Penn State shield
Skip to content Skip to search

Headlines

ITS - ANGEL Alerts

/alerts January 17 @ 5:02 pm

ITS Alerts by Date


ITS Alerts by Service

ITS Alerts by Location

  • red boxCurrent Alert
  • green boxResolved Alert
  • orange boxFuture Alert

ANGEL RSS badge

The most recent ITS Alerts affecting ANGEL are listed below and are also published via the ANGEL Alerts RSS feed. In addition to the alerts below, a list of the most recently analyzed entries in the National Vulnerability Database (NVD) is provided on the right side of this page.

green boxResolved: ANGEL to be unavailable from 5 a.m. - 6 a.m. ET on Wednesday, 5/24

Last updated on May 24, 2017 at 08:34:15 AM

Penn State Information Technology will be installing Microsoft Windows system updates (patching) on Wednesday, 5/24 from 5 a.m. to 6 a.m. ET that will require ANGEL to be unavailable during this...read more

green boxResolved: ANGEL to be unavailable from 5 a.m. - 6 a.m. ET on Wednesday, 4/26

Last updated on April 26, 2017 at 09:36:29 AM

Penn State Information Technology will be installing Microsoft Windows system updates (patching) on Wednesday, 4/26 from 5 a.m. to 6 a.m. ET that will require ANGEL to be unavailable during...read more

green boxResolved: ANGEL to be unavailable from 5 a.m. - 6 a.m. ET on Wednesday, 3/29

Last updated on March 29, 2017 at 08:12:34 AM

Penn State Information Technology will be installing Microsoft Windows system updates (patching) on Wednesday, 3/29 from 5 a.m. to 6 a.m. ET that will require ANGEL to be unavailable during...read more

green boxResolved: ANGEL may be impacted by Friends of Penn State service upgrade on March 7, 8

Last updated on March 9, 2017 at 09:11:06 AM

The test of the restart scripts was originally scheduled for March 8 but has been postponed until March 9. While it is not expected that ANGEL will be affected, users...read more

green boxResolved: ANGEL to be unavailable from 5 a.m. - 7 a.m. ET on Monday, March 6

Last updated on March 6, 2017 at 09:31:48 AM

The ANGEL system failover is completed.

green boxANGEL to be unavailable from 5 a.m. - 7 a.m. ET on Thursday, March 9

Last updated on March 1, 2017 at 04:24:19 PM

On Thursday, March 9, during the scheduled maintenance window from 5:00 - 7:00 am ET, Penn State IT will be conducting a system fail-back to return ANGEL to the primary...read more

green boxResolved: ANGEL is experiencing technical difficulties

Last updated on February 15, 2017 at 02:43:07 PM

At 2:39pm today this issue was resolved. ANGEL is now available for users.

green boxResolved: ANGEL maintenance to occur on Wednesday, February 8

Last updated on February 8, 2017 at 09:29:59 AM

During the scheduled maintenance window on Wednesday, February 8 from 5 a.m. to 6 a.m. ET, the ANGEL replication/failover hardware located in Shields Building will be switched to new hardware...read more

green boxResolved: ANGEL to be unavailable from 5 a.m. - 6 a.m. ET on Wednesday, 1/25

Last updated on January 25, 2017 at 09:56:01 AM

The Office of the Vice Provost for Information Technology (OPVIT) will be installing Microsoft Windows system updates (patching) on Wednesday, 1/25 from 5 a.m. to 6 a.m. ET that will...read more

green boxResolved: Turnitin Serivice Outage

Last updated on January 7, 2017 at 07:21:18 PM

Turnitin Service Alert We have completed today\'s scheduled maintenance early. Service is back to normal.

<- Previous

More ->

Recently Analyzed CVEs
CVE-2016-9099advanced_secure_gateway, proxysg
CVE-2016-9100advanced_secure_gateway, proxysg
CVE-2016-8493forticlient
CVE-2017-17382application_delivery_controller_firmware, netscaler_gateway_firmware
CVE-2017-17537routerboard
CVE-2017-17665octopus_deploy
CVE-2017-5663fineract
CVE-2017-16355phusion_passenger
CVE-2017-14101conserus_image_repository
CVE-2017-3196rawether
CVE-2017-17649readymade_video_sharing_script
CVE-2017-15103enterprise_linux, heketi
CVE-2017-15104enterprise_linux, heketi
CVE-2017-11562senhasegura
CVE-2017-16949anonymous_post_pro
CVE-2017-17105pr115-204-p-rs_firmware
CVE-2017-17106pr115-204-p-rs_firmware
CVE-2017-17107pr115-204-p-rs_firmware
CVE-2017-17761athome_ip_camera_firmware
CVE-2017-17763superbeam
CVE-2017-17777paid_to_read_script
CVE-2017-17781groupware
CVE-2017-17790ruby
CVE-2017-17793blogotext
CVE-2017-16725ahb7004t-g-v4_firmware, ahb7004t-gl-v4_firmware, ahb7004t-gs-v3_firmware, ahb7004t-h-v2_firmware, ahb7004t-lm-v3_firmware, ahb7004t-lme-v3_firmware, ahb7004t-mh-v2_firmware, ahb7004t-mh-v3_firmware, ahb7008f2-g-v4_firmware, ahb7008f2-h_firmware, ahb7008f4-g-v4_firmware, ahb7008f4-h_firmware, ahb7008f8-g-v4_firmware, ahb7008f8-h_firmware, ahb7008t-gl-v4_firmware, ahb7008t-gs-v3_firmware, ahb7008t-h-v2_firmware, ahb7008t-lm-v2_firmware, ahb7008t-lm-v3_firmware, ahb7008t-lme-v3_firmware, ahb7008t-mh-v2_firmware, ahb7008t-mh-v3_firmware, ahb7008t4-h-v2, ahb7008t4-h-v2_firmware, ahb7016f2-gl-v4_firmware, ahb7016f4-gl-v4_firmware, ahb7016f8-gl-v4_firmware, ahb7016f8-gs-v3_firmware, ahb7016t-gs-v3_firmware, ahb7016t-lm-v2_firmware, ahb7016t-lm-v3_firmware, ahb7016t-lme-v3_firmware, ahb7016t-mh-v2_firmware, ahb7016t-mh-v3_firmware, ahb7016t4-gs-v3_firmware, ahb7016t4-mh-v2_firmware, ahb7032f2-gs-v3_firmware, ahb7032f2-lm-v3_firmware, ahb7032f4-gs-v3_firmware, ahb7032f4-lm-v2_firmware, ahb7032f4-lm-v3_firmware, ahb7032f8-gs-v3_firmware, ahb7032f8-lm-v2_firmware, ahb7804r-lm-v3_firmware, ahb7804r-lms-v3_firmware, ahb7804r-mh-v3_firmware, ahb7804r-ms-v3_firmware, ahb7808r-lm-v3_firmware, ahb7808r-mh-v3_firmware, ahb7808r-ms-v3_firmware, ipg-50h10pe-s_firmware, ipg-50h10pe-sl_firmware, ipg-50h10pe-wk-2f_firmware, ipg-50h10pe-wk_firmware, ipg-50h10pe-wp_firmware, ipg-50h10pl-ae_firmware, ipg-50h10pl-b_firmware, ipg-50h10pl-p_firmware, ipg-50h10pl-r_firmware, ipg-50h10pl-s_firmware, ipg-50h20pt-s_firmware, ipg-50hv10pt-a_firmware, ipg-50hv10pt-s_firmware, ipg-50hv10pt-wp_firmware, ipg-50hv10pv-a_firmware, ipg-50hv10pv-s_firmware, ipg-50hv20pes-s_firmware, ipg-50hv20pet-a_firmware, ipg-50hv20pet-s_firmware, ipg-50hv20psa-s_firmware, ipg-50hv20psb-a_firmware, ipg-50hv20psb-s_firmware, ipg-50x10pe-s_firmware, ipg-50x10pt-s_firmware, ipg-52h10pl-b_firmware, ipg-52h10pl-p_firmware, ipg-53h10pe-s_firmware, ipg-53h13p-ae_firmware, ipg-53h13p-b_firmware, ipg-53h13p-p_firmware, ipg-53h13p-s_firmware, ipg-53h13pe-s_firmware, ipg-53h13pe-wk-4f_firmware, ipg-53h13pe-wk_firmware, ipg-53h13pe-wp_firmware, ipg-53h13pes-s_firmware, ipg-53h13pes-sl_firmware, ipg-53h13pet-s_firmware, ipg-53h13pl-ae_firmware, ipg-53h13pl-b_firmware, ipg-53h13pl-p_firmware, ipg-53h13pl-r_firmware, ipg-53h13pl-s_firmware, ipg-53h13pls-s_firmware, ipg-53h20pl-ae_firmware, ipg-53h20pl-b_firmware, ipg-53h20pl-p_firmware, ipg-53h20pl-s_firmware, ipg-53h20py-s_firmware, ipg-53hv13pa-a_firmware, ipg-53hv13pa-s_firmware, ipg-53hv13pa-wp_firmware, ipg-53hv13pt-s_firmware, ipg-53x13pa-s_firmware, ipg-53x13pe-s_firmware, ipg-53x13pt-s_firmware, ipg-54h13pe-s_firmware, ipg-54h20pl-s_firmware, ipg-80h20pt-a_firmware, ipg-80h20pt-s_firmware, ipg-80he20ps-s_firmware, ipg-83h20pa-a_firmware, ipg-83h20pa-s_firmware, ipg-83h20pl-b_firmware, ipg-83h20pl-p_firmware, ipg-83h40af_firmware, ipg-83h40pl-b_firmware, ipg-83h40pl-p_firmware, ipg-83h50p-b_firmware, ipg-83h50p-p_firmware, ipg-hp500nr-s_firmware, ipm-50h10pe-o(r)_firmware, ipm-50h10pe-wr_firmware, ipm-50h10pe-wrc_firmware, ipm-50h10pe-wrm_firmware, ipm-50hv10pt-wr_firmware, ipm-50hv20pe-wr_firmware, ipm-50v10pl-wr_firmware, ipm-50v10pl-wrc_firmware, ipm-53h13pe-wr_firmware, ipm-53h13pe-wrc_firmware, ipm-53h13pe-wrm_firmware, ipm-53hv13pe-wr_firmware, ipm-53v13pl-wr_firmware, ivg-hp203y-ae_firmware, ivg-hp203y-se_firmware
CVE-2017-14385data_domain, data_domain_os
CVE-2017-15317ar120-s_firmware, ar1200-s_firmware, ar1200_firmware, ar150-s_firmware, ar150_firmware, ar160_firmware, ar200-s_firmware, ar200_firmware, ar2200-s_firmware, ar2200_firmware, ar3200_firmware, ar510_firmware, srg1300_firmware, srg2300_firmware, srg3300_firmware
CVE-2017-12740logo!_soft_comfort
CVE-2017-1365rational_collaborative_lifecycle_management, rational_doors_next_generation, rational_engineering_lifecycle_manager, rational_quality_manager, rational_rhapsody_design_manager, rational_software_architect_design_manager, rational_team_concert
CVE-2017-16897passport-wsfed-saml2
CVE-2017-17832monitoring_software
CVE-2017-17859internet_browser
CVE-2017-17866mupdf
CVE-2017-17871jextn_question_and_answer
CVE-2017-17872jextn_video_gallery
CVE-2017-17875jextn_faq_pro
CVE-2017-17877steam_link_firmware
CVE-2017-17888antiweb
CVE-2017-99447kt_pac1200_data_manager_firmware
CVE-2015-7667resads
CVE-2017-9608ffmpeg
CVE-2014-8389bu-2015_firmware, bu-3026_firmware, md-3025_firmware, poe-200cam_v2_firmware, wl-2000cam_firmware
CVE-2015-7889android
CVE-2017-15886chat
CVE-2017-15892chat
CVE-2017-5641flex_blazeds
CVE-2014-4914debian_linux, zend_framework
CVE-2017-17968nettransport_download_manager
CVE-2017-17933surgeftp
CVE-2017-17971dolibarr
CVE-2017-17910hs5-868-bs_firmware, hse1-868-bs_firmware, hse2-868-bs_firmware
CVE-2017-17974bas920_firmware, isc2000_firmware
CVE-2013-4578jdk, jre
CVE-2017-17997wireshark
CVE-2017-17089webmin
CVE-2016-10704magento
CVE-2017-18001secure_web_gateway
CVE-2017-18005exiv2
CVE-2017-18006portfolio_netpublish
CVE-2018-3810smart_google_code_inserter
CVE-2018-3811smart_google_code_inserter
CVE-2017-18008imagemagick
CVE-2017-18009opencv
CVE-2017-18010smart_marketing_sms_and_newsletters_forms
CVE-2017-18011affiliate_ads_for_clickbank_products
CVE-2018-3813brickstream_2300_2d_firmware, brickstream_2300_3d+_firmware, brickstream_2300_3d_firmware
CVE-2018-3814craft_cms
CVE-2017-18015share_this_image
CVE-2017-9964pelco_videoxpert
CVE-2017-9965pelco_videoxpert
CVE-2017-9966pelco_videoxpert
CVE-2017-1000442passbolt_api
CVE-2017-1000443openhacker
CVE-2017-1000445imagemagick
CVE-2017-1000412op-tee
CVE-2017-1000413op-tee
CVE-2017-1000448structured_data_linter
CVE-2017-1000451fs-git
CVE-2017-1000452samlify
CVE-2017-1000453cms_made_simple
CVE-2017-1000454cms_made_simple
CVE-2017-1557websphere_mq
CVE-2017-1000456libpoppler
CVE-2017-1000457mojoportal
CVE-2017-1000458bro
CVE-2017-1000419phpbb
CVE-2017-1000420syncthing
CVE-2017-1000421debian_linux, gifsicle
CVE-2017-1000422gdk-pixbuf
CVE-2017-1000423b2evolution
CVE-2017-1000424electron
CVE-2017-1000430rust-base64
CVE-2017-1000431ez_publish
CVE-2017-1000426mapproxy
CVE-2017-1000425liferay_portal
CVE-2017-1000427marked
CVE-2017-1000432vanilla_forums
CVE-2017-1000433pysaml2
CVE-2017-1000434furikake
CVE-2017-1000437gravity
CVE-2017-1000438omero
CVE-2017-1000459leanote
CVE-2017-1000463leafpub
CVE-2017-1000466invoice_ninja
CVE-2017-1000491shiba
CVE-2017-1000492desktop
CVE-2017-1000493rocket.chat
CVE-2017-18017linux_kernel
CVE-2018-4862octopus_deploy
CVE-2018-4868exiv2
CVE-2017-1000495quickapps_cms
CVE-2017-1000496commsy
CVE-2017-1000497pepperminty-wiki
CVE-2017-1000498androidsvg
CVE-2017-1000467lavalite
CVE-2017-1000501awstats
CVE-2017-1000488mautic
CVE-2017-1000489mautic
CVE-2017-1000490mautic
CVE-2017-1000476imagemagick
CVE-2017-1000477xmlbundle
CVE-2017-1000478elabftw
CVE-2017-1000482plone
CVE-2017-1000462bookstack
CVE-2017-1000469cobbler
CVE-2017-1000470goahead_web_server
CVE-2017-1000471goahead
CVE-2017-1000485nylas_mail
CVE-2017-1000486primefaces
CVE-2018-5072advanced_real_estate_script
CVE-2018-5073advanced_real_estate_script
CVE-2018-5074advanced_real_estate_script
CVE-2018-5075advanced_real_estate_script
CVE-2018-5076advanced_real_estate_script
CVE-2018-5077advanced_real_estate_script
CVE-2018-5078advanced_real_estate_script
CVE-2018-5085antivirus
CVE-2018-0743windows_10, windows_server_1709
CVE-2018-0744windows_10, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2012, windows_server_2016
CVE-2018-0745windows_10, windows_server_1709
CVE-2018-0746windows_10, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2012, windows_server_2016
CVE-2018-0747windows_10, windows_7, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2008, windows_server_2012, windows_server_2016
CVE-2018-0748windows_10, windows_7, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2008, windows_server_2012, windows_server_2016
CVE-2018-0749windows_10, windows_7, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2008, windows_server_2012, windows_server_2016
CVE-2018-0750windows_7, windows_server_2008
CVE-2018-0751windows_10, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2012, windows_server_2016
CVE-2018-0752windows_10, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2012, windows_server_2016
CVE-2018-0753windows_10, windows_8.1, windows_rt_8.1, windows_server_1709, windows_server_2012, windows_server_2016
CVE-2018-0758chakracore, edge
CVE-2018-0762chakracore, edge, internet_explorer
CVE-2018-0766edge
CVE-2018-0767chakracore, edge
CVE-2018-0768chakracore, edge
CVE-2018-0769chakracore, edge
CVE-2018-0770chakracore, edge
CVE-2018-0772chakracore, edge, internet_explorer
CVE-2018-0773chakracore, edge
CVE-2018-0774chakracore, edge
CVE-2018-0775chakracore, edge
CVE-2018-0776chakracore, edge
CVE-2018-0777chakracore, edge
CVE-2018-0778chakracore, edge
CVE-2018-0780chakracore, edge
CVE-2018-0781chakracore, edge
CVE-2018-0800chakracore, edge
CVE-2018-0803edge
CVE-2017-14960document_sciences_xpression
CVE-2017-1664security_key_lifecycle_manager
CVE-2017-1665security_key_lifecycle_manager
CVE-2017-1669security_key_lifecycle_manager
CVE-2017-1672security_key_lifecycle_manager
CVE-2017-1673security_key_lifecycle_manager
CVE-2017-1699websphere_mq
CVE-2017-1727security_key_lifecycle_manager
CVE-2018-5212simple_download_monitor
CVE-2018-5213simple_download_monitor
CVE-2018-5215fork_cms
CVE-2018-5216radiant_cms
CVE-2017-18022imagemagick
CVE-2018-5246imagemagick
CVE-2018-5247imagemagick
CVE-2018-5248imagemagick
CVE-2018-5249shaarli
CVE-2018-5251libming
CVE-2018-5253bento4