Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3163 Results
MyPPM: Smartsheet - Create from Clarity and Link
- Staff
Brief CLE Outage on March 1, 2024
What Happened The cloud service provider (Amazon Web Services) used for the UCSF CLE's database engine performed a minor, automatic version upgrade on Friday, March 1, 2024, at 8:09 p.m.
Vulnerabilities in Various Suse Products in February 2024
Suse released multiple security updates in February for various Suse products.For a complete description of the vulnerabilities and affected systems go to: Suse February 2024 Archives by date.IT Security
Vulnerabilities in Various Red Hat Products in February 2024
Red Hat released multiple security updates in February for various Red Hat products. For a complete description of the vulnerabilities and affected systems go to: Red Hat Security Advisories.IT SecurityRead more about IT Security service offerings.
Vulnerabilities in Various Ubuntu Products in February 2024
Ubuntu released multiple security updates in February for various Ubuntu products.For a complete description of the vulnerabilities and affected systems go to: Ubuntu February 2024 Archives by date.IT Security
Vulnerabilities in Chrome
Google has released new versions of Chrome. For a complete description of the vulnerabilities and affected systems go to: Chrome Releases.IT SecurityRead more about IT Security service offerings.
Vulnerabilities in Multiple Cisco Products
Cisco has released security updates to address vulnerabilities in multiple Cisco Products. An authenticated attacker could exploit these vulnerabilities to send large amounts of traffic and cause a denial-of-service (DoS) condition.
Actively Exploited Important Vulnerability in Multiple Microsoft Products
Microsoft released an updated a security advisory to highlight that an Important vulnerability (CVE-2024-21338) in multiple Microsoft products is now Actively Exploited. An attacker who successfully exploits this vulnerability could elevate their privileges.