Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
2947 Results
Do It Yourself Website Hosting Checklist
If you prefer not to use Web Services Managed Hosting, you can set up a web server either outside the UCSF network or at UCSF. It's quite a complex process.
- Faculty
- Staff
- Student
- Technical Partner
- Web Services
IT Field Services Depot (Computer Orders)
The ITFS Depot streamlines the process of ordering a computer. We maintain an inventory of standard equipment available for purchase. We’ll handle your order from start to finish and can usually deliver your computer to you quickly. If you don’t see what you need, we can still help; just submit a ticket and we will be in contact. To submit a computer request, click here
Vulnerabilities in Multiple Schneider Products
Schneider has released security updates to address vulnerabilities in Multiple Schneider Products.
Vulnerabilities in Multiple Siemens Products
Siemens has released Critical and High security updates to address vulnerabilities in Multiple Siemens Products.
Vulnerabilities in Multiple HP Products
HP has released security updates to address vulnerabilities in Multiple HP Products. These vulnerabilities could allow a stack overflow, heap overflow, and memory corruption bugs affecting the UEFI Runtime Driver eXecution Environment (DXE) and System Management Mode (SMM) components.
High Vulnerability Discovered in Redis
A High vulnerability was discovered in Redis. It was discovered, that Redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
Vulnerabilities in Multiple Adobe Products
Adobe has released security updates to address vulnerabilities in multiple Adobe products. An attacker could exploit these vulnerabilities to cause take control of an affected system.
High Vulnerabilities in Multiple Android Products
Google has released security updates to address High vulnerabilities in multiple Android products. The most severe of these issues is a critical security vulnerability in the System component that could lead to remote escalation of privilege with no additional execution privileges needed.
Vulnerabilities Affecting Multiple SAP Products
SAP released their March 2022 updates to address vulnerabilities in various SAP products. An attacker could exploit these vulnerabilities to take control of an affected system.
Vulnerabilities in Various Microsoft Products
Microsoft released their March 2022 update to address vulnerabilities in various Microsoft products. An attacker could exploit these vulnerabilities to take control of an affected system.