    Other Content

    Mar 2025: Simplified Chinese Lures: Targeting Users in Global Organizations

    Simplified Chinese Phishing Lu

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 5
    • Page 6
    • Page 7
    • Page 8
    • Current page 9
    • Page 10
    • Page 11
    • Page 12
    • Page 13
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California