Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3056 Results
Guideline
macOS Monterey and Older Versions Discontinued
What is Happening?macOS Monterey (12.x) and older versions are all discontinued and no longer supported by Apple, which also ended security updates and maintenance. This means these older macOS versions no longer meet UCSF's minimum security standards.It is a minimum security standard of UCSF that all computers used for UCSF business must run vendor-supported versions of operating systems to avoid security risks. Computers that no longer meet this security requirement will eventually be blocked from UCSF's network.
Impacted Services: IT Field Services (ITFS) Desktop Support , ITFS Supported Macs
Scheduling an Event on a Shared Calendar in Outlook
Schedule an Event for a Shared Calendar From Your Own Calendar The preferred method for scheduling events on a Shared Calendar is to create the event on your own calendar, and then invite the Shared Calendar as an attendee: NOTE: To complete these steps, you will need to share the calendar with others. Learn more about sharing an Outlook calendar with other people.
- Faculty
- Staff
- Student
- Email & Collaboration
Jan 2023: Campaign Uses Paycheck Fax-Themed Lure
Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks using an emailed fax of an alleged paycheck as a lure.
Critical Vulnerability in Zoho ManageEngine Products
ManageEngine released an advisory to address a Critical vulnerability in several Zoho ManageEngine Products. An attacker could exploit this vulnerability to perform unauthenticated remote code execution.
High Vulnerability Apache SOAP
Mandiant reported a High vulnerability in Apache Soap. An attacker could exploit this vulnerability to perform unauthenticated remote code execution. For a complete description of the vulnerabilities and affected systems go to CVE-2022-45378 Detail . IT Security Read more about IT Security service offerings.
Vulnerabilities in Oracle Products
Oracle released their January Critical Patch Update to address vulnerabilities in Oracle products. For a complete description of the vulnerabilities and affected systems go to Oracle Critical Patch Update Advisory - January 2022. IT Security
Critical Vulnerabilities in Git
The maintainers of the Git source code version control system have released updates to remediate two Critical vulnerabilities in Git. An attacker could exploit some of these vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to:
Vulnerability in Cacti Servers
NIST reported a vulnerability in Cacti servers. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. For a complete description of the vulnerabilities and affected systems go to CVE-2022-46169 Detail. IT Security
High Vulnerabilities in Mozilla Products
Mozilla released security updates to address High vulnerabilities in Firefox ESR and Firefox. An attacker could exploit some of these vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to Mozilla Foundation Security Advisories. IT Security
Vulnerability in the Linux Foundation loopback-connector-postgresql 5.5.0 for Node[.]js.
Mandiant reported a vulnerability in the Linux Foundation loopback-connector-postgresql 5.5.0 for Node[.]js. Improper input validation on the `contains` LoopBack filter may allow for arbitrary SQL injection For a complete description of the vulnerabilities and affected systems go to CVE-2022-35942 Detail. IT Security