Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3056 Results
High Vulnerability in Google's OAuth Client Library for Java
Google has released a security update to address a High vulnerability in Google's OAuth Client Library for Java. This vulnerability could be exploited by a malicious actor with a compromised token to deploy arbitrary payloads. For a complete description of the vulnerabilities and affected systems googleapis / google-oauth-java-client. IT Security
Vulnerabilities in the Jupiter and JupiterX Premium WordPress Themes
WordPress released security updates to address vulnerabilities in the Jupiter and JupiterX Premium WordPress themes. Exploitation of some of these vulnerabilities could allow a remote attacker to take control of an affected website.
Vulnerabilities in the Jupiter and JupiterX Premium WordPress Themes
WordPress released security updates to address vulnerabilities in the Jupiter and JupiterX Premium WordPress themes. Exploitation of some of these vulnerabilities could allow a remote attacker to take control of an affected website.
High Vulnerability Affecting ISC Berkeley Internet Name Domain (BIND)
The Internet Systems Consortium (ISC) has released security updates to address a High vulnerability affecting ISC Berkeley Internet Name Domain (BIND). Exploitation of this vulnerability could allow a remote attacker to cause a denial-of-service condition. For a complete description of the vulnerabilities and affected systems CVE-2022-1183: Destroying a TLS session early causes assertion failure.
BeyondTrust Training
Install the Access Console Prior to using BeyondTrust Privileged Remote Access, the Access Console must be installed and configured on your system.
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Desktop Support
MyPPM: OKR - Tier 3 and 4 Dashboards
- Staff
MyPPM: OKR - Tableau Reporting Guide
- Staff
Vulnerabilities in WordPress Popular Posts Plugin Weaponized and Productized
Vulnerabilities in WordPress Popular Posts plugin weaponized and productized. Exploitation of these vulnerabilities could allow an attacker to perform arbitrary file uploads and remote code execution. For a complete description of the vulnerabilities and affected systems CVE-2021-42362. IT Security
High Vulnerabilities in the NVIDIA GPU Display Driver
NVIDIA has released a security update to address High vulnerabilities in the NVIDIA GPU Display Driver. A malicious actor could exploit these vulnerabilities to create a denial-of-service condition, information disclosure, or data tampering. For a complete description of the vulnerabilities and affected systems Security Bulletin: NVIDIA GPU Display Driver - May 2022. IT Security
Critical Vulnerabilities in VMWare Products
VMware has released security updates to address Critical vulnerabilities in multiple products. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate. For a complete description of the vulnerabilities and affected systems VMSA-2022-0011. IT Security