Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3165 Results
Web Hosting: Change Control Procedure
- Faculty
- Staff
- Technical Partner
Malware is Targeting VMWare VSphere
VMWare has released guidance on protecting vSphere From Specialized Malware. Specialized Malware is being used to exploit and gain persistent access to instances of ESXi. For a complete description of the vulnerabilities and affected systems go to Protecting vSphere From Specialized Malware. IT Security
Weaponized Vulnerability in Linux
H-ISAC reported a Weaponized Vulnerability in Linux. An attacker could exploit this vulnerability to escalate privileges. For a complete description of the vulnerabilities and affected systems go to CVE-2022-25636 Detail. IT Security Read more about IT Security service offerings.
Critical Vulnerabilities in Drupal Core
Drupal has released Critical security updates to address vulnerabilities in Twig impacting Drupal core. A remote attacker could exploit these vulnerabilities to perform unauthorized read access to private files, the contents of other files on the server, or database credentials.
Vulnerability in Wayland
Wayland has released security updates to address a vulnerability in Wayland. An attacker could exploit this vulnerability to cause Wayland to crash, resulting in a denial of service, or possibly execute arbitrary code. For a complete description of the vulnerabilities and affected systems go to USN-5614-1: Wayland vulnerability. IT Security
Google Released Chrome 106.0.5249.61 for Mac/Linux and 106.0.5249.61/62 for Windows
Google released Chrome 106.0.5249.61 for Mac/Linux and 106.0.5249.61/62 for Windows. A remote attacker could exploit this vulnerability to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to Chrome Release Note. IT Security
Critical and High Vulnerabilities in Dell Products
Dell has released security updates to address Critical and High vulnerabilities in Dell Products. An attacker could exploit the Dell SmartFabric Storage Software vulnerability to execute arbitrary commands. An attacker could exploit the Dell CloudLink vulnerability to gain unauthorized access to the system. For a complete description of the vulnerabilities and affected systems go to
Web Hosting: Create a UCSF Restricted Site
- Staff
- Technical Partner
Website Business Owners and Support
Generally two roles are assigned to people responsible for keeping a site up to date: a business owner or a day-to-day technical support. However, responsibilities vary across research labs, degree programs, school departments, etc. Responsibilities of website business owners At UCSF the person responsible for their site adhering to UCSF policies is referred to as a website business owner. They also may keep the site up to date, determine who has permission to develop, edit, or publish, and determine site strategy.
- Faculty
- Staff
- Technical Partner
- Web Services
Definitions
Basic Drupal and website termsHere are a few key Drupal terms used in Drupal documentation. The full Drupal Glossary has more than 100 definitions.
- Faculty
- Staff
- Technical Partner
- Web Services