Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

UCSF Health is an integrated health care network encompassing several entities, including UCSF Medical Center, one of the nation’s top 10 hospitals according to U.S. News & World Report, and UCSF Benioff Children’s Hospitals, with campuses in Oakland and San Francisco. We are recognized throughout the world for our innovative patient care, advanced technology and pioneering research. For more than a century, we have offered the highest quality medical treatment. Today, our expertise covers virtually all specialties, from cancer to women's health. In addition, the compassionate care provided by our doctors, nurses and other staff is a key to our success. Our services generate about 1.1 million patient visits to our clinics a year and $3.2 billion in annual revenue. We have 12,000 employees and dozens of locations throughout San Francisco as well as outreach clinics throughout Northern California and beyond.

UCSF Health A.I CyberSecurity Scoring

UCSF Health

Company Details

Linkedin ID:

ucsfhealth

Employees number:

11,303

Number of followers:

115,691

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

ucsfhealth.org

IP Addresses:

3805

Company ID:

UCS_6354324

Scan Status:

Completed

AI scoreUCSF Health Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/ucsfhealth.jpeg
UCSF Health Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreUCSF Health Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ucsfhealth.jpeg
UCSF Health Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

UCSF Health Company CyberSecurity News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
UCSF HealthBreach8542/2023NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The University of California, San Francisco (UCSF) experienced a data breach on February 9, 2023, disclosed on April 26, 2023, due to a phishing attack targeting UCSF email accounts. The breach exposed sensitive personal information of individuals, including First Name, Last Name, Date of Birth, Medical Record Number (MRN), and Date of Service. The exact number of affected individuals remains undetermined, but the compromised data poses risks of identity theft, medical fraud, or targeted scams. The attack exploited human vulnerability through phishing, leading to unauthorized access to employee email accounts, which likely contained or facilitated access to patient records. While no ransomware was involved, the exposure of protected health information (PHI) particularly MRNs and service dates heightens concerns over compliance violations (e.g., HIPAA) and potential misuse of medical data. The breach underscores the persistent threat of social engineering attacks in healthcare institutions, where employee credentials serve as gateways to highly sensitive systems.

UCSF HealthRansomware10046/2020NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 13, 2020. The breach occurred on June 1, 2020, due to a cybersecurity attack that resulted in unauthorized access to personal information, including names and social security numbers, affecting an unspecified number of individuals. UCSF paid the attacker to recover encrypted data and has offered credit monitoring services to impacted individuals.

UCSF HealthBreach6039/2013NA
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 21, 2013. The breach occurred on September 25, 2013, when an unencrypted personal laptop containing identifiable health information was stolen from a physician's locked vehicle. The stolen laptop contained sensitive health information, which could potentially compromise the privacy and security of the affected individuals.

UCSF Health
Breach
Severity: 85
Impact: 4
Seen: 2/2023
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The University of California, San Francisco (UCSF) experienced a data breach on February 9, 2023, disclosed on April 26, 2023, due to a phishing attack targeting UCSF email accounts. The breach exposed sensitive personal information of individuals, including First Name, Last Name, Date of Birth, Medical Record Number (MRN), and Date of Service. The exact number of affected individuals remains undetermined, but the compromised data poses risks of identity theft, medical fraud, or targeted scams. The attack exploited human vulnerability through phishing, leading to unauthorized access to employee email accounts, which likely contained or facilitated access to patient records. While no ransomware was involved, the exposure of protected health information (PHI) particularly MRNs and service dates heightens concerns over compliance violations (e.g., HIPAA) and potential misuse of medical data. The breach underscores the persistent threat of social engineering attacks in healthcare institutions, where employee credentials serve as gateways to highly sensitive systems.

University of California San Francisco
Ransomware
Severity: 100
Impact: 4
Seen: 6/2020
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 13, 2020. The breach occurred on June 1, 2020, due to a cybersecurity attack that resulted in unauthorized access to personal information, including names and social security numbers, affecting an unspecified number of individuals. UCSF paid the attacker to recover encrypted data and has offered credit monitoring services to impacted individuals.

University of California San Francisco
Breach
Severity: 60
Impact: 3
Seen: 9/2013
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 21, 2013. The breach occurred on September 25, 2013, when an unencrypted personal laptop containing identifiable health information was stolen from a physician's locked vehicle. The stolen laptop contained sensitive health information, which could potentially compromise the privacy and security of the affected individuals.

Ailogo

UCSF Health Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for UCSF Health

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for UCSF Health in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for UCSF Health in 2026.

Incident Types UCSF Health vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for UCSF Health in 2026.

Incident History — UCSF Health (X = Date, Y = Severity)

UCSF Health cyber incidents detection timeline including parent company and subsidiaries

UCSF Health Company Subsidiaries

SubsidiaryImage

UCSF Health is an integrated health care network encompassing several entities, including UCSF Medical Center, one of the nation’s top 10 hospitals according to U.S. News & World Report, and UCSF Benioff Children’s Hospitals, with campuses in Oakland and San Francisco. We are recognized throughout the world for our innovative patient care, advanced technology and pioneering research. For more than a century, we have offered the highest quality medical treatment. Today, our expertise covers virtually all specialties, from cancer to women's health. In addition, the compassionate care provided by our doctors, nurses and other staff is a key to our success. Our services generate about 1.1 million patient visits to our clinics a year and $3.2 billion in annual revenue. We have 12,000 employees and dozens of locations throughout San Francisco as well as outreach clinics throughout Northern California and beyond.

Loading...
similarCompanies

UCSF Health Similar Companies

Ministry Of Health, Malaysia (KKM)

The Ministry of Health (Malay: Kementerian Kesihatan), abbreviated MOH, is a ministry of the Government of Malaysia that is responsible for health system: health behavior, cancer, public health, health management, medical research, health systems research, respiratory medicine, health promotion, hea

NHG Health

NHG Health is a leading public healthcare provider in Singapore recognised for its quality clinical care and its commitment in enabling healthier lives through preventive health, innovative solutions and person-centred programmes tailored to every life stage. Our integrated health system, which span

Sunrise Senior Living

Beginning with a single community in 1981, Sunrise Senior Living has grown to more than 270 communities throughout the U.S. and Canada. Each of our communities continues the mission laid out by founders Paul and Terry Klaassen more than 40 years ago: to champion quality of life for all seniors. Jo

Omega Healthcare Management Services

Founded in 2003, Omega Healthcare Management Services® (Omega Healthcare) is an AI-driven healthcare solutions company that partners across the healthcare ecosystem to deliver breakthrough results by reimagining and elevating revenue operations. Powered by the Omega Digital Platform®, our agentic AI

Karolinska University Hospital

Karolinska Universitetssjukhuset är ett av Europas största universitetssjukhus. Tillsammans med Karolinska Institutet leder vi den medicinska utvecklingen i Sverige. Sjukvård, forskning och utbildning är lika viktiga delar i arbetet för att förlänga och förbättra människors liv. Varje år besöker

IQVIA

IQVIA (NYSE:IQV) is a leading global provider of clinical research services, commercial insights and healthcare intelligence to the life sciences and healthcare industries. IQVIA’s portfolio of solutions are powered by IQVIA Connected Intelligence™ to deliver actionable insights and services built o

Memorial Sloan Kettering Cancer Center

The people of Memorial Sloan Kettering Cancer Center (MSK) are united by a singular mission: ending cancer for life. Our specialized care teams provide personalized, compassionate, expert care to patients of all ages. Informed by basic research done at our Sloan Kettering Institute, scientists acros

Trinity Health

Trinity Health is one of the largest not-for-profit, Catholic health care systems in the nation. It is a family of 123,000 colleagues and nearly 27,000 physicians and clinicians caring for diverse communities across 26 states. Nationally recognized for care and experience, the Trinity Health system

Formed in 1994, Brown University Health (Formerly Lifespan) is a not-for-profit health system based in Providence, RI comprising three teaching hospitals of The Warren Alpert Medical School of Brown University: Rhode Island Hospital and its Hasbro Children's; The Miriam Hospital; and Bradley Hospita

newsone

UCSF Health CyberSecurity News

March 19, 2026 07:00 AM
A man in his 20s lived 119 days on an artificial heart before transplant

Picard Medical (NYSE American: PMI) highlighted a UCSF Health case in which a patient in his twenties was supported on the SynCardia Total...

February 26, 2026 08:00 AM
GEHC, UCSF Health ink 10-year imaging collaboration

GEHC and UCSF Health are entering a 10-year collaboration, focusing on remote scanning, technologist education, and MR protocols.

February 12, 2026 08:00 AM
Picard Medical/ SynCardia Highlights Successful Bridge-to-Transplant Case at UCSF Health Using the SynCardia Total Artificial Heart

Successful heart transplant case following an implanted SynCardia total artificial heart reported at hospital with one of the largest heart...

February 12, 2026 08:00 AM
Artificial heart supports 37-year-old until transplant at top-ranked UCSF

UCSF's first heart transplant after a SynCardia total artificial heart marks a key milestone for advanced heart failure care as Picard...

December 10, 2025 08:00 AM
Providers urge HHS to scrap proposed HIPAA Security Rule updates

Over 100 provider organizations signed a letter urging HHS to rescind its proposed updates to the HIPAA Security Rule and instead work with...

November 18, 2025 08:00 AM
Outdated systems, shadow AI threaten healthcare cybersecurity

Outdated technology, shadow AI and inefficient IT systems are fueling healthcare cybersecurity challenges, clinician burnout and patient...

October 17, 2025 07:00 AM
UCSF Health to strengthen two community hospitals in San Francisco, US

University of California San Francisco (UCSF) Health is set to strengthen two community hospitals in San Francisco, US, as part of a $430m,...

October 15, 2025 07:00 AM
Inspiring Tomorrow’s Leaders: UCSF Medical Students Mentor High Schoolers Through Summer Camps

Each summer, UCSF medical students lead immersive health science camps for local high schoolers—part of the School of Medicine's commitment...

October 15, 2025 07:00 AM
UCSF is renaming the two community hospitals it acquired last year

UCSF Health is renaming St. Mary's Medical Center and Saint Francis Memorial Hospital, which it bought last year for a collective $100...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

UCSF Health CyberSecurity History Information

Official Website of UCSF Health

The official website of UCSF Health is http://www.ucsfhealth.org.

UCSF Health’s AI-Generated Cybersecurity Score

According to Rankiteo, UCSF Health’s AI-generated cybersecurity score is 725, reflecting their Moderate security posture.

How many security badges does UCSF Health’ have ?

According to Rankiteo, UCSF Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has UCSF Health been affected by any supply chain cyber incidents ?

According to Rankiteo, UCSF Health has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does UCSF Health have SOC 2 Type 1 certification ?

According to Rankiteo, UCSF Health is not certified under SOC 2 Type 1.

Does UCSF Health have SOC 2 Type 2 certification ?

According to Rankiteo, UCSF Health does not hold a SOC 2 Type 2 certification.

Does UCSF Health comply with GDPR ?

According to Rankiteo, UCSF Health is not listed as GDPR compliant.

Does UCSF Health have PCI DSS certification ?

According to Rankiteo, UCSF Health does not currently maintain PCI DSS compliance.

Does UCSF Health comply with HIPAA ?

According to Rankiteo, UCSF Health is not compliant with HIPAA regulations.

Does UCSF Health have ISO 27001 certification ?

According to Rankiteo,UCSF Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of UCSF Health

UCSF Health operates primarily in the Hospitals and Health Care industry.

Number of Employees at UCSF Health

UCSF Health employs approximately 11,303 people worldwide.

Subsidiaries Owned by UCSF Health

UCSF Health presently has no subsidiaries across any sectors.

UCSF Health’s LinkedIn Followers

UCSF Health’s official LinkedIn profile has approximately 115,691 followers.

NAICS Classification of UCSF Health

UCSF Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

UCSF Health’s Presence on Crunchbase

No, UCSF Health does not have a profile on Crunchbase.

UCSF Health’s Presence on LinkedIn

Yes, UCSF Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ucsfhealth.

Cybersecurity Incidents Involving UCSF Health

As of March 29, 2026, Rankiteo reports that UCSF Health has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

UCSF Health has an estimated 32,295 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at UCSF Health ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.

How does UCSF Health detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with public disclosure via california office of the attorney general..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at University of California San Francisco

Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 13, 2020. The breach occurred on June 1, 2020, due to a cybersecurity attack that resulted in unauthorized access to personal information, including names and social security numbers, affecting an unspecified number of individuals. UCSF paid the attacker to recover encrypted data and has offered credit monitoring services to impacted individuals.

Date Detected: 2020-06-01

Date Publicly Disclosed: 2020-11-13

Type: Data Breach

Incident : Data Breach

Title: Data Breach at University of California San Francisco (UCSF)

Description: A data breach occurred when an unencrypted personal laptop containing identifiable health information was stolen from a physician's locked vehicle.

Date Detected: 2013-09-25

Date Publicly Disclosed: 2013-11-21

Type: Data Breach

Attack Vector: Physical Theft

Vulnerability Exploited: Unencrypted Data

Threat Actor: Unknown

Motivation: Unknown

Incident : Data Breach

Title: Data Breach at University of California, San Francisco (UCSF) via Phishing Attack

Description: The California Office of the Attorney General reported a data breach involving the University of California, San Francisco (UCSF) on April 26, 2023. The breach occurred on February 9, 2023, due to a phishing attack that compromised some UCSF email accounts, potentially exposing individuals' First Name, Last Name, Date of Birth, MRN (Medical Record Number), and Date of Service. The number of individuals affected is currently unknown.

Date Detected: 2023-02-09

Date Publicly Disclosed: 2023-04-26

Type: Data Breach

Attack Vector: Phishing

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing (compromised email accounts).

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach UCS658072625

Data Compromised: Names, Social security numbers

Incident : Data Breach UCS212072625

Data Compromised: Identifiable Health Information

Systems Affected: Personal Laptop

Incident : Data Breach UCS157082025

Data Compromised: First name, Last name, Date of birth, Mrn, Date of service

Systems Affected: Email Accounts

Identity Theft Risk: Potential (PII exposed)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, , Identifiable Health Information, Personally Identifiable Information (Pii), Protected Health Information (Phi) and .

Which entities were affected by each incident ?

Incident : Data Breach UCS658072625

Entity Name: University of California San Francisco

Entity Type: Educational Institution

Industry: Education

Location: San Francisco, California

Incident : Data Breach UCS212072625

Entity Name: University of California San Francisco (UCSF)

Entity Type: Educational Institution

Industry: Healthcare

Location: San Francisco, California

Incident : Data Breach UCS157082025

Entity Name: University of California, San Francisco (UCSF)

Entity Type: Educational Institution / Healthcare Provider

Industry: Education, Healthcare

Location: San Francisco, California, USA

Customers Affected: Unknown

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach UCS157082025

Communication Strategy: Public disclosure via California Office of the Attorney General

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach UCS658072625

Type of Data Compromised: Names, Social security numbers

Incident : Data Breach UCS212072625

Type of Data Compromised: Identifiable Health Information

Sensitivity of Data: High

Data Encryption: No

Personally Identifiable Information: Yes

Incident : Data Breach UCS157082025

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)

Number of Records Exposed: Unknown

Sensitivity of Data: High (includes MRN and PHI)

Personally Identifiable Information: First NameLast NameDate of BirthMRNDate of Service

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach UCS658072625

Data Encryption: True

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach UCS157082025

Regulations Violated: Potentially HIPAA (Health Insurance Portability and Accountability Act), California Consumer Privacy Act (CCPA),

Regulatory Notifications: California Office of the Attorney General

References

Where can I find more information about each incident ?

Incident : Data Breach UCS658072625

Source: California Office of the Attorney General

Date Accessed: 2020-11-13

Incident : Data Breach UCS212072625

Source: California Office of the Attorney General

Incident : Data Breach UCS157082025

Source: California Office of the Attorney General

Date Accessed: 2023-04-26

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2020-11-13, and Source: California Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2023-04-26.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via California Office of the Attorney General.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach UCS157082025

Entry Point: Phishing (compromised email accounts)

Additional Questions

General Information

Has the company ever paid ransoms ?

Ransom Payment History: The company has Paid ransoms in the past.

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unknown.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2020-06-01.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-04-26.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, social security numbers, , Identifiable Health Information, First Name, Last Name, Date of Birth, MRN, Date of Service and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Email Accounts.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were First Name, Date of Birth, Identifiable Health Information, Date of Service, names, social security numbers, Last Name and MRN.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.

Ransomware Information

What was the highest ransom paid in a ransomware incident ?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was True.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing (compromised email accounts).

cve

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ucsfhealth' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge