Powered by Deep Web Technologies
Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Kevin Craft | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Kevin Craft About Us Kevin Craft Kevin Craft is a Marketing WriterProducer at Gensler. Most Recent Denver Public Schools Get Solar Energy System November 1 Unemployed Engineer...

2

Conference Publications Kevin Hammond  

E-Print Network [OSTI]

Conference Publications Kevin Hammond University of St Andrews, Scotland A Practical Guide for the Practicing PhD Student #12;Slide 2Kevin Hammond, University of St Andrews SICSA PhD Conference 2011 TargetD Students ­ What is a good conference paper ­ Some Tips and Tricks #12;Slide 3Kevin Hammond, University

St Andrews, University of

3

Kevin L. Rotz's Web Page  

E-Print Network [OSTI]

Kevin's Page. My name is Kevin L. Rotz, and I am currently a sixth year graduate student in the Purdue University Department of Mathematics. Previously I was...

4

V-204: A specially crafted query can cause BIND to terminate abnormally |  

Broader source: Energy.gov (indexed) [DOE]

V-204: A specially crafted query can cause BIND to terminate V-204: A specially crafted query can cause BIND to terminate abnormally V-204: A specially crafted query can cause BIND to terminate abnormally July 27, 2013 - 4:35am Addthis PROBLEM: A specially crafted query that includes malformed rdata can cause named to terminate with an assertion failure while rejecting the malformed query. PLATFORM: BIND 9.7 ABSTRACT: A specially crafted query sent to a BIND nameserver can cause it to crash (terminate abnormally). REFERENCE LINKS: ISC Knowledge Base CVE-2013-4854 IMPACT ASSESSMENT: High DISCUSSION: BIND is an implementation of the Domain Name System (DNS) protocols. Authoritative and recursive servers are equally vulnerable. Intentional exploitation of this condition can cause a denial of service in all nameservers running affected versions of BIND 9. Access Control Lists do

5

Kevin Glass | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Glass kglass Primary tabs View(active tab) Track Kevin Glass Staff Member Title: Scientist Address: P.O. Box 999 K8-83 City: Richland State: WA Zip Code: 99352 Phone: (509)...

6

Kevin Smith Sutherland House 234  

E-Print Network [OSTI]

Kevin Smith Sutherland House 234 PMB 3342 Nashville, TN 37235 January 27, 2010 Mr. Scott at Kevin.m.smith@vanderbilt.edu or by phone at (543)3843909. Thank you for your consideration. Sincerely, Kevin Smith The cover letter needs to be in business letter format...this includes

Bordenstein, Seth

7

Kolevar, Kevin From: Palmieri, Tom  

Broader source: Energy.gov (indexed) [DOE]

Kolevar, Kevin Kolevar, Kevin From: Palmieri, Tom Sent: Monday, July 16, 2001 2:24 PM To: Kolevar, Kevin; Longsworth, Paul Subject: PROPOSED MEEETING WITH GENERAL ATOMICS Kevin, Paul, I would like to send the attached note, set up a meeting as described, and invite the people listed below. Could you please advise whether you think the meeting is appropriate? Thanks, Tom Palmieri "NA e hope that you can attend. We hope that you can attend. Thanks, Tom Palmieri Attendees would be: Troy Timmons Kevin Kolevar Paul Longsworth Ed Siskin - NN Bill Magwood - NE Gail Marcus- NE Mark Joseph - CR Jon Rigby - CR 16325 DOE017-0948 Kolevar, Kevin From: dhowell@ta.doc.gov%internet [dhowell@ta.doc.gov] Sent: Monday, June 18, 2001 5:11 PM To: Bruce.Mehlman@ta.doc.gov%internet Cc: Kolevar, Kevin; Cesar_Conda@ovp.eop.gov%intemet; John.Sargent@ta.doc.gov%internet

8

Kevin Harding | Inventors | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Kevin Harding Kevin Harding Principal Engineer Manufacturing Technologies "Optics have grown enormously over the past 30 years and now touch our everyday lives, from internet...

9

INFORMATION--ARTS & CRAFTS --FOOD  

E-Print Network [OSTI]

INFORMATION--ARTS & CRAFTS --FOOD Listed in alphabetical order Ballroom and Kurtzman Room "Al Servicio de la Comunidad" (Latino Catholic Community): Information on community events and volunteer. All proceeds benefit the women of Arte Papel. Brazil Nuts: Student organization at Pitt. Information

Machery, Edouard

10

NREL: Energy Sciences - Kevin Mistry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mistry Mistry Graduate Student Phone: (303) 384-6691 Email: kevin.mistry@nrel.gov At NREL Since: 2009 Kevin Mistry graduated from Harvey Mudd College in 2007 with a B.S. in Physics. His undergraduate research included experimental and computational work in condensed matter, plasma, and optical physics. At Harvey Mudd, he studied electron thermalization dynamics in thin gold films using second harmonic generation. After graduation, Kevin spent a year in Austria on a Fulbright fellowship collaborating with an ultracold atoms group in Innsbruck. In 2008, he began his graduate studies at the University of Colorado at Boulder and joined NREL the following summer to work with Dr. Jeffrey Blackburn exploring the electrical and optical properties of single-walled carbon nanotubes.

11

CURRICULUM VITAE JOHN KEVIN GREEN  

E-Print Network [OSTI]

CURRICULUM VITAE JOHN KEVIN GREEN Head, Department of Accounting Professor of Accounting Williams CURRICULUM VITAE 2 Assistant Professor of Economics, The University of the South, 1970-77 Economic Adviser. Volpi, and David E. Stout, "Transnational Income Reporting #12;GREEN: 2003 CURRICULUM VITAE 3

Marsh, David

12

Federal Energy and Water Management Award Guy Lunay, Kevin Myles...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Guy Lunay, Kevin Myles, Cullen Rabel, Elizabeth Taylor, Mark Trimarchi Federal Energy and Water Management Award Guy Lunay, Kevin Myles, Cullen Rabel, Elizabeth Taylor, Mark...

13

EarthCraft Virginia | Open Energy Information  

Open Energy Info (EERE)

EarthCraft Virginia EarthCraft Virginia Jump to: navigation, search Name EarthCraft Virginia Place Richmond, VA Zip 23220 Website http://www.ecvirginia.org/ Coordinates 37.5464259°, -77.4644607° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.5464259,"lon":-77.4644607,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

14

SolarCraft Services Inc | Open Energy Information  

Open Energy Info (EERE)

Name: SolarCraft Services Inc Place: Novato, California Zip: 94949 Sector: Solar Product: Solar thermal and PV system installer. References: SolarCraft Services Inc1 This article...

15

Kevin Redding | Center for Bio-Inspired Solar Fuel Production  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ana Moore Anne Jones Devens Gust Don Seo Giovanna Ghirlanda Hao Yan James Allen Kevin Redding Petra Fromme Thomas Moore Yan Liu Kevin Redding Associate Director of the Center...

16

Kevin T. Hagerty | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Kevin T. Hagerty Kevin T. Hagerty About Us Kevin T. Hagerty - Director, Office of Information Resources As Director of the Office of Information Resources, Mr. Hagerty is responsible for the Department's Freedom of Information Act (FOIA) Office, Department's Directives Program and the Information Technology Program for the Office of Management. He joined the Department of Energy in 2006. Mr. Hagerty is an experienced manager in both the public and private sectors. In addition to working for the Department of Energy, he has worked for: the U.S. Coast Guard; the U.S. Navy Military Sealift Command; the U.S Navy Supervisor of Shipbuilding, Conversion and Repair; Charleston Naval Shipyard; the U.S. Army Corps of Engineers; Global Marine Corporation; and, numerous maritime related companies. Some of the

17

Sweat-atoms: crafting physical objects with everyday exercise  

Science Journals Connector (OSTI)

In this paper, we introduce a novel idea of associating physical exercise with the creative process of crafting physical objects. Our aim is to harness physical exercise as a source for self-expression. We present Sweat-Atoms, a 3D modeling and printing ... Keywords: 3d printing, crafting, exertion, physical exercise

Rohit A. Khot

2013-04-01T23:59:59.000Z

18

Linguistic resources from web corpora Kevin Scannell  

E-Print Network [OSTI]

Linguistic resources from web corpora Kevin Scannell Saint Louis University 7 September 2013 #12 #12;(I'm talking about the web) So it's not-so-great as an archive Q: Can we make it great? Primary: Definitely yes for #1, maybe not for #2 #12;An Crúbadán: History First attempt at crawling Irish web, Jan

Scannell, Kevin Patrick

19

Metadata for Web-Crawling Kevin Scannell  

E-Print Network [OSTI]

Metadata for Web-Crawling Kevin Scannell Saint Louis University WAC Panel Discussion 16 September 2007 Louvain-la-Neuve, Belgium #12;Primary Goal A single, open source tool for accurate web corpus creation in any language ­ This includes the entire process from locating appropriate documents on the web

Scannell, Kevin Patrick

20

PHYSICS (Div. III) Chair: Professor KEVIN JONES  

E-Print Network [OSTI]

1 PHYSICS (Div. III) Chair: Professor KEVIN JONES Professors: AALBERTS, S. BOLTON*, K. JONES a laser work? What is a black hole? What are the fundamental building blocks of the universe? Physics majors and Astrophysics majors study these and related questions to understand the physical world around

Aalberts, Daniel P.

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Review: Drawing Lines in the Forest: Creating Wilderness Areas in the Pacific Northwest, by Kevin R. Marsh  

E-Print Network [OSTI]

University, Australia Marsh, Kevin R. Drawing Lines in theNorthwest By Kevin R. Marsh Reviewed by Elery Hamilton-

Hamilton-Smith, Elery

2008-01-01T23:59:59.000Z

22

Masters Examination Milestones Craft and Hawkins Department of Petroleum Engineering  

E-Print Network [OSTI]

Masters Examination Milestones Craft and Hawkins Department of Petroleum Engineering This document in Petroleum Engineering at Louisiana State University. A. Thesis Option The student must demonstrate proficiency in research or applying advanced technology to petroleum engineering. The student's degree plan

Harms, Kyle E.

23

Hybrid re Assembage : bridging traditional craft and digital design  

E-Print Network [OSTI]

Hybrid reAssemblage is a design gestalt that lies at the cross-section of digital design practice and the tactile qualities of traditional craft. It spans a territory in which the value of artifacts is produced through ...

Zoran, Amit (Amit Shlomo)

2013-01-01T23:59:59.000Z

24

KEVIN KELLY, OLIVER SCHULTE, VINCENT HENDRICKS RELIABLE BELIEF REVISION  

E-Print Network [OSTI]

KEVIN KELLY, OLIVER SCHULTE, VINCENT HENDRICKS RELIABLE BELIEF REVISION ABSTRACT. Philosophical with the principles.2 1For general introductions, cf. (Osherson et al., 1986) and (Kelly, 1995). 2Hilary Putnam (Putnam, 1963) responded to Rudolf Carnap's theory of con rmation in just this way. 1 #12;2 KEVIN KELLY

Andrews, Peter B.

25

KEVIN KELLY , OLIVER SCHULTE , VINCENT HENDRICKS RELIABLE BELIEF REVISION  

E-Print Network [OSTI]

KEVIN KELLY , OLIVER SCHULTE , VINCENT HENDRICKS RELIABLE BELIEF REVISION ABSTRACT. Philosophical with the principles. 2 1 For general introductions, cf. (Osherson et al., 1986) and (Kelly, 1995). 2 Hilary Putnam (Putnam, 1963) responded to Rudolf Carnap's theory of confirmation in just this way. 1 #12; 2 KEVIN KELLY

Schulte, Oliver

26

A Software Engineering Approach to Constraint Programming Systems Ka Boon Kevin Ng  

E-Print Network [OSTI]

Application Technologies Honeywell Automation and Control Solutions kevin.ng@honeywell.com Chiu Wo Choi Dept

Henz, Martin

27

Crafting the next generation | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Crafting the next generation Crafting the next generation Crafting the next generation Posted: July 16, 2012 - 3:52pm | Y-12 Report | Volume 9, Issue 1 | 2012 I truly enjoyed the opportunity to work with such great people every day," said Brandy Ward, an ironworker/rigger graduate of Y-12's Apprentice Program. "It was a lot of work, but I'd do it again in a heartbeat." The Y-12 Apprentice Program is about a lot of things, including second chances. The program that offers workers an opportunity to become highly skilled craftspeople was given a second chance just four years ago. The program was reinstated in 2008 after a 26-year hiatus and recently celebrated its first graduation in 30 years. Beth Green, director for Resource Management, said each apprentice is trained to union

28

Robotic Construction by Contour Crafting Behrokh Khoshnevis, Professor, University of Southern California  

E-Print Network [OSTI]

the development of three novel Additive Manufacturing (3D Printing) processes called Contour Crafting, SIS and MPM

Liu, X. Shirley

29

Gamache, Lori M From: Smith, Kevin W (ORP) Sent:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Gamache, Lori M From: Smith, Kevin W (ORP) Sent: Wednesday, May 29, 2013 3:46 PM To: Johnson, Michael D Subject: EW: Message from Mike - my retirement Nicely done Mike. From: A...

30

Landscape Dynamics and Considerations Kevin M. Rich and Patricia Mehlhop  

E-Print Network [OSTI]

Chapter 7 Landscape Dynamics and Considerations Kevin M. Rich and Patricia Mehlhop Introduction Landscape ecology is the study of spatial heterogene- ityanditsinfluenceonorganismsand ecologicalprocesses,and meth- odsfor quantifymgspatialheterogeneityhavecontributed to the emergence of landscape ecology

31

Kevin Shaw | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Kevin Shaw Kevin Shaw Deputy Director for Science Programs Deputy Director Home Mission & Functions Deputy Director Biography Organization Staff Presentations & Testimony Federal Advisory Committees Committees of Visitors Contact Information Deputy Director for Science Programs U.S. Department of Energy SC-2/Forrestal Building 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 F: (202) 586-4120 E: sc.science@science.doe.gov U.S. Department of Energy SC-2/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-5316 F: (301) 903-7780 E: sc.science@science.doe.gov Staff Kevin Shaw Print Text Size: A A A RSS Feeds FeedbackShare Page Program Analyst Office of the Deputy Director for Science Programs SC-2/Forrestal Building, Room 3H-051 U.S. Department of Energy

32

BUILDING STRONG KEVIN LOGAN | PROJECT MANAGER | 412.395.7309  

E-Print Network [OSTI]

BUILDING STRONG® KEVIN LOGAN | PROJECT MANAGER | 412.395.7309 U.S. ARMY CORPS OF ENGINEERS ­ PITTSBURGH DISTRICT 1000 LIBERTY AVENUE | PITTSBURGH, PA 15222 HTTP://WWW.LRP.USACE.ARMY.MIL Upper Ohio Navigation Study PROJECT DESCRIPTION The Upper Ohio Navigation Study will determine the best plan

US Army Corps of Engineers

33

Architectural Mismatch in Service-Oriented Architectures Kevin Bierhoff  

E-Print Network [OSTI]

Architectural Mismatch in Service-Oriented Architectures Kevin Bierhoff Institute for Software applications, it has not been applied to Service-Oriented Architectures (SOAs). A major contribution that this and other problems of architectural mismatch are still relevant in developing Service-Oriented Architectures

Grechanik, Mark

34

"Measurement of Cell Movement in Microfluidic Channels" Kevin Okiah  

E-Print Network [OSTI]

"Measurement of Cell Movement in Microfluidic Channels" Kevin Okiah Faculty Mentor: Dr. Christopher-throughput sensors that use an array of detectors to measure cells in microfluidics channels. These miniature the production of microfluidic channels and their union with the sensing surface of the webcam as well as micro

Mountziaris, T. J.

35

GROWTH OF BETTI NUMBERS BRYAN CLAIR AND KEVIN WHYTE  

E-Print Network [OSTI]

GROWTH OF BETTI NUMBERS BRYAN CLAIR AND KEVIN WHYTE Introduction Let X = eX= be a finite simplicial complex. We study the growth rate of the Betti numbers coverings of X. It is easy to see that the sequence* * of Betti numbers {bq(Xi)} can grow at most

Whyte, Kevin

36

An Approach For Evolving Novel Organizational Forms Kevin Crowston  

E-Print Network [OSTI]

. Organizational ecologists tend to minimize the role of organizational learning and adaptation and instead seeAn Approach For Evolving Novel Organizational Forms Kevin Crowston crowston@umich.edu School;An approach for evolving novel organizational forms Abstract A key problem in organization theory

Crowston, Kevin

37

Doctor of Philosophy Recipients Coray Mariu Colina Kevin Lee Epting  

E-Print Network [OSTI]

Doctor of Philosophy Recipients Coray Mariu Colina Kevin Lee Epting Advisor: Keith Gubbins Advisor: George Roberts Bachelor of Science Graduates Alan Christopher Boyd Matthew Robert Kain Brian Lowell Laude Magna Cum Laude Summa Cum Laude #12;Student Accomplishments Alan Christopher Boyd ­ B

Velev, Orlin D.

38

SBOT GEORGIA SOUTHEASTERN POWER ADMIN POC Ann Craft Telephone  

Broader source: Energy.gov (indexed) [DOE]

GEORGIA GEORGIA SOUTHEASTERN POWER ADMIN POC Ann Craft Telephone (706) 213-3823 Email annc@sepa.doe.gov ADMINISTATIVE / WASTE / REMEDIATION Office Administrative Services 561110 Facilities Support Services 561210 Security Systems Services (except Locksmiths) 561621 Locksmiths 561622 Exterminating and Pest Control Services 561710 Janitorial Services 561720 Landscaping Services 561730 Other Nonhazardous Waste Treatment and Disposal 562219 Remediation Services 562910 CONSTRUCTION Industrial Building Construction 236210 Commercial and Institutional Building Construction 236220 Water and Sewer Line and Related Structures Construction 237110 Power and Communication Line and Related Structures Construction 237130 Other Heavy and Civil Engineering Construction 237990 Other Foundation, Structure, and Building Exterior Contractors

39

The Micro Craft iSTAR Micro Air Vehicle: Control System Design and Testing  

E-Print Network [OSTI]

-rotating propellers) benefits both reliability and cost. Figure 1: iSTAR Micro Air Vehicle The Micro Craft iSTAR VTOLThe Micro Craft iSTAR Micro Air Vehicle: Control System Design and Testing Larry Lipera i Abstract The iSTAR Micro Air Vehicle (MAV) is a unique 9-inch diameter ducted air vehicle weighing

Rotkowitz, Michael C.

40

NNSA Announces Kevin W. Smith as Los Alamos Site Office Manager...  

National Nuclear Security Administration (NNSA)

Kevin W. Smith as Los Alamos Site Office Manager | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs@memphis.edu Wireless Compact Radar  

E-Print Network [OSTI]

Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs@memphis.edu Wireless 1: Ramp signals obtained from Target #12;Kevin P. Boggs || Office of Technology Transfer || 901.242 m. #12;Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs

Dasgupta, Dipankar

42

Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs@memphis.edu AutoWitness  

E-Print Network [OSTI]

Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs@memphis.edu Auto and lifelong traumatic experience for its victims. #12;Kevin P. Boggs || Office of Technology Transfer || 901://www.popsci.com/science/article/2010-10/brilliant-10-santosh-kumar-sensor-guru #12;Kevin P. Boggs || Office of Technology Transfer

Dasgupta, Dipankar

43

2013 China Latin America Economic Bulletin Rebecca Ray and Kevin P. Gallagher  

E-Print Network [OSTI]

2013 China ­ Latin America Economic Bulletin Rebecca Ray and Kevin P. Gallagher The China-Latin America Economic Bulletin is an annual note that summarizes and synthesizes trends in the burgeoning China-Latin America economic

Dennett, Daniel

44

A Bayesian Approach to Automating Argumentation Richard McConachy, Kevin B. Korb & Ingrid Zukerman  

E-Print Network [OSTI]

McConachy,KevinB. Korband IngridZukerman(1998) A BayesianApproachto AutomatingArgumentation.In D.M.W. Powers (ed.) NeMLaP3

45

Energy Efficient Process Heating: Insulation and Thermal Mass Kevin Carpenter and Kelly Kissock  

E-Print Network [OSTI]

1 Energy Efficient Process Heating: Insulation and Thermal Mass Kevin Carpenter and Kelly Kissock-0210 Phone: (937) 229-2852 Fax: (937) 229-4766 Email: Kelly.Kissock@notes.udayton.edu ABSTRACT Open tanks

Kissock, Kelly

46

Minority-Carrier Thermoelectric Devices Kevin P. Pipe and Rajeev J. Ram  

E-Print Network [OSTI]

results are given for several common material systems. Introduction Thermoelectric effects haveMinority-Carrier Thermoelectric Devices Kevin P. Pipe and Rajeev J. Ram Research Laboratory the thermoelectric performance of the electronic devices themselves. Recognizing that minority carriers play

47

Julia Fink, CRAFT +41 (0) 21 693 20 61 EPFL, Station 20 julia.fink@epfl.ch NCCR robotics  

E-Print Network [OSTI]

Julia Fink, CRAFT +41 (0) 21 693 20 61 EPFL, Station 20 julia.fink@epfl.ch NCCR robotics CH-1015 Lausanne http://craft.epfl.ch www.nccr-robotics.ch Contact References Kahn Jr., P.H., Friedman, B., Perez-Granados, D.R., Freier, N.G.: Robotic Pets in the Lives of Preschool Children. Proceedings CHI EA `04, 1449

Dalang, Robert C.

48

PhD Examination Milestones Craft and Hawkins Department of Petroleum Engineering  

E-Print Network [OSTI]

PhD Examination Milestones Craft and Hawkins Department of Petroleum Engineering This document in the area 1.4. place the proposed research into a meaningful context with petroleum engineering 1, including sufficient knowledge of and proficiency in other areas of petroleum engineering, geosciences

Harms, Kyle E.

49

Economic Contributions of the Florida Craft Brewing Industry to the Florida Economy  

E-Print Network [OSTI]

Economic Contributions of the Florida Craft Brewing Industry to the Florida Economy Timothy G. Taylor, Ph.D. Economic Consultant, Gainesville, FL Gary F. Fairchild, Ph.D. Economic Consultant, Gainesville, FL Alan W. Hodges, Ph.D. Food and Resource Economics Department, University of Florida

Florida, University of

50

Skill of the Craft for Users at E949 at CA Introduction  

E-Print Network [OSTI]

protection. 2. Electrical Work on electrical devices is deemed low hazard skill of the craft * if: . AC or DC modules. ­ Instruments, detectors, and data acquisition systems may be tested and analyzed using release of 10 joules or more of energy * Injury is possible from flash hazards and non­electrical

51

Fiber optic probe of free electron evanescent fields in the optical frequency range Jin-Kyu So, Kevin F. MacDonald, and Nikolay I. Zheludev  

E-Print Network [OSTI]

, Kevin F. MacDonald, and Nikolay I. Zheludev Citation: Applied Physics Letters 104, 201101 (2014); doi evanescent fields in the optical frequency range Jin-Kyu So,1,a) Kevin F. MacDonald,1 and Nikolay I. Zheludev

Zheludev, Nikolay

52

Docket No. EO-05-01: Letter from Kevin Kolevar, Director Office of  

Broader source: Energy.gov (indexed) [DOE]

from Kevin Kolevar, Director Office of from Kevin Kolevar, Director Office of Electricity Delivery and Energy Reliability, to Mr. Robert Driscoll, CEO Mirant Mid-Atlantic, LLC Docket No. EO-05-01: Letter from Kevin Kolevar, Director Office of Electricity Delivery and Energy Reliability, to Mr. Robert Driscoll, CEO Mirant Mid-Atlantic, LLC Docket No. EO-05-01: On December 20, 2005, the Secretary of Energy issued DOE Order No. 202-05-3, pursuant to section 202(c) of the Federal Power Act, 16 U.S.c. § 824a(c), ordering the operation of the Potomac River Generating Station (the Plant) owned by Mirant Potomac River, LLC (Mirant). DOE has determined that the operation of the Plant under Option A pursuant to DOE's January 4, 2006 instructions does not provide an adequate level of electric reliability to the Central D.C. area under current circumstances. Operation

53

Traditional building trades and crafts in changing socio-economic realities and present aesthetic values : case studies in Syria  

E-Print Network [OSTI]

Traditional building trades and crafts made a major contribution to the quality and the character of architecture in the past. The advent of industrialization in the name of modernization eclipsed these building trades and ...

Abed, Jamal H

1988-01-01T23:59:59.000Z

54

An Observational Estimate of Inferred Ocean Energy Divergence KEVIN E. TRENBERTH AND JOHN T. FASULLO  

E-Print Network [OSTI]

An Observational Estimate of Inferred Ocean Energy Divergence KEVIN E. TRENBERTH AND JOHN T, in final form 25 September 2007) ABSTRACT Monthly net surface energy fluxes (FS) over the oceans are computed as residuals of the atmospheric energy budget using top-of-atmosphere (TOA) net radiation (RT

Fasullo, John

55

The Limits of ESS Methodology Simon M. Huttegger Kevin J. S. Zollman  

E-Print Network [OSTI]

The Limits of ESS Methodology Simon M. Huttegger Kevin J. S. Zollman December 31, 2010 Abstract of evolutionarily stable strategy (ESS) can tell us about evolutionary processes. We shall argue that ESS is very on refinements of Nash equilibrium. In the first place, ESS can also be viewed as a Nash equilibrium refinement

Zollman, Kevin

56

Evaluating Trace Cache Energy Efficiency MICHELE CO, DEE A. B. WEIKLE, and KEVIN SKADRON  

E-Print Network [OSTI]

Evaluating Trace Cache Energy Efficiency MICHELE CO, DEE A. B. WEIKLE, and KEVIN SKADRON University of Virginia Future fetch engines need to be energy efficient. Much research has focused on improving fetch of basic blocks translates to significant energy-efficiency gains. We compare proces- sor performance

Skadron, Kevin

57

Tuning RED for Web Traffic * Mikkel Christiansen, ** Kevin Jeffay, David Ott, F. Donelson Smith  

E-Print Network [OSTI]

139 Tuning RED for Web Traffic * Mikkel Christiansen, ** Kevin Jeffay, David Ott, F. Donelson Smith http://www.cs.unc.edu/Research/dirt Abstract We study the effects of RED on the performance of Web --- response time for HTTP request­response pairs. We empirically evaluate RED across a range of parameter

Jeffay, Kevin

58

Polygonal model for layered inorganic nanotubes Kevin Tibbetts,* Robert Doe, and Gerbrand Ceder  

E-Print Network [OSTI]

the shape of the cross section. Circular and polygonal nanotubes are compared based on their strain energy of several concentric "single-walled" nanotubes.2,19,20 In this paper we develop a model for the energyPolygonal model for layered inorganic nanotubes Kevin Tibbetts,* Robert Doe, and Gerbrand Ceder

Ceder, Gerbrand

59

UBC Social Ecological Economic Development Studies (SEEDS) Student Report Kevin Preston  

E-Print Network [OSTI]

UBC Social Ecological Economic Development Studies (SEEDS) Student Report Kevin Preston LCA of New ­ the UBC LCA Project ­ which aims to support the development of the field of life cycle assessment (LCA at rob.sianchuk@gmail.com #12;University of British Columbia LCA of New UBC Pharmacy Building Life Cycle

60

Kevin Yager on the Nanoscience of Studying Scattered X-Rays  

SciTech Connect (OSTI)

Kevin Yager, a scientist at Brookhaven Lab's Center for Functional Nanomaterials, discusses his research on materials spanning just billionths of a meter. Yager specializes in making new materials through meticulously guided self-assembly and probing nanoscale structures with a technique called x-ray scattering.

Yager; Kevin

2014-03-31T23:59:59.000Z

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Comment on Leitgeb's Stability Theory of Belief Hanti Lin Kevin T. Kelly  

E-Print Network [OSTI]

Comment on Leitgeb's Stability Theory of Belief Hanti Lin Kevin T. Kelly Carnegie Mellon University with the generalized odds-threshold acceptance rules recommended in Lin & Kelly (2012).1 Here is a simple geometrical to one side or may all fal to the other. 3 In Lin & Kelly (2012), we likewise assume P1 and P2, but we do

Fitelson, Branden

62

Measurement of Cell Movement in Microfluidic Channels Kevin Okiah, Christopher Salthouse, Ph.D.  

E-Print Network [OSTI]

Measurement of Cell Movement in Microfluidic Channels Kevin Okiah, Christopher Salthouse, Ph study of microscopic particles such as cells, microfluidic technology is a powerful tool because in microfluidic systems as part of a larger project to miniaturize flow cytometers. By replacing the single large

Mountziaris, T. J.

63

Online and o#ine selling in limit order markets Kevin L. Chang # Aaron Johnson +  

E-Print Network [OSTI]

and the corresponding transactions are executed by the computers that run the market. With the appearance of electronic orders, and then actually execute the transactions on an electronic market. Sophisticated algorithmsOnline and o#ine selling in limit order markets Kevin L. Chang # Aaron Johnson + Abstract

Chang, Kevin L.

64

Time Series Methods for ForecastingElectricityMarket Pricing Zoran Obradovic Kevin Tomsovic  

E-Print Network [OSTI]

Time Series Methods for ForecastingElectricityMarket Pricing Zoran Obradovic Kevin Tomsovic PO Box the predictability of electricity price under new market regulations and the engineering aspects of large scale of traditional commodities, such as,oil or agricultural products. Clearly, assessing the effectiveness

Obradovic, Zoran

65

Design of a Sediment Mitigation System Sheri Gravette Kevin Cazenas Said Masoud Rayhan Ain  

E-Print Network [OSTI]

Design of a Sediment Mitigation System Sheri Gravette Kevin Cazenas Said Masoud Rayhan Ain · State the gap · Show how it creates a win-win · Asymptotic deposition of sediments · Expected capacity reached by 2030 · Sediment scour exponential increases as flow rate increases Max Recorded Flow Rates: 1. (1972

66

Surveying the Citizen Science Landscape by Andrea Wiggins & Kevin Crowston1  

E-Print Network [OSTI]

1 Surveying the Citizen Science Landscape by Andrea Wiggins & Kevin Crowston1 Abstract Citizen science has seen enormous growth in recent years, in part due to the influence of the Internet of the diversity of the field as a whole. In this work, we present the results of a survey of citizen science

Crowston, Kevin

67

Parental Investment and Reproductive Strategies Steven Mascaro, Kevin B. Korb and Ann E. Nicholson  

E-Print Network [OSTI]

Parental Investment and Reproductive Strategies Steven Mascaro, Kevin B. Korb and Ann E. Nicholson,korb,annng@csse.monash.edu.au Abstract Parental investment theory has been able to explain the evolution of investments by each sex based on the investments made by each sex. We use an ALife sim- ulation to investigate the e#11;ect

Nicholson, Ann

68

Ahead of Time Deployment in ROM of a Kevin Marquet, Alexandre Courbot, and Gilles Grimaud  

E-Print Network [OSTI]

Ahead of Time Deployment in ROM of a Java-OS Kevin Marquet, Alexandre Courbot, and Gilles Grimaud, usually Read-Only Memory (ROM), to produce the initial state of the system on the device. In addition to ROM, tiny devices include several types of writable memories such as RAM, EEPROM, or Flash memory. All

Paris-Sud XI, Université de

69

Landscape Ecology: Past, Present and Future Samuel A. Cushman, Jeffery Evans, and Kevin McGarigal  

E-Print Network [OSTI]

Chapter 4 Landscape Ecology: Past, Present and Future Samuel A. Cushman, Jeffery Evans, and Kevin McGarigal 4.1 Historical Origins of Landscape Ecology In the preceding chapters we discussed and temporal scale and scaling. Landscape ecology is the science of linking patterns and processes across scale

McGarigal, Kevin

70

Transient Analysis of a CMOS Inverter Driving Resistive Interconnect Kevin T. Tang and Eby G. Friedman  

E-Print Network [OSTI]

are characterized by the th power law model. In order to emphasize the nonlinear behavior of a CMOS inverterTransient Analysis of a CMOS Inverter Driving Resistive Interconnect Kevin T. Tang and Eby G. Friedman Department of Electrical and Computer Engineering University of Rochester Rochester, New York

Friedman, Eby G.

71

Landscape Genomics: A Brief Perspective Michael K. Schwartz, Gordon Luikart, Kevin S. McKelvey,  

E-Print Network [OSTI]

Chapter 9 Landscape Genomics: A Brief Perspective Michael K. Schwartz, Gordon Luikart, Kevin S. Mc) markers. Landscape genomics, on the other hand, is the simultaneous study of tens-to-hundreds of markers collected across a landscape. While landscape genomics is, in one sense, simply landscape genetics with lots

72

Middle-ear circuit model parameters based on a population of Kevin N. O'Connor and Sunil Puriaa  

E-Print Network [OSTI]

, Stanford, California 94305, and Palo Alto Veterans Affairs, 3801 Miranda Ave., Palo Alto, California 94304Middle-ear circuit model parameters based on a population of human ears Kevin N. O'Connor and Sunil

Allen, Jont

73

A Review of "Marriage, Performance, and Politics at the Jacobean Court" by Kevin Curran  

E-Print Network [OSTI]

reviews 159 to childbed suffering ?invites us to see the suffering that attends the process of reproduction in the wake of original sin as a circumscribed, through terrifying, realm of disorder over which God gave the human mind and spirit... for women?s sacrifice. Kevin Curran. Marriage, Performance, and Politics at the Jacobean Court. Burlington, VT: Ashgate, 2009. ix + 187 pp. $99.95. Review by m. l. stapleton, indiana university-purdue university, fort wayne. This study analyzes the six...

Stapleton, M. L.

2010-01-01T23:59:59.000Z

74

DOI 10.1515/nanoph-2012-0040Nanophotonics 2013; 2(2): 153160 2013 Science Wise Publishing & Monan Liu, Rui Chen, Giorgio Adamo, Kevin F. MacDonald, Edbert J. Sie, Tze Chien Sum,  

E-Print Network [OSTI]

Liu, Rui Chen, Giorgio Adamo, Kevin F. MacDonald, Edbert J. Sie, Tze Chien Sum, Nikolay I. Zheludev, 637378, Singapore Kevin F. MacDonald: Optoelectronics Research Centre and Centre for Photonic

Zheludev, Nikolay

75

1. Project Proposal Guidelines Outline and advice for crafting a project proposal to use when setting up MEng Projects  

E-Print Network [OSTI]

1. Project Proposal Guidelines Outline and advice for crafting a project proposal to use when setting up MEng Projects as well as convincing a faculty advisor or client to work with you on a project that you write a proposal as part of your professional education and to help you end up with good project

Walter, M.Todd

76
77

The performance and the gaseous emissions of two small marine craft diesel engines fuelled with biodiesel  

Science Journals Connector (OSTI)

An experimental investigation of the application of biodiesel (recycled cooking fat and vegetable oil) on small marine craft diesel engines was completed. The tests were performed on Perkins 404C-22 (Marinised) in Boat No. 1 (Fair Countess) and on Nanni Diesel 3.100HE in Boat No. 2 (Aimee 2). The tests were designed and carried out in accordance with the standardised test procedure described in ISO 8178-4 Test Cycle E5. The performance and gaseous emissions of the tested engines were compared and analysed. The test results show that the power output for both trial engines operating with biodiesel were comparable to that fuelled with fossil diesel, but with an increase in fuel consumptions. The \\{NOx\\} emissions were found to be reduced when fuelled with biodiesel. The CO emissions were found to be lower when the engines operated at higher loads using biodiesel.

A.P. Roskilly; S.K. Nanda; Y.D. Wang; J. Chirkowski

2008-01-01T23:59:59.000Z

78

Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs@memphis.edu Novel Real-Time Sub-Millimeter Imaging Device and Methods  

E-Print Network [OSTI]

Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs@memphis.edu Novel Real || Office of Technology Transfer || 901.678.1712 || kpboggs@memphis.edu The image scanning methodology makes #12;Kevin P. Boggs || Office of Technology Transfer || 901.678.1712 || kpboggs

Dasgupta, Dipankar

79

A Review of "Images Wars: Promoting Kings and Commonwealth in England, 1603-1660" by Kevin Sharpe  

E-Print Network [OSTI]

Atlantic studies. Kevin Sharpe. Images Wars: Promoting Kings and Commonwealth in England, 1603-1660. New Haven: Yale University Press, 2010. xvii + 665 pp. $55.00. Review by tillman w. nechtman, skidmore college. Kevin Sharpe?s Image Wars: Promoting Kings... and Commonwealth in England, 1603-1660 is the second in a three-volume series in which the author plans ?to turn attention to the changes in the modes and media representing rule and of the relationship of such representa- tives to perceptions of rule? (xvi...

Nechtman, Tillman

2011-01-01T23:59:59.000Z

80

Organic Particles Kevin Wilson Chemical Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Studying the Chemical Transformations of for Studying the Chemical Transformations of Organic Particles Kevin Wilson Chemical Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA Molecular weight growth and decomposition chemistries play important roles in the transformation of particles from soot formation to atmospheric aerosol oxidation. Understanding these complex reaction pathways requires novel methods of analyzing particle phase hydrocarbons. We are developing a suite of synchrotron-based tools to provide better insights into the molecular composition, isomer distribution, and elemental composition of complex hydrocarbon mixtures, aimed at developing simple yet realistic descriptions of molecular weight growth and decomposition that occur during a heterogeneous reaction.

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A Marine Autonomous Surface Craft for Long Duration, Spatially Explicit, Multi-Disciplinary Water Column Sampling in Coastal and Estuarine Systems  

Science Journals Connector (OSTI)

SCOAP (Surveying Coastal Ocean Autonomous Profiler) is a large catamaran Marine Autonomous Surface Craft (MASC) for unattended weeks-long, spatially explicit, multi-disciplinary oceanographic water column profile sampling in coastal/estuarine ...

Daniel L. Codiga

82

Selling an Energy Efficiency Loan Portfolio in Oregon: Resale of the Craft3 loan portfolio to Self-Help Credit Union  

E-Print Network [OSTI]

loan portfolio to Self-Help Credit Union Peter Thompson,risk of losses to Self-Help, the purchaser of the portfolio.Northwest. www.craft3.org Self-Help is a member-owned, North

Thompson, Peter

2014-01-01T23:59:59.000Z

83

Unsupervised Rank Aggregation with Domain-Specific Expertise Alexandre Klementiev, Dan Roth, Kevin Small, and Ivan Titov  

E-Print Network [OSTI]

Unsupervised Rank Aggregation with Domain-Specific Expertise Alexandre Klementiev, Dan Roth, Kevin of judges is re- peatedly asked to (partially) rank sets of objects according to given criteria, and assume that the judges' expertise depends on the objects' domain. Learning to aggregate their rankings with the goal

Titov, Ivan

84

Machine learning and genome annotation: A match meant to Kevin Y. Yip1,2,3,4,5  

E-Print Network [OSTI]

1 Machine learning and genome annotation: A match meant to be? Kevin Y. Yip1,2,3,4,5 , Chao Cheng6 Box 208114, New Haven, CT 06520-8114 E-mail: mark.gerstein@yale.edu Running title: Machine learning in genome annotation Keywords: Genome annotation, machine learning, gene finding, non-coding RNA, regulatory

Gerstein, Mark

85

Data Driven Recommendations for Display Advertising Rushi P. Bhatt, Kevin L. Chang, Vijay K. Narayanan, Rajesh G. Parekh  

E-Print Network [OSTI]

Data Driven Recommendations for Display Advertising Rushi P. Bhatt, Kevin L. Chang, Vijay K|klchang|vnarayan|rparekh}@yahoo-inc.com ABSTRACT Advertisers running display advertising campaigns often re- quest actionable recommendations. Typically, the recommendations desired by advertisers fall into two broad categories: improved per- formance

Chang, Kevin L.

86

THE POWER OF EXTENDED TOP-DOWN TREE TRANSDUCERS ANDREAS MALETTIy, JONATHAN GRAEHLz, MARK HOPKINSx, exh KEVIN KNIGHT{  

E-Print Network [OSTI]

E puttionl linguistis @see PQD PH for surveysA were one tightly integrtedF por exmE pleD topEdown treeTHE POWER OF EXTENDED TOP-DOWN TREE TRANSDUCERS £ ANDREAS MALETTIy, JONATHAN GRAEHLz, MARK HOPKINSx, exh KEVIN KNIGHT{ Abstract. Extended top-down tree transducers (transducteurs generalises descendants

Reyle, Uwe

87

Query Routing: Finding Ways in the Maze of the Deep Web Govind Kabra Chengkai Li Kevin Chen-Chuan Chang  

E-Print Network [OSTI]

Query Routing: Finding Ways in the Maze of the Deep Web Govind Kabra Chengkai Li Kevin Chen-occurrence framework for ranking and select- ing Deep Web sources that provide information relevant to users requirement. Given the huge number of heterogeneous Deep Web data sources, the end users may not know

Li, Chengkai

88

Microsoft PowerPoint - Heat Activated Plasmonics_Chen_Kevin [Compatibility Mode]  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DoE Grant No: DE-FE0003859 Metal oxide sensing materials integrated with high- temperature optical sensor platforms for real-time fossil fuel gas composition analysis Kevin P. Chen PI Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA 15261 Email: pec9@pitt.edu, Tel. 724-6128935 June 12, 2013 Program Overview * University Coal Research Program * Starting September 2010 * Two Key Components: * Development of High-Temperature Sensor Platforms * Integration of Functional Metal Oxide Nano-Materials for Gas Sensing * Two fiber sensor platform techniques * Twelve journal publications * One pending patent * Two industrial collaborations Research Overview * Point fiber sensor for high-T * High performance high-T fiber Bragg grating point sensor (1200 o C) at

89

Kevin Blackwell, FRA Mike Butler, UETC Sandy Covi, UPRR Bob Fronczak, AAR  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Friday, March 26, 1999 11:30 a.m- Conference Call Friday, March 26, 1999 11:30 a.m- 12:30 p.m. Participants on the call included: Kevin Blackwell, FRA Mike Butler, UETC Sandy Covi, UPRR Bob Fronczak, AAR Daren Gilbert, State of Nevada Swenam Lee, DOE-FETC William Naughton, ComEd The call consisted of summary discussion of version #2 of the topic group's "TEC/WG Transportation Safety Rail Comparison" and additional discussion of comments submitted by Dr. Swenam Lee (DOE-FETC) and Mr. Steve Hamp (NTP-Albuquerque). In general, group participants felt that the edited version of the paper did a good job of meeting the objectives agreed upon by the group. Mr. Butler asked that participants refrain from

90

Selling an Energy Efficiency Loan Portfolio in Oregon: Resale of the Craft3 loan portfolio to Self-Help Credit Union  

SciTech Connect (OSTI)

Under the Clean Energy Works (CEW) program, Craft3 developed a loan product that widened access to financing for homeowners, offered long term funding, and collected repayments through the customer?s utility bill. The program?s success led Craft3 to pursue the sale of the loan portfolio to both mitigate its own risks and replenish funds for lending. This sale breaks new ground for energy efficiency finance and is notable as it was completed even with many novel program design elements. It replenished Craft3?s program capital and uncovered some valuable lessons that may facilitate future transactions. However, the lack of data history and the unproven nature of the loan portfolio meant that Craft3 had to limit the risk of losses to Self-Help, the purchaser of the portfolio. It remains to be seen whether this experience will pave the way for more sales of on-bill energy efficiency loan portfolios. This case study illustrates how certain program design decisions can sometimes both facilitate programmatic objectives and possibly present challenges for the sale of a portfolio of energy efficiency loans.

Thompson, Peter; Borgeson, Merrian; Kramer, Chris; Zimring, Mark; Goldman, Charles

2014-05-30T23:59:59.000Z

91

Ultrafast all-optical switching via coherent modulation of metamaterial absorption Xu Fang, Ming Lun Tseng, Jun-Yu Ou, Kevin F. MacDonald, Din Ping Tsai, and Nikolay I. Zheludev  

E-Print Network [OSTI]

Lun Tseng, Jun-Yu Ou, Kevin F. MacDonald, Din Ping Tsai, and Nikolay I. Zheludev Citation: Applied absorption Xu Fang,1,a) Ming Lun Tseng,2,3 Jun-Yu Ou,1 Kevin F. MacDonald,1 Din Ping Tsai,2,3,4 and Nikolay I

Zheludev, Nikolay

92

Saturn's north polar cyclone and hexagon at depth revealed by Cassini/VIMS Kevin H. Baines a,, Thomas W. Momary a  

E-Print Network [OSTI]

Saturn's north polar cyclone and hexagon at depth revealed by Cassini/VIMS Kevin H. Baines a Keywords: Saturn Cassini­Huygens Visual-infrared mapping spectrometer (VIMS) Atmospheric dynamics Polar has been revealed by the visual- infrared mapping spectrometer (VIMS) onboard the Cassini

93

Results of the radiological survey at the former Alba Craft Laboratory site properties, Oxford, Ohio (OXO001)  

SciTech Connect (OSTI)

At the request of the US Department of Energy (DOE), a team from Oak Ridge National Laboratory conducted a radiological survey at the former Alba Craft Laboratory Site Properties, Oxford, Ohio. The survey was performed in July and September of 1992. The purpose of the survey was to determine whether the property was contaminated with radioactive residues, primarily [sup 238]U, from uranium machining operations conducted for National Lead of Ohio, a prime Atomic Energy Commission contractor. The survey included scan measurement of direct radiation levels inside and outside the former laboratory, outdoors on eight properties adjoining the former laboratory, and the city right-of-way adjacent to the surveyed properties. Radionuclide concentrations were determined in outdoor surface and subsurface soil samples taken from each property and the exterior of the laboratory. Fixed surface residual radioactivity was measured inside the laboratory and outside the building. Air samples were collected, direct exposure was measured, and samples were collected to measure transferable radioactivity inside the building. Results of the survey indicate areas where surface and soil contamination level s are above the DOE guidelines for uncontrolled areas.

Murray, M.E.; Brown, K.S.; Mathis, R.A.

1993-03-01T23:59:59.000Z

94

DOE Names New Richland Operations Manager | Department of Energy  

Energy Savers [EERE]

groundwater. Addthis Related Articles EM Office of River Protection (ORP) Manager Kevin Smith, right, discusses the Low-Activity Waste Facility design and construction with Waste...

95

DOE Designates Southwest Area and Mid-Atlantic Area National...  

Office of Environmental Management (EM)

Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced the Department's...

96

VP 100: A Smart Grid Initiative in an Eco-Conscious Town | Department of  

Broader source: Energy.gov (indexed) [DOE]

A Smart Grid Initiative in an Eco-Conscious Town A Smart Grid Initiative in an Eco-Conscious Town VP 100: A Smart Grid Initiative in an Eco-Conscious Town October 6, 2010 - 10:00am Addthis Technicians implement smart meters as part of the Naperville Smart Grid Initiative, which is projected to save the city $3 million a year over a 15 year period. | Photo courtesy of Naperville Technicians implement smart meters as part of the Naperville Smart Grid Initiative, which is projected to save the city $3 million a year over a 15 year period. | Photo courtesy of Naperville Kevin Craft What does this project do? Naperville Smart Grid Initiative will save the city $3 million a year over a 15-year period. 57,000 smart meters will be installed in Naperville, IL by April 2013. Naperville, Ill. is home to some very environmentally conscious people.

97

North Lauderdale Gets 'Smart' on Cars | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

North Lauderdale Gets 'Smart' on Cars North Lauderdale Gets 'Smart' on Cars North Lauderdale Gets 'Smart' on Cars September 10, 2010 - 1:47pm Addthis Kevin Craft What are the key facts? Two Smart Cars to save Florida city $4,800 annually Smart Cars to be used as part of night patrols of city parks City estimates will save more than $33,000 annually through Recovery Act projects The Parks and Recreation Department of North Lauderdale, Fla., is saving money and reducing its carbon footprint, thanks to the recent addition of two energy efficient "Smart Cars" to the city's fleet. The pint-sized cars, which can travel up to 40 miles on a single gallon of fuel, were purchased with funds from the U.S. Department of Energy's Energy Efficiency and Conservation Block Grant (EECBG) Program. The cars, which were purchased in Broward County, are used to perform night

98

Talladega Speeds Up Energy Efficiency in Schools | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Talladega Speeds Up Energy Efficiency in Schools Talladega Speeds Up Energy Efficiency in Schools Talladega Speeds Up Energy Efficiency in Schools July 29, 2010 - 3:00pm Addthis Kevin Craft "We have two schools that were built in the 1930s that have never had proper insulation," says Alex Stewart, the energy manager of Talladega County Schools. "One of our schools was built twenty years ago and never had its HVAC system replaced" For school systems seeking to reduce costs and be more energy efficient, building age and HVAC condition matter a great deal. 17 schools - 10 year ROI With 17 schools, the Talladega County School System is making a concerted effort to reduce energy use. Prior to receiving a $756,000 grant through the U.S. Department of Energy via the American Recovery and Reinvestment

99

Finding Six-Figure ROI From Energy Efficiency | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Finding Six-Figure ROI From Energy Efficiency Finding Six-Figure ROI From Energy Efficiency Finding Six-Figure ROI From Energy Efficiency September 28, 2010 - 10:20am Addthis Kevin Craft What are the key facts? Recovery Act funded energy efficiency lighting upgrades in Huntington, New York. Street lighting accounts for 40% of town's electric costs. Huntington estimates $151,000 in annual savings through lighting changes. Return-on-investment -- that is the phrase town officials in Huntington, New York, carefully considered before commissioning several projects to improve municipal energy efficiency. "Saving town residents money on energy bills is one way to help stimulate the local economy. So we looked for projects that would save our residents as much money as possible," said Huntington Supervisor Frank Petrone.

100

Grant Helps Make U.S. Rare Earth Magnets More Common | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Grant Helps Make U.S. Rare Earth Magnets More Common Grant Helps Make U.S. Rare Earth Magnets More Common Grant Helps Make U.S. Rare Earth Magnets More Common August 6, 2010 - 12:12pm Addthis With sintered rare earth magnets a $4 billion worldwide market, the U.S. could be a bigger producer of these magnets - which are not actually rare - and are used in hybrid vehicle motors and wind turbine generators. | Illustration Courtesy of of Electron Energy Corporation | With sintered rare earth magnets a $4 billion worldwide market, the U.S. could be a bigger producer of these magnets - which are not actually rare - and are used in hybrid vehicle motors and wind turbine generators. | Illustration Courtesy of of Electron Energy Corporation | Kevin Craft Electron Energy Corporation is one of a kind. According to Peter Dent, vice president of business development for the

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Big Energy Savings for Small Idaho City | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Big Energy Savings for Small Idaho City Big Energy Savings for Small Idaho City Big Energy Savings for Small Idaho City September 30, 2010 - 4:28pm Addthis Renovations to Pinehurst’s City Hall are saving residents of this bedroom community $1,335 a year | Photo courtesy of Pinehurst Renovations to Pinehurst's City Hall are saving residents of this bedroom community $1,335 a year | Photo courtesy of Pinehurst Kevin Craft What are the key facts? Renovations to city hall will save Pinehurst, Id. $1,335 a year. The project is providing work for local contractor. New insulation cuts roof heat loss in half. The Pinehurst City Hall had been in need of renovations for quite some time. Constructed in the 1960s, the building had received few physical upgrades during its lifetime. Its flat roof and lack of insulation made the roof

102

Lighting Retrofit Improving Visibility, Saving Energy | Department of  

Broader source: Energy.gov (indexed) [DOE]

Lighting Retrofit Improving Visibility, Saving Energy Lighting Retrofit Improving Visibility, Saving Energy Lighting Retrofit Improving Visibility, Saving Energy August 27, 2010 - 10:05am Addthis New LED lighting fixtures (right) emit a whiter light than existing high-pressure sodium cobra head streetlights (left) and don't spill light onto nearby houses. | Photos courtesy of the City of Muscatine New LED lighting fixtures (right) emit a whiter light than existing high-pressure sodium cobra head streetlights (left) and don't spill light onto nearby houses. | Photos courtesy of the City of Muscatine Kevin Craft In the small Midwestern town of Muscatine, Iowa-known as the "The Pearl Button Capital of the World" for the millions of pearl buttons produced there in the early 1900s-a lighting retrofit project will bring a new

103

New School Year Means New Energy Systems for Two Rhode Island Schools |  

Broader source: Energy.gov (indexed) [DOE]

New School Year Means New Energy Systems for Two Rhode Island New School Year Means New Energy Systems for Two Rhode Island Schools New School Year Means New Energy Systems for Two Rhode Island Schools August 16, 2010 - 4:00pm Addthis New energy recovery systems and occupancy sensors are greatly reducing energy costs at Woonsocket Middle School at Hamlet. | Photo courtesy of Woonsocket Education Department New energy recovery systems and occupancy sensors are greatly reducing energy costs at Woonsocket Middle School at Hamlet. | Photo courtesy of Woonsocket Education Department Kevin Craft What are the key facts? Systems and occupancy sensors save 172,365 kWh and $26,000 annually $181,000 Recovery Act grant funded installation Systems also monitor CO2 levels to provide optimal indoor air quality When city officials in Woonsocket, R.I. were planning the construction of

104

Solar Projects Provide Energy to County Fairgrounds | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Projects Provide Energy to County Fairgrounds Projects Provide Energy to County Fairgrounds Solar Projects Provide Energy to County Fairgrounds September 23, 2010 - 1:01pm Addthis Solar panels have been installed at a shelter facility near Ulster County Fairgrounds. | Photo courtesy of Ulster County Solar panels have been installed at a shelter facility near Ulster County Fairgrounds. | Photo courtesy of Ulster County Kevin Craft What are the key facts? This project is expected to save local taxpayers $4,000 a year. All supplies and labor came from local, private contractors. Fairs, food festivals -- and solar panels. Every year, thousands of people attend events at the Ulster County Fairgrounds in New York State. This year visitors to the fairgrounds will get a first-hand look at two solar energy installations that are saving

105

Denver Public Schools Get Solar Energy System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Denver Public Schools Get Solar Energy System Denver Public Schools Get Solar Energy System Denver Public Schools Get Solar Energy System November 1, 2010 - 11:22am Addthis Workers install a solar photovoltaic system on the roof of a Denver school.| Photo courtesy of Main Street Power Workers install a solar photovoltaic system on the roof of a Denver school.| Photo courtesy of Main Street Power Kevin Craft What are the key facts? Local company adds five full-time jobs to support solar panel project. Solar panels are estimated to generate 1,640,457 kWh of electricity per year. Denver Public Schools are expected to save more than $500,000 over a 20-year period . This school year, students in the Denver Public School system are getting a first-hand look at solar panel technology. Main Street Power, a solar development company based in Boulder, Colo., is

106

Talladega Speeds Up Energy Efficiency in Schools | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Talladega Speeds Up Energy Efficiency in Schools Talladega Speeds Up Energy Efficiency in Schools Talladega Speeds Up Energy Efficiency in Schools July 29, 2010 - 3:00pm Addthis Kevin Craft "We have two schools that were built in the 1930s that have never had proper insulation," says Alex Stewart, the energy manager of Talladega County Schools. "One of our schools was built twenty years ago and never had its HVAC system replaced" For school systems seeking to reduce costs and be more energy efficient, building age and HVAC condition matter a great deal. 17 schools - 10 year ROI With 17 schools, the Talladega County School System is making a concerted effort to reduce energy use. Prior to receiving a $756,000 grant through the U.S. Department of Energy via the American Recovery and Reinvestment

107

Iowa Community College Campuses Reduce Energy Use | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Iowa Community College Campuses Reduce Energy Use Iowa Community College Campuses Reduce Energy Use Iowa Community College Campuses Reduce Energy Use August 27, 2010 - 1:05pm Addthis DMACC will be installing nearly 1,500 occupancy sensors in the college's classrooms to help conserve energy.| Photo Courtesy of DMACC DMACC will be installing nearly 1,500 occupancy sensors in the college's classrooms to help conserve energy.| Photo Courtesy of DMACC Kevin Craft What are the key facts? Energy retrofit projects estimated to reduce annual energy use by 16 percent Des Moines Area Community College projects annual savings of $280,000 Project funded by nearly $640,000 in Recovery Act funding Des Moines Area Community College (DMACC) serves more than 65,000 Iowans on six campuses, making it the largest two-year college in the state of Iowa.

108

Unemployed Engineer Finds New Career in Weatherization | Department of  

Broader source: Energy.gov (indexed) [DOE]

Engineer Finds New Career in Weatherization Engineer Finds New Career in Weatherization Unemployed Engineer Finds New Career in Weatherization October 27, 2010 - 10:46am Addthis Kevin Craft Bob Kos worked as a mechanical engineer for 20 years. But a slow economic climate and scarcity of quality jobs had left him unemployed since 2005.In challenging economic times, even experienced professionals can find themselves out of work. This past April, Kos was able to get back to work when he was hired as an energy auditor for the CAP Agency, a Shakopee-based non-profit that provides weatherization services to income-eligible Minnesota residents. "It's nice to be back in a work environment and to be surrounded by a crew that is trying to accomplish something," says Kos. From 35 to 150 homes In the spring of 2009, CAP received $1.5 million via the Recovery and

109

Houston Smart Grid System Almost Ready for Launch | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Smart Grid System Almost Ready for Launch Smart Grid System Almost Ready for Launch Houston Smart Grid System Almost Ready for Launch October 8, 2010 - 11:29am Addthis CenterPoint Energy employees are installing smart meters and automated distribution equipment in the company’s electric grid in Houston, Texas. | Photo courtesy of CenterPoint Energy CenterPoint Energy employees are installing smart meters and automated distribution equipment in the company's electric grid in Houston, Texas. | Photo courtesy of CenterPoint Energy Kevin Craft What does this mean for me? The AMS/IG initiative supports 588 jobs, half of which would not have existed had the company not received money from the Recovery Act. Once their smart meter is installed, consumers are able to access the Smart Meter Texas Portal online to obtain updates on their daily energy

110

VP 100: Producing Electric Truck Vehicles with a Little Something Extra |  

Broader source: Energy.gov (indexed) [DOE]

VP 100: Producing Electric Truck Vehicles with a Little Something VP 100: Producing Electric Truck Vehicles with a Little Something Extra VP 100: Producing Electric Truck Vehicles with a Little Something Extra August 6, 2010 - 10:31am Addthis VP 100: Producing Electric Truck Vehicles with a Little Something Extra Kevin Craft What does this mean for me? Smith Electric Vehicles included in Vice President's report on 100 Recovery Act Projects That Are Changing America. Smith plans to hire at least 50 employees by the end of the year. Through a Recovery Act grant, that company - Smith Electric Vehicles (SEV) - is taking a different tact that could lay the foundation for the industry's future. Not only is the company manufacturing all-electric, zero-emission commercial trucks, it's collecting data on how these commercial EVs are used. In Kansas City, Mo., an 80-year old company is on

111

Getting CFLs Home in Longview, Texas | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Getting CFLs Home in Longview, Texas Getting CFLs Home in Longview, Texas Getting CFLs Home in Longview, Texas August 25, 2010 - 10:00am Addthis Longview, TX has established a program that enables residents to swap out four incandescent light bulbs for four CFLs. | Department of Energy Photo | Government Work | Longview, TX has established a program that enables residents to swap out four incandescent light bulbs for four CFLs. | Department of Energy Photo | Government Work | Kevin Craft What does this mean for me? Residents can exchange four incandescent bulbs for four CFLs at no cost. A household that installs four CFLs is projected to save $242 on electricity bills over the course of the bulbs' lifetime. Inefficient light bulbs can drive up electricity bills and drain homeowners' wallets. With that in mind, government officials in the east Texas city of Longview

112

VP 100: A Smart Grid Initiative in an Eco-Conscious Town | Department of  

Broader source: Energy.gov (indexed) [DOE]

A Smart Grid Initiative in an Eco-Conscious Town A Smart Grid Initiative in an Eco-Conscious Town VP 100: A Smart Grid Initiative in an Eco-Conscious Town October 6, 2010 - 10:00am Addthis Technicians implement smart meters as part of the Naperville Smart Grid Initiative, which is projected to save the city $3 million a year over a 15 year period. | Photo courtesy of Naperville Technicians implement smart meters as part of the Naperville Smart Grid Initiative, which is projected to save the city $3 million a year over a 15 year period. | Photo courtesy of Naperville Kevin Craft What does this project do? Naperville Smart Grid Initiative will save the city $3 million a year over a 15-year period. 57,000 smart meters will be installed in Naperville, IL by April 2013. Naperville, Ill. is home to some very environmentally conscious people.

113

Unemployed Engineer Finds New Career in Weatherization | Department of  

Broader source: Energy.gov (indexed) [DOE]

Unemployed Engineer Finds New Career in Weatherization Unemployed Engineer Finds New Career in Weatherization Unemployed Engineer Finds New Career in Weatherization October 27, 2010 - 10:46am Addthis Kevin Craft Bob Kos worked as a mechanical engineer for 20 years. But a slow economic climate and scarcity of quality jobs had left him unemployed since 2005.In challenging economic times, even experienced professionals can find themselves out of work. This past April, Kos was able to get back to work when he was hired as an energy auditor for the CAP Agency, a Shakopee-based non-profit that provides weatherization services to income-eligible Minnesota residents. "It's nice to be back in a work environment and to be surrounded by a crew that is trying to accomplish something," says Kos. From 35 to 150 homes

114

Weatherization Projects on the Rise in Michigan County | Department of  

Broader source: Energy.gov (indexed) [DOE]

Weatherization Projects on the Rise in Michigan County Weatherization Projects on the Rise in Michigan County Weatherization Projects on the Rise in Michigan County August 12, 2010 - 5:03pm Addthis Kevin Craft Monroe County Opportunity Program (MCOP) has provided weatherization services to southeastern Michigan residents for over 20 years, and funds from the American Recovery and Reinvestment Act of 2009 recently allowed this private non-profit to hire more staff and increase the scope of its services. In April 2009, MCOP received $3 million in Recovery Act funds to spend over a three year period. "We initially used the money to hire three office staffers to process weatherization applications and a full-time inspector to conduct pre- and post-inspections on houses that are approved for weatherization," says

115

VP 100: Smart Meters Will Help Customers Avoid High Electric Bills |  

Broader source: Energy.gov (indexed) [DOE]

Smart Meters Will Help Customers Avoid High Electric Bills Smart Meters Will Help Customers Avoid High Electric Bills VP 100: Smart Meters Will Help Customers Avoid High Electric Bills October 4, 2010 - 3:00pm Addthis An employee installs a smart meter as part of a smart grid initiative by EPB. The project is supporting 390 jobs in the Chattanooga area. | Photo courtesy of EPB An employee installs a smart meter as part of a smart grid initiative by EPB. The project is supporting 390 jobs in the Chattanooga area. | Photo courtesy of EPB Kevin Craft What are the key facts? EPB will install approximately 170,000 smart meters and 1,500 automated switches. They have the potential to provide a $300 million value to EPB and customers over a ten-year period. "Last winter I received a call from my son saying he had a $400 electric

116

Weatherization Brings New Job Opportunity in Arizona | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Brings New Job Opportunity in Arizona Brings New Job Opportunity in Arizona Weatherization Brings New Job Opportunity in Arizona September 15, 2010 - 2:55pm Addthis Kevin Craft Gaylene Soper loves her job with the Northern Arizona Council on Governments' (NACOG) weatherization assistance program, because it affords her the opportunity to help senior citizens. "A lot of senior citizens' only source of income is their social security money, and we help them save a lot of it by reducing their utility bills," says Soper. "It's a wonderful program." Soper came to her job as NACOG's administrative specialist in September 2009, several months after she was laid off of her last job as an office manager. Soper brings good experience to NACOG, having spent twenty years working for construction companies.

117

Solar Hot Water Creates Savings for Homeless Shelters | Department of  

Broader source: Energy.gov (indexed) [DOE]

Solar Hot Water Creates Savings for Homeless Shelters Solar Hot Water Creates Savings for Homeless Shelters Solar Hot Water Creates Savings for Homeless Shelters July 15, 2010 - 12:10pm Addthis Kevin Craft What are the key facts? Recovery Act funds are being used to install solar hot water systems at 5 Phoenix shelters. The systems will save Phoenox 33,452 kWh of energy -- about $4,000 -- annually. The systems will reduce about 40,000 pounds of carbon emissions annually. "This project will save us a huge amount of money," says Paul Williams, House of Refuge Sunnyslope's Executive Director. Williams is referring to a recent partnership between the state of Arizona and House of Refuge Sunnyslope to install solar hot water systems at five Phoenix-area housing sites for homeless men, which will make an immediate difference at the

118

Former Construction Worker Finds New Career in Solar | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Former Construction Worker Finds New Career in Solar Former Construction Worker Finds New Career in Solar Former Construction Worker Finds New Career in Solar August 25, 2010 - 4:00pm Addthis Eco Technologies, Inc., hired eleven workers to install these solar panels at the Hillsborough County judicial center. | Photo courtesy of Hillsborough County Eco Technologies, Inc., hired eleven workers to install these solar panels at the Hillsborough County judicial center. | Photo courtesy of Hillsborough County Kevin Craft After Eco Technologies, Inc., received a contract to install solar panels at Hillsborough County, Fla.'s judicial center, company president Andrew Tanner realized a larger staff was needed to complete the project. So Tanner hired 11 additional crew members and trained them in basic solar-panel installation. The new crew members have been working at the

119

Educating Glendale, Arizona Residents About Energy Savings | Department of  

Broader source: Energy.gov (indexed) [DOE]

Educating Glendale, Arizona Residents About Energy Savings Educating Glendale, Arizona Residents About Energy Savings Educating Glendale, Arizona Residents About Energy Savings August 10, 2010 - 1:00pm Addthis A portion of Glendale, Arizona's Energy Efficiency and Conservation Block Grant was used to purchase programmable thermostats. | Department of Energy Photo | A portion of Glendale, Arizona's Energy Efficiency and Conservation Block Grant was used to purchase programmable thermostats. | Department of Energy Photo | Kevin Craft City officials in Glendale, Ariz. had a problem. Citizens were constantly asking them for information on how to reduce home energy consumption, but they did not have a staff member to answer the questions. That changed in June 2009, when the city hired Nancy Schwab to be the official energy education specialist.

120

Smart Meter Company Boosting Production, Workforce | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Smart Meter Company Boosting Production, Workforce Smart Meter Company Boosting Production, Workforce Smart Meter Company Boosting Production, Workforce September 30, 2010 - 10:53am Addthis Kevin Craft What does this mean for me? This South Carolina company is producing enough smart meters to reduce annual electricity use by approximately 1.7 million megawatt hours Smart meters provide detailed data on energy usage to both utilities and consumers and is a key component of the Smart Grid. In 2009, Itron Inc.'s manufacturing facility in West Union, South Carolina was the third largest industrial employer in Oconee County. Then, the company used a $5.2 million 48C Advanced Manufacturing Tax Credit awarded via the Recovery Act to re-equip the facility and hired 420 additional employees. "Improving our production capacity allowed us to hire more employees, and

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Honing in on CO2 to Determine Who's in the 'House' | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Honing in on CO2 to Determine Who's in the 'House' Honing in on CO2 to Determine Who's in the 'House' Honing in on CO2 to Determine Who's in the 'House' September 10, 2010 - 3:35pm Addthis Kevin Craft Heating and cooling a building seems like a straightforward task. But many buildings' heating, ventilation and air conditioning (HVAC) systems waste energy and don't pay any attention to indoor air quality. "Commercial buildings' HVAC systems are regulated by guidelines that dictate how much air flow is needed to provide adequate fresh air ventilation," says Chuck McKinney of Newton, Mass.-based Aircuity. "But the number of people in a given building varies greatly throughout the day and night, and setting one fixed rate of air flow based on the theoretical occupancy usually results in over-ventilation and energy waste."

122

Smart Meter Company Boosting Production, Workforce | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Smart Meter Company Boosting Production, Workforce Smart Meter Company Boosting Production, Workforce Smart Meter Company Boosting Production, Workforce September 30, 2010 - 10:53am Addthis Kevin Craft What does this mean for me? This South Carolina company is producing enough smart meters to reduce annual electricity use by approximately 1.7 million megawatt hours Smart meters provide detailed data on energy usage to both utilities and consumers and is a key component of the Smart Grid. In 2009, Itron Inc.'s manufacturing facility in West Union, South Carolina was the third largest industrial employer in Oconee County. Then, the company used a $5.2 million 48C Advanced Manufacturing Tax Credit awarded via the Recovery Act to re-equip the facility and hired 420 additional employees. "Improving our production capacity allowed us to hire more employees, and

123

Educating Glendale, Arizona Residents About Energy Savings | Department of  

Broader source: Energy.gov (indexed) [DOE]

Educating Glendale, Arizona Residents About Energy Savings Educating Glendale, Arizona Residents About Energy Savings Educating Glendale, Arizona Residents About Energy Savings August 10, 2010 - 1:00pm Addthis A portion of Glendale, Arizona's Energy Efficiency and Conservation Block Grant was used to purchase programmable thermostats. | Department of Energy Photo | A portion of Glendale, Arizona's Energy Efficiency and Conservation Block Grant was used to purchase programmable thermostats. | Department of Energy Photo | Kevin Craft City officials in Glendale, Ariz. had a problem. Citizens were constantly asking them for information on how to reduce home energy consumption, but they did not have a staff member to answer the questions. That changed in June 2009, when the city hired Nancy Schwab to be the official energy education specialist.

124

Houston to Go Solar in Emergencies | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

to Go Solar in Emergencies to Go Solar in Emergencies Houston to Go Solar in Emergencies September 2, 2010 - 2:14pm Addthis Solar generators like this one will provide electricity to Houston residents after hurricanes and other emergencies. | Photo Courtesy of City of Houston Solar generators like this one will provide electricity to Houston residents after hurricanes and other emergencies. | Photo Courtesy of City of Houston Kevin Craft The situation was both inconvenient and dangerous, as residents were unable to charge devices such as cell phones and medical equipment that are critical in emergency situations. After Hurricane Ike struck Houston, Texas in September 2008, some city residents went without electricity for more than two weeks. Finding a solution In preparation for future emergency situations, city officials are using a

125

Grant Helps Make U.S. Rare Earth Magnets More Common | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Grant Helps Make U.S. Rare Earth Magnets More Common Grant Helps Make U.S. Rare Earth Magnets More Common Grant Helps Make U.S. Rare Earth Magnets More Common August 6, 2010 - 12:12pm Addthis With sintered rare earth magnets a $4 billion worldwide market, the U.S. could be a bigger producer of these magnets - which are not actually rare - and are used in hybrid vehicle motors and wind turbine generators. | Illustration Courtesy of of Electron Energy Corporation | With sintered rare earth magnets a $4 billion worldwide market, the U.S. could be a bigger producer of these magnets - which are not actually rare - and are used in hybrid vehicle motors and wind turbine generators. | Illustration Courtesy of of Electron Energy Corporation | Kevin Craft Electron Energy Corporation is one of a kind. According to Peter Dent, vice president of business development for the

126

Small Town Using Wind Power to Offset Electricity Costs | Department of  

Broader source: Energy.gov (indexed) [DOE]

Town Using Wind Power to Offset Electricity Costs Town Using Wind Power to Offset Electricity Costs Small Town Using Wind Power to Offset Electricity Costs September 8, 2010 - 10:00am Addthis Kevin Craft Carmen, Oklahoma, is not your average small town. It was the first recipient of an Energy Efficiency and Conservation block grant - and the small town of 412 is using that Recovery Act funding to cut costs through wind energy. Through a $242,500 Recovery Act grant, town officials purchased four 5 kW and one 10 kW wind turbines. Officials are using wind energy to offset electricity costs for all town-owned buildings and save an estimated $24,000 a year. According to Therese Kephart, Carmen's town clerk and treasurer, the goal of the project is to produce enough electricity to run all town-owned buildings.

127

Denver Public Schools Get Solar Energy System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Denver Public Schools Get Solar Energy System Denver Public Schools Get Solar Energy System Denver Public Schools Get Solar Energy System November 1, 2010 - 11:22am Addthis Workers install a solar photovoltaic system on the roof of a Denver school.| Photo courtesy of Main Street Power Workers install a solar photovoltaic system on the roof of a Denver school.| Photo courtesy of Main Street Power Kevin Craft What are the key facts? Local company adds five full-time jobs to support solar panel project. Solar panels are estimated to generate 1,640,457 kWh of electricity per year. Denver Public Schools are expected to save more than $500,000 over a 20-year period . This school year, students in the Denver Public School system are getting a first-hand look at solar panel technology. Main Street Power, a solar development company based in Boulder, Colo., is

128

VP 100: Smart Meters Will Help Customers Avoid High Electric Bills |  

Broader source: Energy.gov (indexed) [DOE]

VP 100: Smart Meters Will Help Customers Avoid High Electric Bills VP 100: Smart Meters Will Help Customers Avoid High Electric Bills VP 100: Smart Meters Will Help Customers Avoid High Electric Bills October 4, 2010 - 3:00pm Addthis An employee installs a smart meter as part of a smart grid initiative by EPB. The project is supporting 390 jobs in the Chattanooga area. | Photo courtesy of EPB An employee installs a smart meter as part of a smart grid initiative by EPB. The project is supporting 390 jobs in the Chattanooga area. | Photo courtesy of EPB Kevin Craft What are the key facts? EPB will install approximately 170,000 smart meters and 1,500 automated switches. They have the potential to provide a $300 million value to EPB and customers over a ten-year period. "Last winter I received a call from my son saying he had a $400 electric

129

New School Year Means New Energy Systems for Two Rhode Island Schools |  

Broader source: Energy.gov (indexed) [DOE]

School Year Means New Energy Systems for Two Rhode Island School Year Means New Energy Systems for Two Rhode Island Schools New School Year Means New Energy Systems for Two Rhode Island Schools August 16, 2010 - 4:00pm Addthis New energy recovery systems and occupancy sensors are greatly reducing energy costs at Woonsocket Middle School at Hamlet. | Photo courtesy of Woonsocket Education Department New energy recovery systems and occupancy sensors are greatly reducing energy costs at Woonsocket Middle School at Hamlet. | Photo courtesy of Woonsocket Education Department Kevin Craft What are the key facts? Systems and occupancy sensors save 172,365 kWh and $26,000 annually $181,000 Recovery Act grant funded installation Systems also monitor CO2 levels to provide optimal indoor air quality When city officials in Woonsocket, R.I. were planning the construction of

130

Weatherization Brings New Job Opportunity in Arizona | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Weatherization Brings New Job Opportunity in Arizona Weatherization Brings New Job Opportunity in Arizona Weatherization Brings New Job Opportunity in Arizona September 15, 2010 - 2:55pm Addthis Kevin Craft Gaylene Soper loves her job with the Northern Arizona Council on Governments' (NACOG) weatherization assistance program, because it affords her the opportunity to help senior citizens. "A lot of senior citizens' only source of income is their social security money, and we help them save a lot of it by reducing their utility bills," says Soper. "It's a wonderful program." Soper came to her job as NACOG's administrative specialist in September 2009, several months after she was laid off of her last job as an office manager. Soper brings good experience to NACOG, having spent twenty years

131

Finding Six-Figure ROI From Energy Efficiency | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Finding Six-Figure ROI From Energy Efficiency Finding Six-Figure ROI From Energy Efficiency Finding Six-Figure ROI From Energy Efficiency September 28, 2010 - 10:20am Addthis Kevin Craft What are the key facts? Recovery Act funded energy efficiency lighting upgrades in Huntington, New York. Street lighting accounts for 40% of town's electric costs. Huntington estimates $151,000 in annual savings through lighting changes. Return-on-investment -- that is the phrase town officials in Huntington, New York, carefully considered before commissioning several projects to improve municipal energy efficiency. "Saving town residents money on energy bills is one way to help stimulate the local economy. So we looked for projects that would save our residents as much money as possible," said Huntington Supervisor Frank Petrone.

132

Head of EM Program Tours Hanford Site Facilities | Department...  

Office of Environmental Management (EM)

November 26, 2014 - 12:00pm Addthis EM Office of River Protection (ORP) Manager Kevin Smith, right, discusses the Low-Activity Waste Facility design and construction with Waste...

133

Evaluation of Lead-Carbon Devices DOE Energy Storage Program Contract # 407411 Benjamin J Craft Specialty Chemicals Division MeadWestvaco Corporation 843-746-8312 bjc11@meadwestvaco.com November 3, 2006 Washington DC  

Broader source: Energy.gov (indexed) [DOE]

Lead-Carbon Devices Lead-Carbon Devices DOE Energy Storage Program Contract # 407411 Benjamin J Craft Specialty Chemicals Division MeadWestvaco Corporation 843-746-8312 bjc11@meadwestvaco.com November 3, 2006 Washington DC Participants  MeadWestvaco  Developing carbons for energy storage  Lab scale and battery testing  DOE Energy Storage Program and Sandia National Labs  Verification and battery testing  Analytic Support  NorthStar Battery Company  Manufacturing and Battery Testing  Battery Expertise  ETA  Testing  System Estimates  WPS Energy  Valuation Phase 1  Evaluate lead based energy storage technologies  Develop carbon for lead based technologies  Increase cycle life for some applications  Improve charging characteristics Program Overview

134

Geocoding Patent Data Kevin Johnson  

E-Print Network [OSTI]

Coleman Fung Founder and Chairman, OpenLink Financial Charles Giancarlo Managing Director, Silver Lake applications only include the city and country of the inventor. We determine longitude and latitude given only- tion is split into up to five fields, depending on what information is available: street address, city

Sekhon, Jasjeet S.

135

Agricultural NPS Measures Kevin Wagner  

E-Print Network [OSTI]

, no taxing authority · Governed by five-member board of directors elected by their fellow landowners (farmers program, administering its business and entering into cooperative agreements with their fellow landowners composed of five locally-elected members and two Governor- appointed members, all of whom must

136

Kevin Banks | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Systems division. His research seeks to increase energy efficiency by reducing friction and wear on machines using engine oils. "What I liked most about my internship...

137

'Top 25' City Aims to Reduce Energy Use | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

'Top 25' City Aims to Reduce Energy Use 'Top 25' City Aims to Reduce Energy Use 'Top 25' City Aims to Reduce Energy Use August 16, 2010 - 11:00am Addthis Wind turbines like this will grace Gabe Nesbitt Community Park in McKinney, Texas, thanks to an Energy Efficiency and Conservation Block Grant | Photo courtesy of McKinney, Texas Wind turbines like this will grace Gabe Nesbitt Community Park in McKinney, Texas, thanks to an Energy Efficiency and Conservation Block Grant | Photo courtesy of McKinney, Texas Kevin Craft What are the key facts? McKinney, Texas, is one of Forbes 25 best places to move. They using a Recovery Act grant to fund energy efficiency projects and create savings. They're installing 97 LED light bulbs in street lights to save an estimated 3.1 million kWh. Thirty miles to the north of Dallas, Texas, the city of McKinney is one of

138

FriedelCrafts Acylation Using Solar Irradiation  

Science Journals Connector (OSTI)

All forms of electricity generated through the use of fossil fuels have some form of environmental impact associated with it. ... Solar and water-based energy generation processes have been engineered and implemented in various parts of the United States over the past decade and are virtually greenhouse gas emission-free sources of electricity. ... To gather data on how much heat the solar dish could generate, several high-boiling organic compounds were tested to determine whether enough heat could be generated to get the organic solvents to boil (Table 1). ...

Brian M. Agee; Gene Mullins; Daniel J. Swartling

2013-09-06T23:59:59.000Z

139

Green and High Performance Factory Crafted Housing  

E-Print Network [OSTI]

and the green and energy-efficient certification processes conducted for the 2008 show homes, one of which received the very first E-Scale produced by BAIHP for the U.S. Department of Energy (DOE) Builders Challenge program....

Thomas-Rees, S.; Chasar, D.; Chandra, S.; Stroer, D.

140

Center for craft : design for expeditionary learning  

E-Print Network [OSTI]

"Grow into what you are ... there is more in you than you know. If we can come to discover this, we may never again settle for anything less." - Kurt Hahn, Founder - Outward Bound. (1920) "Hours spent by the true craftsman ...

Walter, Eric Duane, 1972-

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

re.Assemblage Bridging Traditional Craft  

E-Print Network [OSTI]

to the significanceofattentiontodetailsuchascraftandwoodqualities. #12; 4 Finally,FusedCraftsisacollectionofartifactsthatareparthandcraftedandpart3D printed

142

Maritime Interdiction Operations Small Craft Detection  

SciTech Connect (OSTI)

The Naval Postgraduate School has been conducting Tactical Network Topology (TNT) Maritime Interdiction Operations (MIO) experiments with Lawrence Livermore National Laboratory (LLNL) since early in 2005. In this work, we are investigating cutting edge technology to evaluate use of networks, advanced sensors and collaborative technology for globally-supported maritime interdiction operations. Some examples of our research include communications in harsh environments, between moving ships at sea; small boat drive-by radiation detection; network-centric collaboration with global partners; situational awareness; prototype sensors & biometric instruments. Since 2006, we have studied the concept of using a small vessel with fixed radiation sensors to do initial searches for illicit radioactive materials. In our work, we continue to evaluate concepts of operation for small boat monitoring. For example, in San Francisco Bay we established a simulated choke point using two RHIBs. Each RHIB had a large sodium iodide radiation sensor on board, mounted on the side nearest to the passing potential target boats. Once detections were made, notification over the network prompted a chase RHIB also equipped with a radiation sensor to further investigate the potential target. We have also used an unmanned surface vessel (USV) carrying a radiation sensor to perform the initial discovery. The USV was controlled remotely and to drive by boats in different configurations. The potential target vessels were arranged in a line, as a choke point and randomly spaced in the water. Search plans were problematic when weather, waves and drift complicated the ability to stay in one place. A further challenge is to both detect and identify the radioactive materials during the drive-by. Our radiation detection system, ARAM, Adaptable Radiation Area Monitor, is able to detect, alarm and quickly identify plausible radionuclides in real time. We have performed a number of experiments to better understand parameters of vessel speed, time, shielding, and distance in this complex three-dimensional space. At the NMIOTC in September 2009, we employed a dual detector portal followed by a chase. In this event, the challenge was to maintain communications after a lapse. When the chase went past the line-of sight reach of the Tactical Operational Center's (TOC) antenna, with interference from a fortress island in Suda Bay, Wave Relay extended the network for continued observation. Sodium iodide radiation detectors were mounted on two Hellenic Navy SEAL fast boats. After making the detection one of the portal boats maintained line-of sight while the other pursued the target vessel. Network access via Wave Relay antennas was maintained until the conclusion of the chase scenario. Progress has been made in the detection of radioactive materials in the maritime environment. The progression of the TNT MIO experiments has demonstrated the potential of the hardware to solve the problems encountered in this physically challenging environment. There continue to be interesting opportunities for research and development. These experiments provide a variety of platforms and motivated participants to perform real-world testing as solutions are made available.

Dougan, A D; Trombino, D; Dunlop, W; Bordetsky, A

2010-01-26T23:59:59.000Z

143

Algorithmic craft : the synthesis of computational design, digital fabrication, and hand craft  

E-Print Network [OSTI]

Programing is a singular creative tool with the potential to support personal expression. Unfortunately, many people who are new to programing view it as a highly specialized, difficult and inaccessible skill that is only ...

Jacobs, Jennifer (Jennifer Mary)

2013-01-01T23:59:59.000Z

144

Mapping the Midwest Future Kevin D. Kephart  

E-Print Network [OSTI]

;#12;· Five Regional University Centers #12;Bioenergy #12;Biomass Feedstocks Research · More than 200 projects achieving 30% penetration of biomass carbon into the U.S. transportation market by 2030 in a sustainable fossil-based markets. · Enhanced economic, environment, and social sustainability. · Improved national

Levinson, David M.

145

Multicomponent Reactions in Total Synthesis Kevin Allan  

E-Print Network [OSTI]

· Ugi Reaction · Cycloadditions · Povarov Reaction · Knoevenagel / Hetero-Diels-Alder Cycloaddition · 1-VCH; Weinheim, 2005. Orru, R. V. A.; de Greef, M. Synthesis 2003, 10, 1471-1499. Ugi, I. Pure Appl. Chem. 2001, 73, 187-191. Bienaymé, H.; Hulme, C.; Oddon, G.; Schmitt, P. Chem. Eur. J. 2000, 6, 3321-3329. Ugi, I

Stoltz, Brian M.

146

Microsoft PowerPoint - 7 Kevin Brown  

Office of Environmental Management (EM)

C. Langton*, G. Flach*, H. Burns*, R. Seitz, S. Marra Energy Research Centre of The Netherlands (ECN) & CRESP H. van der Sloot (HvdS Consultancy), J.C.L. Meeussen (NRG), P....

147

EECS 122, Lecture 2EECS 122, Lecture 2 Kevin FallKevin Fall  

E-Print Network [OSTI]

Reference Model 4 TheThe ARPANetARPANet Ref. ModelRef. Model ··See RFC 871 by M.See RFC 871 by M. Padlipsky

Fall, Kevin R.

148

Wave-induced motion of ramp-interconnected craft  

E-Print Network [OSTI]

in Figure 4.3 (the system experiences yaw as one rigid bodyamount of yaw experienced by the total system (but notthe impact the yaw motions have on the system, Graph 4.26 is

Oonk, Stephen Holt

2008-01-01T23:59:59.000Z

149

Visionary rather than practical: craft, art and material efficiency  

Science Journals Connector (OSTI)

...with the logic and resistance of natural materials in mind. Semper...sculpture is in part a resistance to the glamorous...cheap discarded materials to make objects...Osmani, S . 2011 Material of resistance: contesting the...

2013-01-01T23:59:59.000Z

150

Wave-induced motion of ramp-interconnected craft  

E-Print Network [OSTI]

has an effect on the pitch angle between the ship and ramp.the ships and ramp. Unfortunately, such a beneficial effectships and ramp are always very small for these simulations, the induced effects

Oonk, Stephen Holt

2008-01-01T23:59:59.000Z

151

Experimenting with Sound Immersion in an Arts and Crafts Museum  

E-Print Network [OSTI]

wireless devices. Our system takes into consideration the position of museum visitors as well, in real-time by the visitor's device. Keywords: museum, immersion, edutainment, sound spatialization, head]. However, just like images, sounds are fundamental for learning [5]. The listening process is by nature

Boyer, Edmond

152

Crafting Platform Strategy based on Anticipated Benefits and Costs1  

E-Print Network [OSTI]

decades has grown in response to market demand for variety. Consumers have come to expect $50, $100 and Perumal 2009). Bruce G. Cameron () Edward F. Crawley Massachusetts Institute of Technology e

de Weck, Olivier L.

153

Integrated design of semi-displacement patrol crafts  

E-Print Network [OSTI]

Early stage ship design and assessment continues to be a challenge for naval architects and ocean engineers. The complex and multifaceted interactions between the different components of the ship and the broad spectrum of ...

Gillespy, Andrew J

2008-01-01T23:59:59.000Z

154

Working with your hands : essays on craft occupations in India  

E-Print Network [OSTI]

Essay 1 : Professionalization And Market Closure: The Case Of Plumbing In India. Professionalization has long been understood as a process of establishing market closure and monopoly control over work; however, in this ...

Ranganathan, Aruna

2014-01-01T23:59:59.000Z

155

We Must Safeguard the Freedoms of our Craft  

Science Journals Connector (OSTI)

In the field of dramatic art the most inaccessible and hard-to-describe thing is the knowledge an actor possesses. Most actors find it difficult to understand what their knowledge actually consists of, once on...

Erland Josephson

1995-01-01T23:59:59.000Z

156

Former Student Turns Thesis Into Energy Savings for Taylor University |  

Broader source: Energy.gov (indexed) [DOE]

Former Student Turns Thesis Into Energy Savings for Taylor Former Student Turns Thesis Into Energy Savings for Taylor University Former Student Turns Thesis Into Energy Savings for Taylor University October 18, 2010 - 10:00am Addthis Kevin Crosby, Taylor University’s first coordinator of stewardship and sustainability, promotes environmental awareness among students, faculty and staff. | Photo courtesy of Andrew Ketchum, The Echo | Kevin Crosby, Taylor University's first coordinator of stewardship and sustainability, promotes environmental awareness among students, faculty and staff. | Photo courtesy of Andrew Ketchum, The Echo | Maya Payne Smart Former Writer for Energy Empowers, EERE Not long ago Kevin Crosby was an engineering major and the president of Taylor University's student environmental club, Stewards of Creation.

157

Former Student Turns Thesis Into Energy Savings for Taylor University |  

Broader source: Energy.gov (indexed) [DOE]

Former Student Turns Thesis Into Energy Savings for Taylor Former Student Turns Thesis Into Energy Savings for Taylor University Former Student Turns Thesis Into Energy Savings for Taylor University October 18, 2010 - 10:00am Addthis Kevin Crosby, Taylor University’s first coordinator of stewardship and sustainability, promotes environmental awareness among students, faculty and staff. | Photo courtesy of Andrew Ketchum, The Echo | Kevin Crosby, Taylor University's first coordinator of stewardship and sustainability, promotes environmental awareness among students, faculty and staff. | Photo courtesy of Andrew Ketchum, The Echo | Maya Payne Smart Former Writer for Energy Empowers, EERE Not long ago Kevin Crosby was an engineering major and the president of Taylor University's student environmental club, Stewards of Creation.

158

Secretary of Energy Administers Oath to Three Senior Officials | Department  

Broader source: Energy.gov (indexed) [DOE]

Administers Oath to Three Senior Officials Administers Oath to Three Senior Officials Secretary of Energy Administers Oath to Three Senior Officials September 4, 2007 - 3:16pm Addthis WASHINGTON, DC - Secretary of Energy Samuel W. Bodman today administered the oath of office to three newly confirmed and appointed senior officials: C.H. "Bud" Albright Jr., as Under Secretary, Lisa Epifani as the Assistant Secretary for Congressional and Intergovernmental Affairs, and Kevin Kolevar as the Assistant Secretary for Electricity Delivery and Energy Reliability. "I applaud the Senate for unanimously confirming Bud Albright as Under Secretary for Energy, and Lisa Epifani and Kevin Kolevar as Assistant Secretaries," Secretary Bodman said. "I am pleased to have Bud, Lisa and Kevin on my leadership team and I am confident their respective backgrounds

159

The Mechanics of Fine Manipulation by Pushing Kevin M. Lynch  

E-Print Network [OSTI]

of these contacts. Each contact point receives one of four possible labels indicating the motion of the slider to grasp and lift the object. The ability to precisely position objects by pushing can greatly extend question. We pose the pushing problem more generally than it previously has been: Given multiple point

Mason, Matthew T.

160

The Mechanics of Fine Manipulation by Pushing Kevin M. Lynch  

E-Print Network [OSTI]

of four possible labels indicating the motion of the slider relative to the pusher at the contact point a solution for manipulators lacking the dexterity, size, and strength necessary to grasp and lift the object generally than it previously has been: Given multiple point contacts and an arbitrary pusher motion, what

Hartmann, Mitra J. Z.

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Asymptotic Analysis of Extreme Electrochemical Transport Kevin Taylor Chu  

E-Print Network [OSTI]

electrokinetically driven microfluidic devices, has traditionally been analyzed using circuit models which neglect

Chu, Kevin T.

162

CARMAN, KEVIN R., JOHN W. FLEEGER, AND STEVEN M ...  

Science Journals Connector (OSTI)

Apr 12, 1996 ... supernatant was removed and replaced with fresh ASW. Sed- ...... congeners are generally thought to be additive, especially in complex...

163

Kevin Blackwell, FRA Mike Butler, UETC Sandy Covi, UPRR Steve...  

Broader source: Energy.gov (indexed) [DOE]

for the Topic Group to discuss DOE's process for mode selection, the use of dedicated trains in spent fuel shipments, the feasibility of shipping low-level radioactive materials...

164

Clinical data acquisition utilising mobile technology / Kevin Colin van Blommestein.  

E-Print Network [OSTI]

??The pharmaceutical industry is spending more and more on Research and Development (R&D) every year. In addition, these R&D costs are increasing at a faster (more)

Van Blommestein, Kevin Colin

2007-01-01T23:59:59.000Z

165

Kevin Blackwell, FRA Mike Butler, UETC Ray English, DOE Robert...  

Broader source: Energy.gov (indexed) [DOE]

throughout the document. He pointed out that since there are currently no plans to ship to WIPP by rail, it might be premature to construct Evaluation sections of similar...

166

Kevin C. Cooley Executive Director & Command Information Officer,  

E-Print Network [OSTI]

technology; including mission critical weather model guidance delivery enabled by high performance computing multi-year high performance computing oriented contracts with various Federal entities including

167

Lonra Simeantach na Gaeilge, 1.001 Kevin P. Scannell  

E-Print Network [OSTI]

: labhair, tabhair, tóg, inis, sloinn, cuir canúint ar, cuir i bhfriotal, cuir i bhfocail, cuir ar, cuir ar an eolas. -- AICMÍ: fógair.7. 8. -- COMHCHIALL: inis, maígh, sloinn, dearbhaigh, eachtraigh

Scannell, Kevin Patrick

168

Argonne Chicago Scholars: Kevin Banks | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

--Workplace pipeline Search Show All All Videos Argonne OutLoud: "Computation, Big Data, and the Future of Cities" David Danielson - Assistant Secretary for Energy...

169

Activities at the Oklahoma Climatological Survey Dr. Kevin Kloesel, Director  

E-Print Network [OSTI]

ingested each day 2-way communications Solar powered 30-day storage in on-site dataloggers Produce ~63 research, operations, education and outreach. 15 private sector weather and hydro- companies, along.5 m and 9 m Relative Humidity -- 1.5 m Rainfall (tipping bucket) Barometric Pressure Solar

Yang, Zong-Liang

170

Lyons, M. Maille, J. Evan Ward, Roxanna Smolowitz, Kevin R ...  

Science Journals Connector (OSTI)

Marine pathogens cause extensive ecological and econom- ical damage ..... (i.e., vehicles of transmission) linking pathogens in seawater to their benthic hosts.

2005-10-25T23:59:59.000Z

171

Kevin Novan Department of Agricultural and Resource Economics  

E-Print Network [OSTI]

Presentations 2014: Arizona State CEESP 2013: UCE3 All-UC Conference (UC Berkeley), AERE Annual Conference and Resource Economics Workshop 2012: AERE Annual Conference (Asheville), Western Washington University

California at Davis, University of

172

Biographical sketch - Kevin Redding | Center for Bio-Inspired...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Teaching Fellow, 2006-2007 Robin Hill Award (International Society of Photosynthesis Research), 2004 N.S.F. CAREER award, 2004-2010 DuPont Young Professor Award,...

173

2013 Feds Feed Families: Your Generosity Counts | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2013 Feds Feed Families: Your Generosity Counts 2013 Feds Feed Families: Your Generosity Counts 2013 Feds Feed Families: Your Generosity Counts July 2, 2013 - 5:58pm Addthis (L to R) Kevin Knobloch, DOE Chief of Staff; Fletcher Honemond, Chief Learning Officer; Doug Keeler, Feds Feeds Families National Program Manager; Ella Daniels of the Capital Area Food Bank; Jennifer Hirschorn; Rauland Sharp, 2013 Feds Feeds Families Deputy Champion. | Photo courtesy of Ella Daniels. (L to R) Kevin Knobloch, DOE Chief of Staff; Fletcher Honemond, Chief Learning Officer; Doug Keeler, Feds Feeds Families National Program Manager; Ella Daniels of the Capital Area Food Bank; Jennifer Hirschorn; Rauland Sharp, 2013 Feds Feeds Families Deputy Champion. | Photo courtesy of Ella Daniels. Fletcher Honemond Fletcher Honemond

174

Federal Electronics Challenge Gold Award | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Federal Electronics Challenge Gold Award Federal Electronics Challenge Gold Award Federal Electronics Challenge Gold Award June 18, 2009 - 12:24pm Addthis Left to right: EPA Assistant Administrator Jim Jones, Jeff Eagan, Brian Costlow, Kathy Loftin, Tony Castellano, and Kevin Cooke. (photo courtesy of EPA) Left to right: EPA Assistant Administrator Jim Jones, Jeff Eagan, Brian Costlow, Kathy Loftin, Tony Castellano, and Kevin Cooke. (photo courtesy of EPA) On June 18th, DOE Headquarters was presented the Federal Electronics Challenge Gold Award for exemplary performance in Green Computing, including green procurement, energy efficient operations and maintenance, and environmentally safe disposition of surplus equipment. Receiving the award from EPA Assistant Administrator Jim Jones (left) was the

175

Senator Murray Visits Hanford | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Senator Murray Visits Hanford Senator Murray Visits Hanford Senator Murray Visits Hanford June 26, 2013 - 12:00pm Addthis In this photo, U.S. Sen. Patty Murray (D-Wash.) receives an update on activities at C Farm from Office of River Protection (ORP) Manager Kevin Smith, left, and ORP Tank Farms Assistant Manager Tom Fletcher. In this photo, U.S. Sen. Patty Murray (D-Wash.) receives an update on activities at C Farm from Office of River Protection (ORP) Manager Kevin Smith, left, and ORP Tank Farms Assistant Manager Tom Fletcher. U.S. Sen. Patty Murray (D-Wash.) visited the Hanford site in Washington state recently, where she received an update on activities at C Farm, which is one of the groups of underground waste tanks at Hanford. Murray also toured the site's largest groundwater treatment facility. The 200 West

176

Solar in Demand | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Solar in Demand Solar in Demand Solar in Demand June 15, 2012 - 10:23am Addthis Kyle Travis, left and Jon Jackson, with Lighthouse Solar, install microcrystalline PV modules on top of Kevin Donovan's town home. | Credit: Dennis Schroeder. Kyle Travis, left and Jon Jackson, with Lighthouse Solar, install microcrystalline PV modules on top of Kevin Donovan's town home. | Credit: Dennis Schroeder. April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs What does this mean for me? A new study says U.S. developers are likely to install about 3,300 megawatts of solar panels in 2012 -- almost twice the amount installed last year. In case you missed it... This week, the Wall Street Journal published an article, "U.S. Solar-Panel Demand Expected to Double," highlighting the successes of

177

Weaving New York's Solar Industry Web | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Weaving New York's Solar Industry Web Weaving New York's Solar Industry Web Weaving New York's Solar Industry Web June 29, 2010 - 11:00am Addthis Solar films are manufactured at Precision Flow Technologies in Kingston, N.Y., facility. The factory once served as an IBM plant. | Photo Courtesy of Kevin Brady Solar films are manufactured at Precision Flow Technologies in Kingston, N.Y., facility. The factory once served as an IBM plant. | Photo Courtesy of Kevin Brady Stephen Graff Former Writer & editor for Energy Empowers, EERE These days in New York, it seems whatever The Solar Energy Consortium (TSEC) touches turns to green. The nonprofit has been building up a supply chain across the state for the last three years by helping companies bring on new, solar-related manufacturing processes and jobs.

178

Arizona Teachers Prepare Students for Green Economy | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Arizona Teachers Prepare Students for Green Economy Arizona Teachers Prepare Students for Green Economy Arizona Teachers Prepare Students for Green Economy April 2, 2010 - 2:26pm Addthis Using a curriculum they hope to spread across the United States, two Arizona high school teachers are giving their students hands-on experience in renewable energy jobs. Students led by Kevin English, a building trades teacher at Raymond S. Kellis High School in Glendale, Ariz., are wiring parts of the school for solar power. Kevin's colleague, marketing teacher Deb Moore, has her students learning about environmentally friendly marketing and planning a Green Fair. The two teachers are also helping to launch the Green Clubs of America, an educational nonprofit seeking to spread their curriculum to other schools and encourage students to consider renewable energy careers.

179

Weaving New York's Solar Industry Web | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Weaving New York's Solar Industry Web Weaving New York's Solar Industry Web Weaving New York's Solar Industry Web June 29, 2010 - 11:00am Addthis Solar films are manufactured at Precision Flow Technologies in Kingston, N.Y., facility. The factory once served as an IBM plant. | Photo Courtesy of Kevin Brady Solar films are manufactured at Precision Flow Technologies in Kingston, N.Y., facility. The factory once served as an IBM plant. | Photo Courtesy of Kevin Brady Stephen Graff Former Writer & editor for Energy Empowers, EERE These days in New York, it seems whatever The Solar Energy Consortium (TSEC) touches turns to green. The nonprofit has been building up a supply chain across the state for the last three years by helping companies bring on new, solar-related manufacturing processes and jobs.

180

Department of Energy Announces Senior Management Changes | Department of  

Broader source: Energy.gov (indexed) [DOE]

Announces Senior Management Changes Announces Senior Management Changes Department of Energy Announces Senior Management Changes November 20, 2012 - 12:00pm Addthis WASHINGTON, D.C. - The Office of Environmental Management (EM) and the National Nuclear Security Administration (NNSA) today jointly announced two key personnel changes that will bring significant leadership and project management experience to both organizations. Scott Samuelson, Manager of the Office of River Protection (ORP), will be leaving EM in January to return to NNSA, where he previously worked from the date it was formed in 2000. With Samuelson's departure, Kevin Smith, Manager of NNSA's Los Alamos Site Office (LASO), will become the ORP Manager. "Scott and Kevin are key senior executives in the Department of Energy," said Undersecretary for Nuclear Security and NNSA Administrator

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

National Nuclear Security Administration Commends Three EM Employees |  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Commends Three EM National Nuclear Security Administration Commends Three EM Employees National Nuclear Security Administration Commends Three EM Employees January 30, 2013 - 12:00pm Addthis Thomas D’Agostino, right, who retired this month as Under Secretary for Nuclear Security and NNSA Administrator, presents EM’s Candice Trummell with the NNSA Gold Medal earlier this month. Thomas D'Agostino, right, who retired this month as Under Secretary for Nuclear Security and NNSA Administrator, presents EM's Candice Trummell with the NNSA Gold Medal earlier this month. The National Nuclear Security Administration honored Kevin W. Smith with its Gold Medal. The National Nuclear Security Administration honored Kevin W. Smith with its Gold Medal. The National Nuclear Security Administration recognized Theodore E. Olds with its Silver Medal.

182

2013 Feds Feed Families: Your Generosity Counts | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

013 Feds Feed Families: Your Generosity Counts 013 Feds Feed Families: Your Generosity Counts 2013 Feds Feed Families: Your Generosity Counts July 2, 2013 - 5:58pm Addthis (L to R) Kevin Knobloch, DOE Chief of Staff; Fletcher Honemond, Chief Learning Officer; Doug Keeler, Feds Feeds Families National Program Manager; Ella Daniels of the Capital Area Food Bank; Jennifer Hirschorn; Rauland Sharp, 2013 Feds Feeds Families Deputy Champion. | Photo courtesy of Ella Daniels. (L to R) Kevin Knobloch, DOE Chief of Staff; Fletcher Honemond, Chief Learning Officer; Doug Keeler, Feds Feeds Families National Program Manager; Ella Daniels of the Capital Area Food Bank; Jennifer Hirschorn; Rauland Sharp, 2013 Feds Feeds Families Deputy Champion. | Photo courtesy of Ella Daniels. Fletcher Honemond Fletcher Honemond

183

DOE Headquarters Review Focuses on Improved LATA Kentucky Worker Safety |  

Broader source: Energy.gov (indexed) [DOE]

Headquarters Review Focuses on Improved LATA Kentucky Worker Headquarters Review Focuses on Improved LATA Kentucky Worker Safety DOE Headquarters Review Focuses on Improved LATA Kentucky Worker Safety July 1, 2012 - 12:00pm Addthis Kevin Dressman, director of the DOE Office of Worker Safety and Health Enforcement, addresses LATA Kentucky employees during a training session. The June regulatory assistance review was aimed at ensuring worker safety. Kevin Dressman, director of the DOE Office of Worker Safety and Health Enforcement, addresses LATA Kentucky employees during a training session. The June regulatory assistance review was aimed at ensuring worker safety. PADUCAH, Ky. - DOE Office of Health, Safety and Security headquarters representatives recently spent three days at the Paducah site helping EM cleanup contractor LATA Kentucky better identify and correct issues before

184

President Obama Announces More Key Administration Posts | Department of  

Broader source: Energy.gov (indexed) [DOE]

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and

185

Control and optimization of wave-induced motion of ramp- interconnected craft for cargo transfer  

E-Print Network [OSTI]

energy of the whole system in roll and yaw DOFs. The lastin the roll and yaw DOFs to stabilize the system. Otherwise,yaw DOF decreases its influence on the behavior of the system,

Toubi, Jacob

2009-01-01T23:59:59.000Z

186

E-Print Network 3.0 - aliphatic friedel-crafts alkylations Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Biology and Medicine ; Environmental Sciences and Ecology 28 A process for the rapid removal of dialkylamino-substituents from aromatic rings. Application to the expedient...

187

Using Show Homes (and Sponsorships) to Persuade Commissioning Relevancy and Factory Crafted High Performance Modular Homes  

E-Print Network [OSTI]

products and the show home builders. At this past year's IBS show in February, Palm Harbor Homes build the GenX home that included an installed and operational 4.08kWp photovoltaic system with inverter and back up battery management system, a solar hot...

Thomas-Rees, S.; Chasar, D.; Beal, D.; Chandra, S.

2007-01-01T23:59:59.000Z

188

Seakeeping for the T-Craft Using Linear Potential and Nonlinear Dynamic Methods  

E-Print Network [OSTI]

A system of ordinary differential equations (ODE) is constructed for an air cushion vehicle (ACV). The system is simplified to an equation for the balance of the vertical forces and the equation for the adiabatic compression of the air...

Bandas, John

2012-07-16T23:59:59.000Z

189

Design and experimental evaluation of an Autonomous Surface Craft to support AUV operations  

E-Print Network [OSTI]

In recent years, there has been a large increase in the use of autonomous underwater vehicles (AUV) for numerous military, commercial, and scientific missions. These include mapping, oceanographic data collection, and ...

Williams, Robert R., IV

2007-01-01T23:59:59.000Z

190

Week ending: Weekly Specific Maintenance and Repair WO# sub step WO Description Crew/Craft  

E-Print Network [OSTI]

-64Progressing 4/18/2012 0 4 518 0Totals for: 12-013597 12950%% Comp - 12-032564 000 EAST SIDE SUBSTATION, REPLACE SUBSTATION. THIS WORK ORDER IS FOR SERVICE LABOR, SERVICE MATERIAL, AND 0 1 0 UEM - MatlA841104000 CONTR 1 208 EAST SIDE SUBSTATION, REPLACE SUBSTATION. THIS WORK ORDER IS FOR SERVICE LABOProgressing 12

Massachusetts at Amherst, University of

191

Craft and Innovation: Serious Play and the Direct Experience of the Real  

E-Print Network [OSTI]

This paper looks at a way of studio teaching that emphasizes direct experience with real materials. It argues that innovation takes place when a student plays with real materials and adopts a critical attitude toward ...

Gore, Nils

2004-01-01T23:59:59.000Z

192

Different shades of gray: crafting a regulatory response to private equity buyouts in electricity  

SciTech Connect (OSTI)

Private equity has made a dramatic entry into the once-staid world of electric utilities. These investors, with their superior management expertise and greater access to capital, have the potential to improve utility operations and increase investment in badly needed generation and transmission facilities. Their acquisitions do not come without their share of risks, however. (author)

Vaheesan, Sandeep

2009-01-15T23:59:59.000Z

193

E-Print Network 3.0 - asymmetric friedel-crafts alkylation Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to haouamine B also relies on an intramolecular ... Source: Trauner, Dirk - Department Chemie, Ludwig Maximilians Universitt Mnchen Collection: Chemistry 3 Organocatalytic...

194

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

195

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

196

New Horizons Mission Powered by Space Radioisotope Power Systems |  

Broader source: Energy.gov (indexed) [DOE]

New Horizons Mission Powered by Space Radioisotope Power Systems New Horizons Mission Powered by Space Radioisotope Power Systems New Horizons Mission Powered by Space Radioisotope Power Systems January 30, 2008 - 6:47pm Addthis Artist's concept of the New Horizons spacecraft during its planned encounter with Pluto and its moon, Charon. The craft's miniature cameras, radio science experiment, ultraviolet and infrared spectrometers and space plasma experiments are run by the Department of Energy's Radioisotope Thermoelectric Generator (RTG). | Photo courtesy of Johns Hopkins University Applied Physics Laboratory/Southwest Research Institute (JHUAPL/SwRI) Artist's concept of the New Horizons spacecraft during its planned encounter with Pluto and its moon, Charon. The craft's miniature cameras, radio science experiment, ultraviolet and infrared spectrometers and space

197

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

198

U-172: OpenOffice.org Two Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

72: OpenOffice.org Two Vulnerabilities 72: OpenOffice.org Two Vulnerabilities U-172: OpenOffice.org Two Vulnerabilities May 18, 2012 - 7:00am Addthis PROBLEM: OpenOffice.org Two Vulnerabilities PLATFORM: OpenOffice.org 3.3, Other versions may also be affected. ABSTRACT: Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system. Reference LINKS: Secunia Advisory SA46992 CVE-2012-1149 CVE-2012-2149 IMPACT ASSESSMENT: High Discussion: 1) An integer overflow error in the vclmi.dll module when allocating memory for an embedded image object can be exploited to cause a heap-based buffer overflow e.g. via a specially crafted JPEG object within a DOC file. 2) An error within libwpd when parsing Wordperfect documents can be exploited to overwrite arbitrary memory via a specially crafted Wordperfect

199

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

200

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: RealPlayer Buffer Overflow and Memory Corruption Error Let 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028953 RealNetworks Security Bulletin CVE-2013-4973 CVE-2013-4974 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted RMP file that, when loaded by the target user, will trigger a stack overflow and execute arbitrary code on the target system. A remote user can create a specially crafted RealMedia file that, when

202

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

203

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

204

New Horizons Mission Powered by Space Radioisotope Power Systems |  

Broader source: Energy.gov (indexed) [DOE]

New Horizons Mission Powered by Space Radioisotope Power Systems New Horizons Mission Powered by Space Radioisotope Power Systems New Horizons Mission Powered by Space Radioisotope Power Systems January 30, 2008 - 6:47pm Addthis Artist's concept of the New Horizons spacecraft during its planned encounter with Pluto and its moon, Charon. The craft's miniature cameras, radio science experiment, ultraviolet and infrared spectrometers and space plasma experiments are run by the Department of Energy's Radioisotope Thermoelectric Generator (RTG). | Photo courtesy of Johns Hopkins University Applied Physics Laboratory/Southwest Research Institute (JHUAPL/SwRI) Artist's concept of the New Horizons spacecraft during its planned encounter with Pluto and its moon, Charon. The craft's miniature cameras, radio science experiment, ultraviolet and infrared spectrometers and space

205

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

206

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

207

T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users  

Broader source: Energy.gov (indexed) [DOE]

583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local 583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information March 18, 2011 - 5:15pm Addthis PROBLEM: A vulnerability was reported in the Linux Kernel. A local user can obtain information from kernel memory. PLATFORM: Version(s): 2.4.x, 2.6.x ABSTRACT: A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. reference LINKS: http://www.securitytracker.com/id/1025225 CVE-2011-1163 http://www.kernel.org/ IMPACT ASSESSMENT: Moderate Discussion: A local user can create a storage device with specially crafted OSF

208

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

209

10 Questions for a Physicist: Christian Bauer | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Physicist: Christian Bauer Physicist: Christian Bauer 10 Questions for a Physicist: Christian Bauer October 13, 2011 - 1:16pm Addthis Lawrence Berkeley National Laboratory Physicist Christian Bauer | Photo courtesy Roy Kaltschmidt, LBNL Lawrence Berkeley National Laboratory Physicist Christian Bauer | Photo courtesy Roy Kaltschmidt, LBNL Niketa Kumar Niketa Kumar Public Affairs Specialist, Office of Public Affairs Meet Christian Bauer - theoretical physicist at Lawrence Berkley National Laboratory and a newly minted recipient of the Presidential Early Career Award for Scientists and Engineers (PECASE). In the latest 10 Questions, Dr. Bauer discusses his work in high-energy physics and shares how these developments are helping craft our understanding of nature's most fundamental questions.

210

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

211

V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

14: RealPlayer MP4 Processing Buffer Overflow Vulnerability 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when processing MP4 files and can be exploited to cause a heap-based buffer overflow via a specially crafted MP4 file. IMPACT: Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to version 16.0.1.18. Addthis Related Articles U-042: Mac RealPlayer Multiple Vulnerabilities V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

212

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

213

PNNL: About PNNL - People  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Kevin Ensign Kevin Ensign Photo Director Office of Internal Audit Pacific Northwest National Laboratory (509) 375-2486 kevin.ensign@pnnl.gov Kevin Ensign is Director and Chief...

214

Graduate Student Government Travel Grant Results  

E-Print Network [OSTI]

Niehaus · Kaitlyn Bunker · Kamal B. Dhungana · Karl Warsinski · Kate Aho · Kevin Kruse · Kevin Waters

215

A review of "Rebranding Rule: The Restoration and Revolution Monarchy, 1660-1714" by Kevin Sharpe  

E-Print Network [OSTI]

in this series, Sharpe argues that the successful fashioning of the royal image was vital to an early modern monarchs grasp on power and authority. For Charles II, this representation of rule was trickier than for his forebears. The events of 1649 and those... that followed had profound revolutionary consequences, throwing the very meaning of kingship into question. The genie of republicanism, once released from the bottle, could never be completely put back inside. Powerful images of royal authority flourished...

Patterson, Catherine

2014-01-01T23:59:59.000Z

216

FIRE: FInding Rogue nEtworks Brett Stone-Gross, Christopher Kruegel, Kevin Almeroth  

E-Print Network [OSTI]

in response to abuse reports. Interestingly, even though the Internet provides a certain degree of anonymity to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs for Internet criminals for their own financial gain. What primarily sets these ISPs apart from others

California at Santa Barbara, University of

217

Nonlinear electrochemical relaxation around conductors Kevin T. Chu1,2  

E-Print Network [OSTI]

­5 , but electrochemical relaxation is also being increas- ingly exploited in colloids and microfluidics 6 . For ex- ample

Chu, Kevin T.

218

The Epistemic Benefit of Transient Diversity Kevin J.S. Zollman  

E-Print Network [OSTI]

or methodological approach will succeed without first attempting to apply it, study the effects of its application a problem for more traditional approaches to scientific methodology, since if everyone employs the same similar solutions (Hull, 1988; Sarkar, 1983; Solomon, 1992, 2001). Alternatively, Philip Kitcher (1990

Zollman, Kevin

219

Deconstructing Green Fluorescent Protein Kevin P. Kent, William Childs, and Steven G. Boxer*  

E-Print Network [OSTI]

variant that is useful for probing protein folding in vivo, and demonstrated that GFP 1-10 and GFP 11

Boxer, Steven G.

220

On the Number of Cycles in Planar Graphs Kevin Buchin1  

E-Print Network [OSTI]

technique. Combining both, we show that there is no planar graph with more than 2.8927n simple cycles cycles can be obtained by combining an upper bound on the number of triangulations with an upper bound spanning cycles on n points with an alternative approach. This bound is better than the combined bound

Fuchs, Gunter

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Supercharging Proteins Can Impart Unusual Resilience Michael S. Lawrence, Kevin J. Phillips, and David R. Liu*  

E-Print Network [OSTI]

they bear a net charge of zero.5 More recently, small differences in net charge ((3 charge units) have been garnered from the study of natural proteins, where a relationship between solubility and net charge has aggregation, tend to have large net charges.9,10 We speculated that the relationship between net charge

Liu, David R.

222

POS Tagging of Dialectal Arabic: A Minimally Supervised Approach Kevin Duh and Katrin Kirchhoff  

E-Print Network [OSTI]

are the CallHome Egyp- tian Colloquial Arabic (ECA) corpus, the LDC Lev- antine Arabic (LCA) corpus, the LDC

Duh, Kevin

223

JIMAR ANNUAL REPORT FOR FY 2012 P.I. NAME: Kevin Weng  

E-Print Network [OSTI]

is a generic local name given to two deep water pomfret species; the sickle pomfret, Taractichthys Science Center PROJECT PROPOSAL TITLE: Biology and Habitat Use of Monchong (Eumegistis illustris) at Cross and water information To support the nation's commerce with information for safe, efficient

Hawai'i at Manoa, University of

224

JIMAR ANNUAL REPORT FOR FY 2010 P.I./SPONSOR NAME: Kevin Weng  

E-Print Network [OSTI]

is a generic local name given to two deep water pomfret species; the sickle pomfret, Taractichthys contract): NMFS PIFSC PROJECT PROPOSAL TITLE: Biology and Habitat Use of Monchong (Eumegistis illustris and water information To support the nation's commerce with information for safe, efficient

Hawai'i at Manoa, University of

225

JIMAR ANNUAL REPORT FOR FY 2012 P.I. NAME: Kevin Weng  

E-Print Network [OSTI]

-high reward component, that aims to develop a novel method to study these deep water animals. PROGRESS DURING and long-range movements: We have placed VR2 in deep water around Oahu and Penguin Banks, with further Science Center PROJECT PROPOSAL TITLE: Impacts of Fishing on Vulnerable Non-target Species at Seamounts

Hawai'i at Manoa, University of

226

JIMAR ANNUAL REPORT FOR FY 2010 P.I./SPONSOR NAME: Kevin Weng  

E-Print Network [OSTI]

-high reward component, that aims to develop a novel method to study these deep water animals. 1 #12;PROGRESS-catch: The Daily Diary accelerometer was to have been housed for use in deep water by the developers at Swansea contract): NMFS PIFSC PROJECT PROPOSAL TITLE: Impacts of Fishing on Vulnerable Non-target Species

Hawai'i at Manoa, University of

227

JIMAR ANNUAL REPORT FOR FY 2011 P.I. NAME: Kevin Weng  

E-Print Network [OSTI]

): Monchong is a generic local name given to two deep water pomfret species; the sickle pomfret, Taractichthys contact): PIFSC NOAA SPONSOR NAME: Sam Pooley PROJECT PROPOSAL TITLE: Biology and Habitat Use of Monchong's needs for weather and water information To support the nation's commerce with information for safe

Hawai'i at Manoa, University of

228

Resilient Aggregation in Simple Linear Sensor Networks Kevin J. Henry Douglas R. Stinson  

E-Print Network [OSTI]

, thereby conserving energy in the remaining nodes. A rigorous proof of security is also given for each about their environment and report readings to a base station. One technique to conserve power, thereby reducing the total number of messages required to collect each sensor reading. In an adversarial

229

L3:VUQ.VVDA.P3.01 Kevin Copps SNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

set depends upon the role that the associated random variable plays in the respective physical problem. In contradistinction to a random error, a systematic error is defined as...

230

B&W Y-12 names Kevin Corbett Vice President of Quality Assurance...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Plant (WTP), the Pueblo and Blue Grass Chemical Agent-Destruction Pilot Plants, the Chernobyl New Safe Confinement Project, Kwajalein Range Services, the Sellafield Waste...

231

JIMAR ANNUAL REPORT FOR FY 2011 P.I. NAME: Kevin Weng  

E-Print Network [OSTI]

variability and change to enhance society's ability to plan and respond To serve society's needs for weather) and the sleeper shark (Somniosus pacificus). A combination of acoustic, satellite and accelerometry technologies satellite tag. This popup satellite tag did not report. We plan to continue this testing program and deploy

Hawai'i at Manoa, University of

232

A Predictive Role for Intermediate Legal Kevin D. Ashley and Stefanie Bruninghaus  

E-Print Network [OSTI]

of ownership O: (II) O implies C1, O implies C2,..., O implies Cn. Ross argued, " `O' (ownership) merely stands Ross, that was their only role (Ross 1957). In his famous example, he described a (fictional) South of the chief's food he is t^u-t^u. (1´) If a person has killed a totem animal he is t^u-t^u. ... (2

Ashley, Kevin D.

233

KEVIN T . KELLY AND OLIVER SCHULTE CHURCH'S THESIS AND HUME'S PROBLEM  

E-Print Network [OSTI]

of a hypothesis can be if the hypothesis is to be reliably investigated by a computable scientific method. 1 with the concepts exhaustively scanned by the mathematician's inner eye, the un­ bounded observations relevant is both an observation and a challenge. The observation is that inductive 1 inferences can never

Schulte, Oliver

234

Socially intelligent computing for coding of qualitative data* Kevin Crowston & Nancy McCracken, PIs  

E-Print Network [OSTI]

extraction and machine learning; application of a model to a document corpus · Web user interface to control for qualitative social science. Proposed approach · A human-computer partnership integrating manual coding hand coded by researchers · en apply model to code additional documents · Human coders will correct

Crowston, Kevin

235

THE RANGE OF TWO DIMENSIONAL SIMPLE RANDOM WALK Jian (Kevin) Jiao  

E-Print Network [OSTI]

to go. If the head turns up, you move one step to the right. Otherwise, you move one step to the left location in each step, thus summing up to the total number of distinct locations visited after n steps. Now the range using several new random variables. The whole proof also requires generating functions

Pemantle, Robin

236

Evaluating Operating System Vulnerability to Memory Kurt B. Ferreira, Kevin Pedretti, and Ron Brightwell  

E-Print Network [OSTI]

of Energy's National Nuclear Security Ad- ministration under contract DE-AC04-94AL85000. c 2012 Association, for Government purposes only. ROSS '12, June 29 2012, Venice, Italy Copyright 2012 ACM 978

Mueller, Frank

237

Differing methods of accounting ocean carbon sequestration efficiency Kevin Mueller and Long Cao  

E-Print Network [OSTI]

further storage of CO2 in the ocean. Our review of the literature indicates inconsistency in whether is appropriate for evaluating how much CO2 storage should be attributed to an ocean storage project. INDEX TERMS properties of seawater; KEYWORDS: carbon cycle, ocean sequestration, ISAM Citation: Mueller, K., L. Cao, K

Jain, Atul K.

238

Global warming due to increasing absorbed solar radiation Kevin E. Trenberth1  

E-Print Network [OSTI]

reducing cloud cover and increasing radiative emissions from higher temperatures. Instead the main warming in energy- related quantities provide a new perspective on issues important for climate change. As water vapor is the dominant greenhouse gas, it results in a positive feedback and roughly doubles

Fasullo, John

239

Docket No. EO-05-01: Letter from Kevin Kolevar, Director Office...  

Broader source: Energy.gov (indexed) [DOE]

of Mirant Potomac River, L.L.C. Comments on Department of Energy's Emergency Order To Resume Limited Operation at Mirant's Potomac River Generating Station and Proposed Mirant...

240

Photomechanical Surface Patterning in Azo-Polymer Materials Kevin G. Yager* and Christopher J. Barrett*  

E-Print Network [OSTI]

of patterning in azo-polymer thin films, irradiated at various temperatures, are compared to recent neutron reflectometry measurements of photomechanical effects in the same material. The magnitude and sign

Barrett, Christopher

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

A REDUCED GENERATOR MODEL WITH EXCITATION LIMITS Steven Ball Kevin Wedeward Ernest Barany Steve Schaffer  

E-Print Network [OSTI]

through a transmission line. Constant complex load power consumed at bus 2 is denoted by PD+jQD, complex, generator models 1. Introduction The consequences of electric power outages dictate the importance of parameter data, lack tractability for a thorough interpretation of results, and necessitate extensive

Wedeward, Kevin

242

Experience with an Object Reputation System for PeertoPeer Filesharing Kevin Walsh Emin Gun Sirer  

E-Print Network [OSTI]

, and indicates that much of this pollution can be attributed to deliberate attacks [14]. The underlying problem determine object authenticity, the degree to which an object's data matches its advertised description. Cre­ dence allows clients to explicitly label files as authentic or polluted, and to compute reputation

Sirer, Emin Gun

243

CRAFTING A NEW SELF IN DIASPORA: A STUDY OF THE 1.5 GENERATION OF VIETNAMESE AMERICANS  

E-Print Network [OSTI]

the United States: Camp Pendleton in California, Fort Chaffee in Arkansas, Eglin Air Force Base in Florida, and Fort Indiantown Gap in Pennsylvania. In 1977, a second wave of Vietnamese refugees began fleeing Vietnam. This wave of emigration lasted until... by an Arkansas woman, They say it is a lot colder here than in Vietnam. With a little luck, maybe all those Vietnamese will take pneumonia and die. Several early studies documented that a substantial number of Americans preferred the exclusion...

Cao, Thanh Hai Le

2013-12-31T23:59:59.000Z

244

The cophylogeny of populations and cultures: reconstructing the evolution of Iranian tribal craft traditions using trees and jungles  

Science Journals Connector (OSTI)

...archaeologists since the nineteenth century. For example, Balfour (1889...emerged in India in the sixth century BCE. Within 200 years it underwent...between the tenth and twelfth centuries (e.g. Barthold 1962; Oberling...migrations between seasonal camps, which in some cases covered...

2010-01-01T23:59:59.000Z

245

Learning from master's muscles : EMG-based bio-feedback tool for augmenting manual fabrication and crafting  

E-Print Network [OSTI]

Learning a novel skill is a time consuming process and can be frustrating at times. It may require hours of supervised training before a minimum level of proficiency can even be attained. For example in ceramics, centering ...

Bernal Cubias, Guillermo Roman

2014-01-01T23:59:59.000Z

246

Project CRAFT: A Test Bed for Demonstrating the Real Time Acquisition and Archival of WSR-88D Base  

E-Print Network [OSTI]

the long-term needs for WSR-88D base data archival, and in light of the compelling need for real time. The initial test bed of six radars, located in and around Oklahoma, has been delivering real time base data to substantial improvements in the identification and short-term warning of hazardous local weather (e.g., Crum

Droegemeier, Kelvin K.

247

Going Solar in Record Time with Plug-and-Play PV | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Going Solar in Record Time with Plug-and-Play PV Going Solar in Record Time with Plug-and-Play PV Going Solar in Record Time with Plug-and-Play PV April 24, 2012 - 6:10pm Addthis A plug-and-play PV system is envisioned as a consumer friendly solar technology that uses an automatic detection system to initiate communication between the solar energy system and the utility when plugged into a PV-ready circuit. | Photo by iStock. A plug-and-play PV system is envisioned as a consumer friendly solar technology that uses an automatic detection system to initiate communication between the solar energy system and the utility when plugged into a PV-ready circuit. | Photo by iStock. Kevin Lynn Systems Integration Lead, SunShot Initiative What does this project do? The Energy Department is investing up to $5 million this year to

248

U.S. Department of Energy Schedules Regional Workshops to Provide Expert  

Broader source: Energy.gov (indexed) [DOE]

Schedules Regional Workshops to Provide Schedules Regional Workshops to Provide Expert Input on 2009 Transmission Congestion Study U.S. Department of Energy Schedules Regional Workshops to Provide Expert Input on 2009 Transmission Congestion Study May 16, 2008 - 12:00pm Addthis Second Congestion Study to Further Evaluate our Nation's Electricity Reliability in the Face of Growing Energy Demand WASHINGTON, DC - As part of the Bush Administration's comprehensive effort to provide wide-ranging data and thorough statistical analysis in its 2009 National Transmission Congestion Study (Congestion Study), U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability (OE) Kevin Kolevar today announced that the Department will hold six regional technical workshops across the country, to seek input on

249

Idaho Cleanup Contractor Surpasses Significant Safety Milestones |  

Broader source: Energy.gov (indexed) [DOE]

Cleanup Contractor Surpasses Significant Safety Milestones Cleanup Contractor Surpasses Significant Safety Milestones Idaho Cleanup Contractor Surpasses Significant Safety Milestones April 29, 2013 - 12:00pm Addthis CWI employees discuss safety procedures before they remove a spent nuclear fuel shipment from a shipping container. CWI employees discuss safety procedures before they remove a spent nuclear fuel shipment from a shipping container. IDAHO FALLS, Idaho - For the second time in a little over a year, employees with DOE contractor CH2M-WG Idaho (CWI) supporting EM at the Idaho site have achieved 1 million hours without a recordable injury. They also worked more than 1.7 million hours without a lost work-time injury. "Our focus is working with employees to keep each other safe," said CWI Environmental, Safety, and Health Vice President Kevin Daniels. "We

250

President Obama Announces More Key Administration Posts | Department of  

Broader source: Energy.gov (indexed) [DOE]

April 17, 2009 - 12:00am April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and Urban Development; Raymond M. Jefferson, Assistant Secretary for Veterans Employment and Training, Department of Labor; Robert S. Litt, General

251

U.S. Department of Energy Schedules Regional Workshops to Provide Expert  

Broader source: Energy.gov (indexed) [DOE]

U.S. Department of Energy Schedules Regional Workshops to Provide U.S. Department of Energy Schedules Regional Workshops to Provide Expert Input on 2009 Transmission Congestion Study U.S. Department of Energy Schedules Regional Workshops to Provide Expert Input on 2009 Transmission Congestion Study May 16, 2008 - 1:53pm Addthis Second Congestion Study to Further Evaluate our Nation's Electricity Reliability in the Face of Growing Energy Demand WASHINGTON, DC - As part of the Bush Administration's comprehensive effort to provide wide-ranging data and thorough statistical analysis in its 2009 National Transmission Congestion Study (Congestion Study), U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability (OE) Kevin Kolevar today announced that the Department will hold six regional technical workshops across the country, to seek input on

252

DOE to Invest up to $2.3 Million to Identify Renewable Energy Zones in  

Broader source: Energy.gov (indexed) [DOE]

.3 Million to Identify Renewable Energy Zones .3 Million to Identify Renewable Energy Zones in Western States DOE to Invest up to $2.3 Million to Identify Renewable Energy Zones in Western States May 28, 2008 - 12:32pm Addthis The Renewable Energy Zones Initiative will promote regional transmission planning and encourage the development of renewable sources of energy WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin Kolevar today announced the Department's plans to contribute up to $2.3 million over three years, subject to annual appropriations, to identify areas in the Western United States with vast renewable energy resources, and expedite the development and delivery of those resources to meet regional energy needs. The Western Renewable Energy Zones (WREZ) project, launched by the Western

253

Solar Decathlon 2013: Let the Building Begin | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian, Energy Department Day 7 Construction 3 of 22 Day 7 Construction Kevin Davis, of West Virginia University, fills his house's water tank while team members discuss a potential problem. Water was delivered to all team houses today. Image: Amy Vaughn, Energy Department

254

U.S. Department of Energy to Host Press Call on Radioactive Waste Shipment  

Broader source: Energy.gov (indexed) [DOE]

U.S. Department of Energy to Host Press Call on Radioactive Waste U.S. Department of Energy to Host Press Call on Radioactive Waste Shipment and Disposal U.S. Department of Energy to Host Press Call on Radioactive Waste Shipment and Disposal November 12, 2013 - 10:26am Addthis NEWS MEDIA CONTACT (202) 586-4940 LAS VEGAS, NV - On Tuesday, November 12, 2013, the U.S. Department of Energy (DOE) will host a press call to discuss Consolidated Edison Uranium Solidification Project (CEUSP) shipment and disposal plans in Nevada. Energy Chief of Staff Kevin Knobloch will host the call and will be joined by issue experts to address any questions. This press call is taking place the day before DOE starts public meetings on this issue in Las Vegas (Nov. 13 at Cashman Center) and Pahrump (Nov. 14 at NV Treasure RV Resort). More details on those meetings can be found

255

DOE Selects Projects for up to $50 Million of Federal Funding to Modernize  

Broader source: Energy.gov (indexed) [DOE]

Selects Projects for up to $50 Million of Federal Funding to Selects Projects for up to $50 Million of Federal Funding to Modernize the Nation's Electricity Grid DOE Selects Projects for up to $50 Million of Federal Funding to Modernize the Nation's Electricity Grid April 21, 2008 - 1:43pm Addthis Demonstration Projects Aim at 15 Percent Reduction of U.S. Peak Load Electricity Demand Washington, DC- U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin Kolevar today announced the Department's plans to invest up to $50 million over five years (Fiscal Years 2008 - 2012), subject to appropriations from Congress, in nine demonstration projects competitively selected to increase efficiency in the nation's electricity grid. The Renewable and Distributed Systems Integration (RDSI) technologies demonstrated in these projects aim to

256

LANL Shatters Records in First Year of Accelerated TRU Waste Shipping  

Broader source: Energy.gov (indexed) [DOE]

Shatters Records in First Year of Accelerated TRU Waste Shatters Records in First Year of Accelerated TRU Waste Shipping Effort LANL Shatters Records in First Year of Accelerated TRU Waste Shipping Effort December 27, 2012 - 12:00pm Addthis From left, EM Deputy Assistant Secretary for Waste Management Frank Marcinowski, San Ildefonso Pueblo Governor Terry Aguilar, Los Alamos County Council Chair Sharon Stover, New Mexico Governor Susana Martinez, Los Alamos Site Office Manager Kevin Smith, and Laboratory Director Charles McMillan applaud as the 1,000th shipment of waste leaves Los Alamos National Laboratory. From left, EM Deputy Assistant Secretary for Waste Management Frank Marcinowski, San Ildefonso Pueblo Governor Terry Aguilar, Los Alamos County Council Chair Sharon Stover, New Mexico Governor Susana Martinez, Los

257

Interior Department Solicits Grant Proposals from Tribes | Department of  

Broader source: Energy.gov (indexed) [DOE]

Interior Department Solicits Grant Proposals from Tribes Interior Department Solicits Grant Proposals from Tribes Interior Department Solicits Grant Proposals from Tribes January 9, 2014 - 11:11am Addthis On December 23, Assistant Secretary-Indian Affairs Kevin K. Washburn announced that the U.S. Department of the Interior's (DOI's) Office of Indian Energy and Economic Development (IEED) is soliciting grant proposals from Indian Tribes and Alaska Native regional and village corporations for projects to 1) build tribal capacity for energy resource development and 2) promote the processing, use, or development of energy and mineral resources on Indian lands. Tribal Energy Development Capacity-Building Grant Proposals Applications Due: February 18, 2014 Eligible Entities: Federally recognized Tribes, including Alaska Native

258

DOE Selects Project for up to $7 Million of Federal Funding to Modernize  

Broader source: Energy.gov (indexed) [DOE]

Selects Project for up to $7 Million of Federal Funding to Selects Project for up to $7 Million of Federal Funding to Modernize Hawaii's Energy Infrastructure DOE Selects Project for up to $7 Million of Federal Funding to Modernize Hawaii's Energy Infrastructure April 21, 2008 - 1:46pm Addthis University of Hawaii Team to Install Distribution Management System at Maui Substation Honolulu, Hawaii- U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability (OE) Kevin Kolevar announced the Department's plans to invest up to $7 million over three years in a demonstration project led by the University of Hawaii's Natural Energy Institute to increase efficiency in the State's energy infrastructure. Assistant Secretary Kolevar was joined by Governor Linda Lingle in making the announcement today in Honolulu. The project, totaling $15 million, is

259

Grid Week 2008 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Grid Week 2008 Grid Week 2008 Grid Week 2008 September 24, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you, Guido, for that kind introduction . . . and thank you Kevin for your leadership. You and your team, along with Grid Week's organizing committee and many partners, have done a terrific job putting together this event. I thank you all for being here today. Last year, those of us participating in the first Grid Week joined together to make the case for a concerted national effort to modernize our electrical grid. We challenged the nation to recognize the scale, scope and critical importance of this effort. And this year, we move forward to build a broader consensus to develop and deploy smart grid infrastructure for delivering sustainable energy.

260

DOE Designates Southwest Area and Mid-Atlantic Area National Interest  

Broader source: Energy.gov (indexed) [DOE]

Designates Southwest Area and Mid-Atlantic Area National Designates Southwest Area and Mid-Atlantic Area National Interest Electric Transmission Corridors DOE Designates Southwest Area and Mid-Atlantic Area National Interest Electric Transmission Corridors October 2, 2007 - 2:50pm Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced the Department's designation of two National Interest Electric Transmission Corridors (National Corridors) -- the Mid-Atlantic Area National Interest Electric Transmission Corridor, and the Southwest Area National Interest Electric Transmission Corridor. These corridors include areas in two of the Nation's most populous regions with growing electricity congestion problems. The Department based its designations on data and

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Assistant Secretary Hoffman Discusses Grid Modernization with the New York  

Broader source: Energy.gov (indexed) [DOE]

Discusses Grid Modernization with the Discusses Grid Modernization with the New York Times and E&E TV Assistant Secretary Hoffman Discusses Grid Modernization with the New York Times and E&E TV May 10, 2013 - 4:15pm Addthis Assistant Secretary Patricia Hoffman recently discussed the progress being made with modernization of the nation's electric grid and the benefits that consumers, businesses, and communities across the nation are seeing, including fewer outages, more efficient operations, faster power restoration when disruptions occur, cost savings, and job creation. During a New York Times conference on "Energy for Tomorrow: Building Sustainable Cities," Assistant Secretary Hoffman joined ConEd CEO Kevin Burke, and Euroheat and Power CEO Sabine Froning for a discussion on

262

Solar Decathlon 2013: Let the Building Begin | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Let the Building Begin Let the Building Begin Solar Decathlon 2013: Let the Building Begin Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian, Energy Department Day 7 Construction 3 of 22 Day 7 Construction Kevin Davis, of West Virginia University, fills his house's water tank while team members discuss a potential problem. Water was delivered to all team houses today. Image: Amy Vaughn, Energy Department Day 6 Construction 4 of 22 Day 6 Construction

263

Department of Energy Prepares for Hurricane Season | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Prepares for Hurricane Season Prepares for Hurricane Season Department of Energy Prepares for Hurricane Season May 30, 2006 - 10:50am Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) Director of the Office of Electricity Delivery and Energy Reliability (OE) Kevin Kolevar today outlined a number of steps that the department is taking to prepare for hurricane season in the United States. Last year, Hurricanes Katrina and Rita knocked out electricity to a large portion of the Gulf Coast and damaged a number of oil and gas recovery platforms in the Gulf of Mexico and refineries along the shore. "Electricity and fuel are necessary to sustain the public's health and grow the nation's economy. After a disaster that shuts down energy supplies, the federal government, state and local leaders, and the industry need to

264

Grid Week 2008 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Grid Week 2008 Grid Week 2008 Grid Week 2008 September 24, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you, Guido, for that kind introduction . . . and thank you Kevin for your leadership. You and your team, along with Grid Week's organizing committee and many partners, have done a terrific job putting together this event. I thank you all for being here today. Last year, those of us participating in the first Grid Week joined together to make the case for a concerted national effort to modernize our electrical grid. We challenged the nation to recognize the scale, scope and critical importance of this effort. And this year, we move forward to build a broader consensus to develop and deploy smart grid infrastructure for delivering sustainable energy.

265

Department of Energy Seeks Public Comment on Designation of Energy  

Broader source: Energy.gov (indexed) [DOE]

Department of Energy Seeks Public Comment on Designation of Energy Department of Energy Seeks Public Comment on Designation of Energy Corridors in the West Department of Energy Seeks Public Comment on Designation of Energy Corridors in the West October 21, 2005 - 9:27am Addthis WASHINGTON, D.C. - The U.S. Department of Energy (DOE) announced that it and several other federal agencies will host eleven public meetings to discuss the designation of multi-purpose energy corridors on federal lands in the western United States. "As our nation grows, so do our energy needs. So we must be forward looking as we map out energy transmission corridors in order to get energy to places that need it," Director of DOE's Office of Electricity Delivery and Energy Reliability, Kevin Kolevar said. "We want to make sure that

266

Department of Energy Official Touts Bush Administration's Efforts to  

Broader source: Energy.gov (indexed) [DOE]

Official Touts Bush Administration's Efforts Official Touts Bush Administration's Efforts to Modernize our Nation's Electric Grid Department of Energy Official Touts Bush Administration's Efforts to Modernize our Nation's Electric Grid August 28, 2007 - 11:08am Addthis August 28, 2007 Department of Energy Official Touts Bush Administration's Efforts to Modernize our Nation's Electric GridLouisiana to increase energy efficiency with upgrades between the LaBarre and Metaire electric substations NEW ORLEANS, LA - The U.S. Department of Energy's (DOE) newly confirmed Assistant Secretary for the Office of Electricity Delivery and Energy Reliability Kevin M. Kolevar today highlighted the Bush Administration's efforts to increase the use of advanced technologies in the Nation's power delivery system equipment, as well as DOE's recent announcement to invest

267

LANL Shatters Records in First Year of Accelerated TRU Waste Shipping  

Broader source: Energy.gov (indexed) [DOE]

LANL Shatters Records in First Year of Accelerated TRU Waste LANL Shatters Records in First Year of Accelerated TRU Waste Shipping Effort LANL Shatters Records in First Year of Accelerated TRU Waste Shipping Effort December 27, 2012 - 12:00pm Addthis From left, EM Deputy Assistant Secretary for Waste Management Frank Marcinowski, San Ildefonso Pueblo Governor Terry Aguilar, Los Alamos County Council Chair Sharon Stover, New Mexico Governor Susana Martinez, Los Alamos Site Office Manager Kevin Smith, and Laboratory Director Charles McMillan applaud as the 1,000th shipment of waste leaves Los Alamos National Laboratory. From left, EM Deputy Assistant Secretary for Waste Management Frank Marcinowski, San Ildefonso Pueblo Governor Terry Aguilar, Los Alamos County Council Chair Sharon Stover, New Mexico Governor Susana Martinez, Los

268

DOE to Invest up to $2.3 Million to Identify Renewable Energy Zones in  

Broader source: Energy.gov (indexed) [DOE]

to Invest up to $2.3 Million to Identify Renewable Energy Zones to Invest up to $2.3 Million to Identify Renewable Energy Zones in Western States DOE to Invest up to $2.3 Million to Identify Renewable Energy Zones in Western States May 28, 2008 - 1:58pm Addthis The Renewable Energy Zones Initiative will promote regional transmission planning and encourage the development of renewable sources of energy WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin Kolevar today announced the Department's plans to contribute up to $2.3 million over three years, subject to annual appropriations, to identify areas in the Western United States with vast renewable energy resources, and expedite the development and delivery of those resources to meet regional energy needs. The

269

Saving Energy and Money Starts at Home | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Money Starts at Home Money Starts at Home Saving Energy and Money Starts at Home July 28, 2010 - 2:28pm Addthis Kevin Brosnahan What does this mean for me? The first step to getting your home drastically more energy efficient is by getting a professionally conducted home energy audit. Energysavers.gov has tons of facts on keeping your home energy efficient. Every year, the typical U.S. family spends about $1,900 on home utility bills. Unfortunately, a large portion of that energy is wasted - and subsequently, families are spending their hard-earned dollars on that wasted energy. For many low-income Americans, these energy bills absorb quite a significant amount of family income. The good news is that there are easy, no-cost or low-cost projects that you can do in one day to save energy and money at home. One of the best

270

Energy-Savings Initiative Event | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Energy-Savings Initiative Event Energy-Savings Initiative Event Energy-Savings Initiative Event October 5, 2005 - 11:54am Addthis Remarks Prepared for Energy Secretary Bodman Thank you, Governor Romney. I am glad to be here with you, with Kevin Measel of Lowe's, and with the men and women of this Lowe's store to stress the importance of energy efficiency and conservation. And let me compliment Lowe's on its longtime efforts promoting energy efficiency, along with being an ENERGY STAR retail partner of the year for three straight years. Fall in New England is a wonderful time. But everyone knows that the bitter cold of winter is not far behind. I have personal experience with those winters, having lived in Boston for four decades before joining the Bush Administration. I know how cold it can get, and I know that New Englanders

271

Magna E-Car Opening | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Magna E-Car Opening Magna E-Car Opening Magna E-Car Opening April 27, 2012 - 4:40pm Addthis Vehicle Technologies Program Manager Patrick B. Davis gets ready to cut the ribbon at Magna E-Car's new electric drive component plant in Michigan. From left: Mike Finney - CEO, Michigan Economic Development Corporation; Gary Meyers - VP/General Manager, Magna E-Car USA, LP; Pat Davis; Kevin Pavlov - Chief Operating Officer, Magna E-Car Systems; Marilyn Hoffman, Township Supervisor, Grand Blanc Township, Michigan; Joseph Graves, State Representative 51st District, Michigan House of Representatives; Tim Herman, CEO, The Genesee County Chamber of Commerce. | Photo courtesy of Magna E-Car. Vehicle Technologies Program Manager Patrick B. Davis gets ready to cut the ribbon at Magna E-Car's new electric drive component plant in Michigan.

272

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Broader source: Energy.gov (indexed) [DOE]

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks October 18, 2007 - 3:21pm Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These

273

DOE Selects Projects for up to $50 Million of Federal Funding to Modernize  

Broader source: Energy.gov (indexed) [DOE]

Projects for up to $50 Million of Federal Funding to Projects for up to $50 Million of Federal Funding to Modernize the Nation's Electricity Grid DOE Selects Projects for up to $50 Million of Federal Funding to Modernize the Nation's Electricity Grid April 21, 2008 - 10:49am Addthis Demonstration Projects Aim at 15 Percent Reduction of U.S. Peak Load Electricity Demand Washington, DC- U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin Kolevar today announced the Department's plans to invest up to $50 million over five years (Fiscal Years 2008 - 2012), subject to appropriations from Congress, in nine demonstration projects competitively selected to increase efficiency in the nation's electricity grid. The Renewable and Distributed Systems Integration (RDSI) technologies demonstrated in these projects aim to

274

Over 9600 Small Business Subcontracts Critical to the Success of NNSA's  

Broader source: Energy.gov (indexed) [DOE]

Over 9600 Small Business Subcontracts Critical to the Success of Over 9600 Small Business Subcontracts Critical to the Success of NNSA's MOX Fuel Fabrication Facility Over 9600 Small Business Subcontracts Critical to the Success of NNSA's MOX Fuel Fabrication Facility January 3, 2013 - 10:38am Addthis Top: MOX Services President Kelly Trice, left, presents a certificate to Wise President and Owner David Abney and Wise Marketing Director Renee Abney. Wise was recognized as a 2012 MOX Gold Supplier during a special presentation in Dayton. Bottom: Byers Precision Fabricators was recognized as a 2012 MOX Gold Supplier during a special presentation in North Carolina. Steve Marr of MOX Services (left) and Kevin Hall of NNSA (right) present Roger Byers (center) with the award. Top: MOX Services President Kelly Trice, left, presents a certificate to

275

September 13, 2013 SEAB Meeting | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

September 13, 2013 SEAB Meeting September 13, 2013 SEAB Meeting September 13, 2013 SEAB Meeting September 13, 2013 - 2:27pm Addthis Secretary of Energy Advisory Board Meeting Agenda U.S. Department of Energy, Room 8E-089 1000 Independence Avenue SW Washington, DC September 13, 2013 Download Meeting Minutes 8:00 am - 8:45 am Welcome and Overview Secretary Ernest J. Moniz 8:45 am - 9:30 am Discussion of Charges to Board Co-Chairs John Deutch and Persis Drell 10:00 am - 10:45 am Presentation on Exascale (download) Steve Binkley, US Department of Energy Dimitri Kusnezov, US Department of Energy 10:45 am - 11:30 am Presentation on the Climate Action Plan (download) Kevin Knobloch, US Department of Energy Melanie Kenderdine, US Department of Energy Jonathan Pershing, US Department of Energy 11:30 am - 12:00 pm

276

DOE to Provide Nearly $20 Million to Further Development of Advanced  

Broader source: Energy.gov (indexed) [DOE]

20 Million to Further Development of 20 Million to Further Development of Advanced Batteries for Plug-in Hybrid Electric Vehicles DOE to Provide Nearly $20 Million to Further Development of Advanced Batteries for Plug-in Hybrid Electric Vehicles September 25, 2007 - 2:49pm Addthis ANN ARBOR, MI - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced DOE will invest nearly $20 million in plug-in hybrid vehicle (PHEV) research. Five projects have been selected for negotiation of awards under DOE's collaboration with the United States Advanced Battery Consortium (USABC) for $17.2 million in DOE funding for PHEV battery development projects and; DOE will provide nearly $2 million to the University of Michigan (U-M) to spearhead a study exploring the future of

277

Solar Decathlon 2013: Let the Building Begin | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian, Energy Department Day 7 Construction 3 of 22 Day 7 Construction Kevin Davis, of West Virginia University, fills his house's water tank while team members discuss a potential problem. Water was delivered to all team houses today. Image: Amy Vaughn, Energy Department

278

Department of Energy Official Touts Bush Administration's Efforts to  

Broader source: Energy.gov (indexed) [DOE]

Department of Energy Official Touts Bush Administration's Efforts Department of Energy Official Touts Bush Administration's Efforts to Modernize our Nation's Electric Grid Department of Energy Official Touts Bush Administration's Efforts to Modernize our Nation's Electric Grid August 28, 2007 - 11:08am Addthis August 28, 2007 Department of Energy Official Touts Bush Administration's Efforts to Modernize our Nation's Electric GridLouisiana to increase energy efficiency with upgrades between the LaBarre and Metaire electric substations NEW ORLEANS, LA - The U.S. Department of Energy's (DOE) newly confirmed Assistant Secretary for the Office of Electricity Delivery and Energy Reliability Kevin M. Kolevar today highlighted the Bush Administration's efforts to increase the use of advanced technologies in the Nation's power delivery system equipment, as well as DOE's recent announcement to invest

279

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Broader source: Energy.gov (indexed) [DOE]

8 Million to Safeguard the Nation's Energy 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks October 18, 2007 - 3:21pm Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These

280

DOE Selects Project for up to $7 Million of Federal Funding to Modernize  

Broader source: Energy.gov (indexed) [DOE]

Selects Project for up to $7 Million of Federal Funding to Selects Project for up to $7 Million of Federal Funding to Modernize Hawaii's Energy Infrastructure DOE Selects Project for up to $7 Million of Federal Funding to Modernize Hawaii's Energy Infrastructure April 21, 2008 - 1:46pm Addthis University of Hawaii Team to Install Distribution Management System at Maui Substation Honolulu, Hawaii- U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability (OE) Kevin Kolevar announced the Department's plans to invest up to $7 million over three years in a demonstration project led by the University of Hawaii's Natural Energy Institute to increase efficiency in the State's energy infrastructure. Assistant Secretary Kolevar was joined by Governor Linda Lingle in making the announcement today in Honolulu. The project, totaling $15 million, is

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Over 9600 Small Business Subcontracts Critical to the Success of NNSA's  

Broader source: Energy.gov (indexed) [DOE]

Over 9600 Small Business Subcontracts Critical to the Success of Over 9600 Small Business Subcontracts Critical to the Success of NNSA's MOX Fuel Fabrication Facility Over 9600 Small Business Subcontracts Critical to the Success of NNSA's MOX Fuel Fabrication Facility January 3, 2013 - 10:38am Addthis Top: MOX Services President Kelly Trice, left, presents a certificate to Wise President and Owner David Abney and Wise Marketing Director Renee Abney. Wise was recognized as a 2012 MOX Gold Supplier during a special presentation in Dayton. Bottom: Byers Precision Fabricators was recognized as a 2012 MOX Gold Supplier during a special presentation in North Carolina. Steve Marr of MOX Services (left) and Kevin Hall of NNSA (right) present Roger Byers (center) with the award. Top: MOX Services President Kelly Trice, left, presents a certificate to

282

T-610: Red Hat kdenetwork security update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Red Hat kdenetwork security update 0: Red Hat kdenetwork security update T-610: Red Hat kdenetwork security update April 26, 2011 - 7:11am Addthis PROBLEM: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. reference LINKS: RHSA-2011:0465-1 CVE-2011-1586 RH Classification RH Updates Support

283

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets 4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service May 17, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in Novell eDirectory. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HP/UX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user can cause denial of service conditions. reference LINKS: Novell eDirectory - LDAP-SSL SECURELIST.ORG SecurityFocus BugTrackID: 47858 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Novell eDirectory. A remote user can cause

284

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

285

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

286

Top 10 Things You Didn't Know About Clean Cities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Top 10 Things You Didn't Know About Clean Cities Top 10 Things You Didn't Know About Clean Cities Top 10 Things You Didn't Know About Clean Cities June 14, 2013 - 5:21pm Addthis Nearly 100 Clean Cities coalitions work to reduce petroleum use in communities across the country. Led by Clean Cities coordinators, coalitions are composed of businesses, fuel providers, vehicle fleets, state and local government agencies, and community organizations. These stakeholders come together to share information and resources, educate the public, help craft public policy, and collaborate on projects that reduce petroleum use. Click on a region for more information. Rebecca Matulka Rebecca Matulka Digital Communications Specialist, Office of Public Affairs Want to know more about Clean Cities? Check out our Clean Cities topic page to learn about program

287

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

288

T-639: Debian update for libxml2 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

39: Debian update for libxml2 39: Debian update for libxml2 T-639: Debian update for libxml2 June 7, 2011 - 3:35pm Addthis PROBLEM: libxml2 is vulnerable to buffer overflows, which allowed a crafted XML input file to potentially execute arbitrary code. PLATFORM: Package: libxml2 version 2.7.8. Other versions may also be affected ABSTRACT: Libxml2 XPath Nodeset Processing Vulnerability reference LINKS: Secunia Advisory: SA44817 Secunia Advisory: SA44711 DSA 2255-1 Vulnerability Report: Debian GNU/Linux 6.0 Download Package libxml2 Other Packages Related to libxml2 IMPACT ASSESSMENT: High Discussion: Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

289

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

290

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

291

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Broader source: Energy.gov (indexed) [DOE]

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

292

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

293

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

294

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

295

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

296

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

297

T-547: Microsoft Windows Human Interface Device (HID) Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

547: Microsoft Windows Human Interface Device (HID) Vulnerability 547: Microsoft Windows Human Interface Device (HID) Vulnerability T-547: Microsoft Windows Human Interface Device (HID) Vulnerability February 1, 2011 - 3:20am Addthis PROBLEM Microsoft Windows Human Interface Device (HID) Vulnerability. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. reference LINKS: Security Lab: Reference CVE-2011-0638 CVE Details: Reference CVE-2011-0638 Mitre Reference: CVE-2011-0638

298

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

3: Windows Remote Desktop Client DLL Loading Error Lets Remote 3: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code March 9, 2011 - 3:05pm Addthis PROBLEM: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution. PLATFORM: Remote Desktop Connection Client Version(s): 5.2, 6.0, 6.1, 7.0 ABSTRACT: A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Microsoft Security Bulletin MS11-017 SecurityTracker Alert ID:1025172 CVE-2011-0029 IMPACT ASSESSMENT: Moderate Discussion: A remote user can create a specially crafted DLL file on a remote share (e.g., WebDAV, SMB share). When the target user opens a valid Remote

299

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

300

V-062: Asterisk Two Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: Asterisk Two Denial of Service Vulnerabilities 2: Asterisk Two Denial of Service Vulnerabilities V-062: Asterisk Two Denial of Service Vulnerabilities January 4, 2013 - 6:00am Addthis PROBLEM: Asterisk Two Denial of Service Vulnerabilities PLATFORM: The vulnerabilities are reported in versions 1.8.x, 10.x, and 11.x. ABSTRACT: Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA51689 Asterisk Project Security Advisories CVE-2012-5976 CVE-2012-5977 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to consume excessive resources on the target system. Systems configured to allow anonymous calls are affected. A remote authenticated user can also exploit this via

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

302

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

303

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

304

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

305

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

306

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

307

U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

7: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing 7: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability August 16, 2012 - 7:00am Addthis PROBLEM: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability PLATFORM: Version(s): Mozilla Firefox 6 - 12 ABSTRACT: To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. REFERENCE LINKS: http://www.securityfocus.com/bid/54585 CVE-2012-1950 IMPACT ASSESSMENT: Medium Discussion: The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load. mozilla Firefox is prone to a URI-spoofing spoofing vulnerability. Attackers may exploit this issue to display

308

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

309

U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

37: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing 37: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability August 16, 2012 - 7:00am Addthis PROBLEM: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability PLATFORM: Version(s): Mozilla Firefox 6 - 12 ABSTRACT: To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. REFERENCE LINKS: http://www.securityfocus.com/bid/54585 CVE-2012-1950 IMPACT ASSESSMENT: Medium Discussion: The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load. mozilla Firefox is prone to a URI-spoofing spoofing vulnerability. Attackers may exploit this issue to display

310

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

311

U-117: Potential security vulnerability has been identified with certain HP  

Broader source: Energy.gov (indexed) [DOE]

7: Potential security vulnerability has been identified with 7: Potential security vulnerability has been identified with certain HP printers and HP digital senders U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders March 5, 2012 - 7:00am Addthis PROBLEM: The vulnerability could be exploited remotely to install unauthorized printer firmware. PLATFORM: Select HP printers and Digital Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory CVE-2011-4161 Previous JC3 Advisory Bulletin IMPACT ASSESSMENT: High Discussion: The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, 4xxx, 5550, 9500, CMxxxx, CPxxxx, and Enterprise CPxxxx;

312

Miles Below the Earth: The Next-Generation of Geothermal Energy |  

Broader source: Energy.gov (indexed) [DOE]

Miles Below the Earth: The Next-Generation of Geothermal Energy Miles Below the Earth: The Next-Generation of Geothermal Energy Miles Below the Earth: The Next-Generation of Geothermal Energy February 7, 2011 - 12:34pm Addthis John Schueler John Schueler Former New Media Specialist, Office of Public Affairs What will the project do? Enhanced geothermal systems (EGS) essentially create man-made reservoirs that mimic naturally occurring pockets of steam- with the potential for use as a reliable, 24/7 source of renewable energy. For more than a century, traditional geothermal power plants have been generating electricity by extracting pockets of steam found miles below the Earth's surface. Until recently though, those plants could only be constructed in locations where pockets of steam had formed naturally. Enhanced geothermal systems (EGS) have been crafted to solve that problem

313

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

314

DOE Seeks Further Public Input on How Best To Streamline Existing  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Further Public Input on How Best To Streamline Existing Further Public Input on How Best To Streamline Existing Regulations DOE Seeks Further Public Input on How Best To Streamline Existing Regulations December 7, 2011 - 12:34pm Addthis The Department of Energy (DOE) has announced a further step to implementing the President's Executive Order on Improving Regulatory Review. The Executive Order directs federal agencies to review existing regulations and determine whether they are still necessary and crafted effectively to solve current problems. Engaging the public in an open, transparent process is a crucial step in DOE's regulatory review process. Because public comments in response to the Request for Information (RFI) issued in January were important in the development of DOE's plan for retrospective regulatory review, DOE issued a second RFI this week asking the public how

315

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

316

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

317

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Broader source: Energy.gov (indexed) [DOE]

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

318

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

319

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

320

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the  

Broader source: Energy.gov (indexed) [DOE]

48: Avaya IP Office Manager TFTP Server Lets Remote Users 48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Avaya IP Office Manager. A remote user can view files on the target system. PLATFORM: Versions 5.0.x - 6.1.x ABSTRACT: The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. reference LINKS: ASA-2011-156 SecurityTracker Alert ID: 1025664 Secunia Advisory: SA43884 Avaya Support IMPACT ASSESSMENT: Medium Discussion: Avaya IP Office Manager is an application for viewing and editing an IP Office system's configuration. It can be used to securely connect to and

322

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

323

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

324

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

325

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

326

V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery  

Broader source: Energy.gov (indexed) [DOE]

8: Cisco Wireless Lan Controller Cross-Site Request Forgery 8: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability December 17, 2012 - 1:00am Addthis PROBLEM: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability PLATFORM: Cisco Wireless LAN Controller (WLC) ABSTRACT: A vulnerability was reported in Cisco Wireless LAN Controller. REFERENCE LINKS: SecurityTracker Alert ID: 1027886 Secunia Advisory SA51546 CVE-2012-5991 CVE-2012-5992 CVE-2012-6007 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can conduct cross-site request forgery attacks. A remote user can create specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the

327

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Broader source: Energy.gov (indexed) [DOE]

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

328

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

329

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

330

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server  

Broader source: Energy.gov (indexed) [DOE]

9: Stack-based buffer overflow in oninit in IBM Informix 9: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution February 17, 2011 - 7:00am Addthis PROBLEM: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution. PLATFORM: IBM Informix Dynamic Server (IDS) 11.50 ABSTRACT: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement. reference LINKS: Security Database - Reference - CVE-2011-1033 CVE Details - Reference - CVE-2011-1033

331

V-053: Adobe Shockwave player installs Xtras without prompting | Department  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe Shockwave player installs Xtras without prompting 3: Adobe Shockwave player installs Xtras without prompting V-053: Adobe Shockwave player installs Xtras without prompting December 24, 2012 - 12:15am Addthis PROBLEM: Adobe Shockwave player installs Xtras without prompting PLATFORM: Adobe Shockwave Player ABSTRACT: A vulnerability was reported in Adobe Shockwave. REFERENCE LINKS: Vulnerability Note VU#519137 SecurityTracker Alert ID: 1027903 Bugtraq ID: 56972 CVE-2012-6271 IMPACT ASSESSMENT: Medium DISCUSSION: Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra. IMPACT: By convincing a user to view a specially crafted Shockwave content, an attacker may be able to execute arbitrary code with the privileges of the

332

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

333

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

334

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

335

V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

2: Apache Struts "ParameterInterceptor" Security Bypass 2: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability May 23, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache Struts PLATFORM: The vulnerability is reported in versions prior to 2.3.14.1 ABSTRACT: A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA53495 Apache Struts Advisory S2-012 Apache Struts Advisory S2-013 CVE-2013-1965 CVE-2013-1966 IMPACT ASSESSMENT: High DISCUSSION: A request that included a specially crafted request parameter could be used to inject arbitrary OGNL code into the stack, afterward used as request

336

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

337

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

338

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

339

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

340

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

342

Clean Cities Expands and Strengthens Nationwide Partnerships | Department  

Broader source: Energy.gov (indexed) [DOE]

Clean Cities Expands and Strengthens Nationwide Partnerships Clean Cities Expands and Strengthens Nationwide Partnerships Clean Cities Expands and Strengthens Nationwide Partnerships November 20, 2012 - 12:14pm Addthis Nearly 100 Clean Cities coalitions work to reduce petroleum use in communities across the country. Led by Clean Cities coordinators, coalitions are composed of businesses, fuel providers, vehicle fleets, state and local government agencies, and community organizations. These stakeholders come together to share information and resources, educate the public, help craft public policy, and collaborate on projects that reduce petroleum use. Click on a region for more information. Shannon Brescher Shea Communications Manager, Clean Cities Program What is Clean Cities? Clean Cities works to reduce U.S. reliance on petroleum in

343

V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: FreeType BDF Glyph Processing Buffer Overflow Vulnerability 6: FreeType BDF Glyph Processing Buffer Overflow Vulnerability V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability December 27, 2012 - 6:00am Addthis PROBLEM: FreeType BDF Glyph Processing Buffer Overflow Vulnerability PLATFORM: Version(s): prior to 2.4.11 ABSTRACT: Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027921 CVE-2012-5668 CVE-2012-5669 CVE-2012-5670 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted font file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user or application. A null pointer dereference can be triggered in bdf_free_font()

344

U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets  

Broader source: Energy.gov (indexed) [DOE]

3: libvirt virTypedParameterArrayClear() Memory Access Error 3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service August 24, 2012 - 7:00am Addthis PROBLEM: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service PLATFORM: Version(s): 0.9.13 and prior ABSTRACT: A vulnerability was reported in libvirt. reference LINKS: libvirt SecurityTracker Alert ID: 1027437 Secunia Advisory SA50118 Bugtraq ID: 54748 CVE-2012-3445 IMPACT ASSESSMENT: Medium Discussion A remote user can send a specially crafted RPC call with the number of parameters set to zero to libvirtd to trigger a memory access error in virTypedParameterArrayClear() and cause the target service to crash. Impact:

345

Energy Secretary Bodman's Statement on House Passage of the Energy Bill |  

Broader source: Energy.gov (indexed) [DOE]

Bodman's Statement on House Passage of the Energy Bodman's Statement on House Passage of the Energy Bill Energy Secretary Bodman's Statement on House Passage of the Energy Bill July 28, 2005 - 2:29pm Addthis WASHINGTON, DC - Secretary of Energy Samuel W. Bodman today released the following statement regarding House passage of the Energy Policy Act of 2005: "Ensuring America's future energy security has been a priority for President Bush since his early days in office, and I commend the House of Representatives, particularly Chairman Barton and Ranking Member Dingell, for their efforts on this broad-based legislation that helps achieve that goal. Because of the hard work and thoughtful approach that went into crafting this bipartisan legislation, the House has passed a bill that will reduce energy demand, increase energy supplies, and update our aging energy

346

U-190: Microsoft Security Bulletin MS12-037 - Critical | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Microsoft Security Bulletin MS12-037 - Critical 0: Microsoft Security Bulletin MS12-037 - Critical U-190: Microsoft Security Bulletin MS12-037 - Critical June 13, 2012 - 3:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-037 - Critical PLATFORM: Internet Explorer 8.x ABSTRACT: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. LINKS: Microsoft Security Bulletin MS12-037 - Critical Secunia Advisory SA49412 IMPACT ASSESSMENT: High Discussion: The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who

347

U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow  

Broader source: Energy.gov (indexed) [DOE]

1: Novell GroupWise Internet Agent "Content-Length" Integer 1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September 17, 2012 - 6:00am Addthis PROBLEM: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability PLATFORM: The vulnerability is confirmed in version 8.0.2 HP3 and reported in version 2012. Other versions may also be affected. ABSTRACT: A vulnerability was reported in Novell GroupWise Internet Agent reference LINKS: Novell SecurityTracker Alert ID: 1027536 Secunia Advisory SA50622 CVE-2012-0271 IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted request with the HTTP 'Content-Length' header value of '-1' to the administration interface via

348

T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer  

Broader source: Energy.gov (indexed) [DOE]

2: Novell ZENworks Configuration Management novell-tftp.exe 2: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow February 22, 2011 - 7:00am Addthis PROBLEM: Novell ZENworks Buffer Overflow in TFTPD. PLATFORM: Novell ZENworks Configuration Management 10.x, Novell ZENworks Configuration Management 11.x ABSTRACT: A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

349

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

350

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

351

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library  

Broader source: Energy.gov (indexed) [DOE]

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code April 25, 2011 - 7:00am Addthis PROBLEM: A vulnerability was reported in Adobe Acrobat and Adobe Reader. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems ABSTRACT: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run

352

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

353

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

354

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

8: Apache XML Security XPointer Expressions Processing Buffer 8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June 28, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache XML Security PLATFORM: vulnerability is reported in versions prior to 1.7.2 ABSTRACT: The vulnerability addresses the possibility of a heap overflow condition REFERENCE LINKS: Secunia Advisory SA53959 Apache Advisory CVE-2013-2210 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error within the XML Signature Reference processing code and can be exploited to cause a heap-based buffer overflow via a specially crafted document containing malformed XPointer expressions. IMPACT: Successful exploitation may allow execution of arbitrary code

355

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

356

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

357

T-572: VMware ESX/ESXi SLPD denial of service vulnerability | Department of  

Broader source: Energy.gov (indexed) [DOE]

72: VMware ESX/ESXi SLPD denial of service vulnerability 72: VMware ESX/ESXi SLPD denial of service vulnerability T-572: VMware ESX/ESXi SLPD denial of service vulnerability March 8, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware ESX. A remote user can cause denial of service conditions. PLATFORM: ESX/ESXi 4.0, 4.1 ABSTRACT: VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. reference LINKS: VMware Security Advisory: VMSA-2011-0004 VMware vSphere 4 VMware ESXi 4.1 Update CVE-2010-3609 IMPACT ASSESSMENT: Moderate Discussion: A remote user can send specially crafted data to cause the target Service Location Protocol daemon (SLPD) to enter an infinite loop and consume excessive CPU resources.A remote user can consume excessive CPU resources.

358

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

359

T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Rational System Architect ActiveBar ActiveX Control Lets 5: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code May 4, 2011 - 7:15am Addthis PROBLEM: A vulnerability was reported in IBM Rational System Architect. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: IBM Rational System 11.4 and prior versions ABSTRACT: There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect. reference LINKS: IBM Advisory: 21497689 SecurityTracker Alert ID: 1025464 CVE-2011-1207 Secunia Advisory: SA43399 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted HTML that, when loaded by the

360

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Broader source: Energy.gov (indexed) [DOE]

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

362

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

363

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

364

V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Flash Plug-in Lets Remote Users Conduct 4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 - 12:56am Addthis PROBLEM: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028694 CVE-2013-2866 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted Flash content that, when loaded by the target user, will display the Flash settings in a transparent manner, which may allow the remote user to cause the target user to modify their Flash settings. This may allow the remote user to obtain potentially

365

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

366

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

367

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

05:Oracle Java SE Critical Patch Update Advisory 05:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

368

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

369

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

370

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

371

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

372

U-174: Serendipity Unspecified SQL Injection Vulnerability | Department of  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability 4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL Injection Vulnerability PLATFORM: 1.6.1 and prior versions ABSTRACT: A vulnerability was reported in Serendipity. A remote user can inject SQL commands. Reference Links: SecurityTracker Alert ID: 1027079 Secunia Advisory SA49234 CVE-2012-2762 IMPACT ASSESSMENT: Medium Discussion: The 'include/functions_trackbacks.inc.php' script does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database. Impact: A remote user can execute SQL commands on the underlying database. Solution: The vendor has issued a fix (1.6.2).

373

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

374

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

375

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Subversion Hook Scripts Arbitrary Command Injection 0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am Addthis PROBLEM: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability PLATFORM: Apache Subversion 1.x ABSTRACT: A vulnerability has been reported in Apache Subversion. REFERENCE LINKS: Apache Original Advisory Secunia Advisory SA53727 CVE-2013-2088 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an input validation error in the svn-keyword-check.pl hook script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that contrib scripts are used on the

376

DOE Seeks Public Views On How Best To Streamline Existing Regulations |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Public Views On How Best To Streamline Existing Public Views On How Best To Streamline Existing Regulations DOE Seeks Public Views On How Best To Streamline Existing Regulations January 31, 2011 - 5:53pm Addthis The Department of Energy today announced two immediate steps to implement the Obama Administration's Executive Order on Improving Regulation and Regulatory Review, which directs federal agencies to review existing regulations and determine whether they are still necessary and crafted effectively to solve current problems. First, to engage the public in a transparent review process, the Department is issuing a Request for Information asking the public how best to streamline existing regulations and to identify rules that are obsolete, unnecessary, unjustified, or simply no longer make sense. All comments and reply

377

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Broader source: Energy.gov (indexed) [DOE]

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

378

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

379

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

380

T-548: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer  

Broader source: Energy.gov (indexed) [DOE]

48: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe 48: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow T-548: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow February 2, 2011 - 7:15am Addthis PROBLEM: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow. PLATFORM: Novell Zenworks Handheld Management 7 ABSTRACT: Novell ZENworks Handheld Management (ZHM) is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the ZfHIPCnd.exe Access Point process. By sending a specially-crafted request to TCP port 2400, a remote attacker could overflow a buffer and execute arbitrary code on the system with SYSTEM privileges or cause the application to crash. reference LINKS: TippingPoint: Zero Day Initiative Redhat - CVE-2010-0742 Novell ZENworks - CVE-2010-0742

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

382

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Broader source: Energy.gov (indexed) [DOE]

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

383

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

384

DOE Seeks Public Views On How Best To Streamline Existing Regulations |  

Broader source: Energy.gov (indexed) [DOE]

DOE Seeks Public Views On How Best To Streamline Existing DOE Seeks Public Views On How Best To Streamline Existing Regulations DOE Seeks Public Views On How Best To Streamline Existing Regulations January 31, 2011 - 5:53pm Addthis The Department of Energy today announced two immediate steps to implement the Obama Administration's Executive Order on Improving Regulation and Regulatory Review, which directs federal agencies to review existing regulations and determine whether they are still necessary and crafted effectively to solve current problems. First, to engage the public in a transparent review process, the Department is issuing a Request for Information asking the public how best to streamline existing regulations and to identify rules that are obsolete, unnecessary, unjustified, or simply no longer make sense. All comments and reply

385

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

386

T-627: Adobe Flash Player Memory Corruption | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Memory Corruption 7: Adobe Flash Player Memory Corruption T-627: Adobe Flash Player Memory Corruption May 20, 2011 - 2:50pm Addthis PROBLEM: Adobe Flash Player Memory Corruption, Denial Of Service, Execute Code PLATFORM: Windows, Mac OS X, Linux, and Solaris ABSTRACT: Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file. reference LINKS: CVE Details - CVE-2011-0627 CVE Details - Adobe Flash Player Vulnerability Statistics CVE Details - Adobe Security Vulnerabilities IMPACT ASSESSMENT: High Discussion:

387

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

388

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

389

T-679: VMware Security Advisory - VMSA-2011-0010 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: VMware Security Advisory - VMSA-2011-0010 9: VMware Security Advisory - VMSA-2011-0010 T-679: VMware Security Advisory - VMSA-2011-0010 July 29, 2011 - 1:35pm Addthis PROBLEM: VMware ESX third party updates for Service Console packages glibc and dhcp PLATFORM: VMware Workstation, Player, ACE, Fusion ABSTRACT: The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process. Security Advisories & Certifications(VMSA-2011-0010) reference LINKS: CVE-2010-0296 CVE-2011-0536 CVE-2011-0997 CVE-2011-1071 CVE-2011-1095 IMPACT ASSESSMENT:

390

U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Windows win32k.sys Memory Corruption Vulnerability 5: Microsoft Windows win32k.sys Memory Corruption Vulnerability U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability December 20, 2011 - 9:45am Addthis PROBLEM: Microsoft Windows win32k.sys Memory Corruption Vulnerability. PLATFORM: Operating System Microsoft Windows 7 ABSTRACT: Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. reference LINKS: Secunia Advisory SA47237 MS11-087:Article ID: 2639417 IMPACT ASSESSMENT: High Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page

391

Energy Innovator Drops Costs for Titanium Metalwork | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Innovator Drops Costs for Titanium Metalwork Innovator Drops Costs for Titanium Metalwork Energy Innovator Drops Costs for Titanium Metalwork March 13, 2012 - 12:42pm Addthis Michael Hess Michael Hess Former Digital Communications Specialist, Office of Public Affairs What are the key facts? Iowa Powder Atomization Technology is one of 36 companies that licensed technology under an agreement with the National Lab as part of the America's Next Top Energy Innovator program. Titanium is the stuff aircrafts are made of, at least the important parts. It's an obvious material choice for aircraft engines and airframes with its high strength-to-weight ratio and resistance to corrosion. However, shaping the metal into complex shapes can be expensive. Using a heavier, easier-to-craft metal can be just as expensive because adding weight to an

392

T-544: Cisco Security Advisory: Cisco Content Services Gateway  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Security Advisory: Cisco Content Services Gateway 4: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities January 27, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities PLATFORM: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 ABSTRACT: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these

393

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

394

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

395

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

396

U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets 7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code November 16, 2011 - 7:43am Addthis PROBLEM: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Kernel version 2.6.x ABSTRACT: A remote server can cause the target connected client to crash. reference LINKS: The Linux Kernel Archives CVE-2011-4131 SecurityTracker Alert ID: 1026324 Linux Kernel [PATCH 1/1] NFSv4 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in the Linux Kernel. A remote user can cause denial of service conditions. Impact: A remote server can return specially crafted data to the connected target

397

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

398

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

399

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

400

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

T-628: Debian APR Library Security Update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

402

U-003:RPM Package Manager security update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

403

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

404

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

405

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

406

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

407

V-009: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

09: Adobe Shockwave Player Buffer Overflows and Array Error Lets 09: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code V-009: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code October 24, 2012 - 6:00am Addthis PROBLEM: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Shockwave Player 11.6.7.637 and earlier versions for Windows and Macintosh ABSTRACT: Several vulnerabilities were reported in Adobe Shockwave. REFERENCE LINKS: Adobe Security bulletin SecurityTracker Alert ID: 1027692 CVE-2012-4172 CVE-2012-4173 CVE-2012-4174 CVE-2012-4175 CVE-2012-4176 CVE-2012-5273 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on

408

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

409

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

410

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

411

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Broader source: Energy.gov (indexed) [DOE]

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

412

T-625: Opera Frameset Handling Memory Corruption Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Opera Frameset Handling Memory Corruption Vulnerability 5: Opera Frameset Handling Memory Corruption Vulnerability T-625: Opera Frameset Handling Memory Corruption Vulnerability May 18, 2011 - 3:05pm Addthis PROBLEM: A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system. PLATFORM: Opera versions prior to 11.11 ABSTRACT: The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page. reference LINKS: Secunia Advisory: SA44611 Opera Knowledge Base Opera 11.11 for Windows Opera Download Opera Mobile IMPACT ASSESSMENT: High Discussion: Framesets allow web pages to hold other pages inside them. Certain frameset constructs are not handled correctly when the page is unloaded, causing a

413

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

414

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

415

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Broader source: Energy.gov (indexed) [DOE]

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

416

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Broader source: Energy.gov (indexed) [DOE]

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

417

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

418

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

419

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

420

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Clean Cities Expands and Strengthens Nationwide Partnerships | Department  

Broader source: Energy.gov (indexed) [DOE]

Cities Expands and Strengthens Nationwide Partnerships Cities Expands and Strengthens Nationwide Partnerships Clean Cities Expands and Strengthens Nationwide Partnerships November 20, 2012 - 12:14pm Addthis Nearly 100 Clean Cities coalitions work to reduce petroleum use in communities across the country. Led by Clean Cities coordinators, coalitions are composed of businesses, fuel providers, vehicle fleets, state and local government agencies, and community organizations. These stakeholders come together to share information and resources, educate the public, help craft public policy, and collaborate on projects that reduce petroleum use. Click on a region for more information. Shannon Brescher Shea Communications Manager, Clean Cities Program What is Clean Cities? Clean Cities works to reduce U.S. reliance on petroleum in

422

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

423

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

424

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

425

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

426

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

427

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

428

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

429

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

430

T-679: VMware Security Advisory - VMSA-2011-0010 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: VMware Security Advisory - VMSA-2011-0010 9: VMware Security Advisory - VMSA-2011-0010 T-679: VMware Security Advisory - VMSA-2011-0010 July 29, 2011 - 1:35pm Addthis PROBLEM: VMware ESX third party updates for Service Console packages glibc and dhcp PLATFORM: VMware Workstation, Player, ACE, Fusion ABSTRACT: The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process. Security Advisories & Certifications(VMSA-2011-0010) reference LINKS: CVE-2010-0296 CVE-2011-0536 CVE-2011-0997 CVE-2011-1071 CVE-2011-1095 IMPACT ASSESSMENT:

431

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Broader source: Energy.gov (indexed) [DOE]

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

432

V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Google Picasa BMP and TIFF Images Processing Vulnerabilities 6: Google Picasa BMP and TIFF Images Processing Vulnerabilities V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities March 21, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been discovered in Google Picasa PLATFORM: Google Picasa Version 3.9.0 build 136.09 for Windows/3.9.14.34 for Mac ABSTRACT: Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system. REFERENCE LINKS: Secunia Advisory SA51652 Picasa Release Notes IMPACT ASSESSMENT: High DISCUSSION: 1) A sign extension error when processing the color table of a BMP image can be exploited to cause a heap-based buffer overflow via a BMP image with a specially crafted "biBitCount" field. 2) The application bundles a vulnerable version of LibTIFF.

433

T-544: Cisco Security Advisory: Cisco Content Services Gateway  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Security Advisory: Cisco Content Services Gateway 4: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities January 27, 2011 - 2:04pm Addthis PROBLEM: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities PLATFORM: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 ABSTRACT: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these

434

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

435

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5:Oracle Java SE Critical Patch Update Advisory 5:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

436

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

437

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

438

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets 45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger a heap corruption error in 'vidplin.dll' and execute arbitrary code on the target system. The code will run with the

439

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Broader source: Energy.gov (indexed) [DOE]

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

440

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

NU to partner in major defense research effort OCTOBER 11, 2012 2:45 PM BY KEVIN ABOUREZK /  

E-Print Network [OSTI]

Star Online 10/18/2012http://journalstar.com/news/local/education/nu-to research effort : The Lincoln Journal Star Online 10/18/2012http://journalstar.com/news/local/education/nu-to

Umstadter, Donald

442

PHOTO BY PAUL EFIRD From left, Jay Maurer, director of photography, Kevin O'Connor, host of DIY's "This  

E-Print Network [OSTI]

, 2010 East Tennessee is getting its share of green spotlight in a new series scheduled for launch processes, appliances (and) energy efficiency." DIY Network is owned by Scripps Networks. Scripps House" spent time filming a couple of very different types of energy efficient construction projects

443

UBC Social Ecological Economic Development Studies (SEEDS) Student Report Kevin Petersen, Kong Cheng, Mohammad Meysamifard, Johnny Xuan Jiang  

E-Print Network [OSTI]

is a gasoline powered vehicle. The primary stakeholder for this project, Collyn Chan, the sustainability by this report is that AMS Food and Beverage should replace their current gasoline powered food delivery vehicle with more environmentally friendly fully electric vehicles. #12;3 Table of Contents Section Page List

444

Tropical Cyclone Changes in the Western North Pacific in a Global Warming Scenario MARKUS STOWASSER, YUQING WANG, AND KEVIN HAMILTON  

E-Print Network [OSTI]

Tropical Cyclone Changes in the Western North Pacific in a Global Warming Scenario MARKUS STOWASSER The influence of global warming on the climatology of tropical cyclones in the western North Pacific basin Model version 2 (CCSM2) coupled global climate model. The regional model is first tested in 10 yr

Wang, Yuqing

445

Kevin Ferrigno, MS Candidate, Engineering Systems Bryan Palmintier, PhD Candidate, Engineering Systems Environment and Community Impacts:  

E-Print Network [OSTI]

spring of 2009 to assist in a study to aid the siting process for a potential small wind turbine on MITs campus. Meetings were held in the spring and summer and it was determined that only a few sites on campus were possible for a ground-based small wind turbine. These included the open areas of Briggs athletic fields as well as the green spaces near the Charles River. However, the space adjoining Memorial Drive and the Charles River fell on state-land and so the site consideration focused entirely on the athletic field. However, even within the field siting reflected a number of different concerns. Firstly, proximity to buildings posed a question due to 1) the negative potential impact on the communities using those spaces and 2) the positive benefit of being located near a structure where an electrical tie-in could be easily implemented. Secondly, use of the field by its current main stakeholder, MIT athletics, needed to be taken into account. Thirdly, the relative performance of the wind resource is an issue in a complex urban environment. Even over a small spatial distance, there can be substantial variation in the resource performance due to building and other structural interference. Given these concerns, a study that contrasted two potential sites was conducted. The two sites were

Kathy Araujo; Phd C; Urban Studies; Katherine Dykes; Phd C; Engineering Systems

2010-01-01T23:59:59.000Z

446

Inductive Principles for Restricted Boltzmann Machine Learning Benjamin M. Marlin, Kevin Swersky, Bo Chen and Nando de Freitas  

E-Print Network [OSTI]

question food msg water god jesus government jews power rights state war gun insurance medicine president program windows puck season shuttle technology bm w car dealer engine honda data disk drive m em ory

Marlin, Benjamin

447

Multidimensional Architectures for Functional Optical By Kevin A. Arpin, Agustin Mihi, Harley T. Johnson, Alfred J. Baca,  

E-Print Network [OSTI]

efficient solar cells, and unique sensors. Significant challenges remain including discovery of methods circuitry, enhancement of optical absorption processes in solar cells, and sensors.[1] Since the pioneering

Lewis, Jennifer

448

A review of "Reading, Society and Politics in Early Modern England." by Kevin Sharpe and S. N. Zwicker eds.  

E-Print Network [OSTI]

? (204). Part IV, ?Reading physiologies,? contains both Michael Schoenfeldt?s ?Reading bodies? and Adrian Johns? ?Reading and experiment in the early Royal Society.? In his essay, Schoenfeldt proposes ?to think about what was imagined to happen....00. Review by EUGENE R. CUNNAR, NEW MEXICO STATE UNIVERSITY. Stanton J. Linden, one of the leading authorities on alchemy and literature, has compiled an extremely useful anthology of primary readings from the history of alchemy. In the past, alchemy could...

Jeffrey Johnson

2004-01-01T23:59:59.000Z

449

Towards a Secure and Efficient System for End-to-End Provenance Patrick McDaniel, Kevin Butler,  

E-Print Network [OSTI]

information is invaluable in repairing failures, understanding application usage, and identify- ing, experiments, and results. Whether tracing sen- sor data from a pipeline or tracing dependencies between

Smith, Adam D.

450

A Research Code for Dynamic Power System Simulation and Analysis Steve Schaffer, Kevin Wedeward and Steven Ball  

E-Print Network [OSTI]

], and the object- oriented modeling language Modelica was chosen to create a library and graphically of states. This paper reports on the basic features and the various simulation and analysis tools that have access to simulation options, model components and analysis tools. The simulation can be used for both

Wedeward, Kevin

451

Amol Kane, Kevin Budhoo, and Prof. David Sinton (Supervising Professor) Department of Mechanical and Industrial Engineering, University of Toronto  

E-Print Network [OSTI]

the air to affect evaporation · The solution employs solar heated water in addition to an electric heat gas will be completely replaced with solar and electricity as the energy inputs to the humidifier Canada - Climate Change - Canada's GHG Emissions." Environment Canada - Environment Canada. N.p., n

452

Experience with an Object Reputation System for Peer-to-Peer Filesharing Kevin Walsh Emin Gun Sirer  

E-Print Network [OSTI]

, and indicates that much of this pollution can be attributed to deliberate attacks [14]. The underlying problem determine object authenticity, the degree to which an object's data matches its advertised description. Cre- dence allows clients to explicitly label files as authentic or polluted, and to compute reputation

Keinan, Alon

453

T-595: OpenSUSE aaabase-filename-privilege-escalation | Department of  

Broader source: Energy.gov (indexed) [DOE]

95: OpenSUSE aaabase-filename-privilege-escalation 95: OpenSUSE aaabase-filename-privilege-escalation T-595: OpenSUSE aaabase-filename-privilege-escalation April 5, 2011 - 5:54am Addthis PROBLEM: OpenSUSE aaa_base could allow a local attacker to gain elevated privileges on the system, caused by the improper handling of filenames when performing tab expansions. An attacker could exploit this vulnerability using specially-crafted named files to execute arbitrary commands on the system with elevated privileges. PLATFORM: The OpenSUSE aaa_base package before 11.3-8.9.1 in SUSE OpenSUSE 11.3, and before 11.4-54.62.1 in OpenSUSE 11.4 ABSTRACT: OpenSUSE contains a flaw related to aaa_base failing to properly handle filenames with meta characters during tab expansions. This may allow a context-dependent attacker to use a crafted filename to trick another user

454

E-Print Network 3.0 - air conditioning energy Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Geosciences 3 Energy Efficient Process Heating: Managing Air Flow Kevin Carpenter and Kelly Kissock Summary: Energy Efficient Process Heating: Managing Air Flow Kevin Carpenter...

455

E-Print Network 3.0 - afghan organizations Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Page: << < 1 2 3 4 5 > >> 1 Kevin McNamara, Purdue Advancing Afghan Agriculture Alliance, discusses wheat rust Summary: Kevin McNamara, Purdue Advancing Afghan Agriculture...

456

Sandia National Laboratories: Careers: Videos  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

YouTube Flickr RSS Careers Videos Car eer Profiles View All Jobs Bryn Bryn Mechanical Engineer Elaine Elaine Social Scientist Kevin Kevin Principal Investigator Donna Donna...

457

NASA Space Craft Contest -Artist Info -2D Original, Pg. 1 Information includes title of artwork, artist name and Etsy shop  

E-Print Network [OSTI]

ROBOTS Dylan Strzynski dylanS.etsy.com Orrery Alisha Gould alishagould.etsy.com Moon Tile Kelly Cook Cookstah.etsy.com Wayfinder - Light Reactive Painting Shayla Maddox shaylamaddox.etsy.com The Wonders Painting W. Brent Wear brentwear.etsy.com High Texture Embroidered Moon Rachel B. Hobson Rachel

458

Modeling and control for the reduction of wave induced motion of ramp-connected ships  

E-Print Network [OSTI]

Craft is a surface effect ship (SES) capable of functioningCraft is a surface effect ship (SES), which can alternately

Doblack, Joseph L.

2011-01-01T23:59:59.000Z

459

Organic-vapor-liquid-solid deposition with an impinging gas jet Daniel W. Shaw, Kevin Bufkin, Alexandr A. Baronov, Brad L. Johnson, and David L. Patrick  

E-Print Network [OSTI]

and David L. Patrick1,a) 1 Department of Chemistry, Western Washington University, 516 High St., Bellingham tetracene were deposited by sublimation into a flow of argon carrier gas directed at an indium

Patrick, David L.

460

The Development of Perennial Sunflower for Wildlife and Food Uses Mikey Kantar1, Kevin Betts1, Bob Stupar1, Brent Hulke2 & Don Wyse1  

E-Print Network [OSTI]

Appl Genet, 117: 1021-1029. Hu, F.Y, D.Y. Tao, E. Sacks, B.Y. Fu, P. Xu, J.Li, Y.Yang, K. McNally, G in Plant Sciences, 21(2): 59-91. DeHaan, L.R., D.L. Van Tassel, and T.S. Cox. 2005. Perennial grain crops: A synthesis of ecology and plant breeding. Renewable Agriculture and Food Systems, 20(1), 5-14. Ellis, JR

Weiblen, George D

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Carbide-Derived Nanoporous Carbon and Novel Core-Shell Xinqi Chen, Donald R. Cantrell, Kevin Kohlhaas, Sasha Stankovich, James A. Ibers,  

E-Print Network [OSTI]

of metal carbides by halogens. In this process, metal is extracted preferentially by the halogenCarbide-Derived Nanoporous Carbon and Novel Core-Shell Nanowires Xinqi Chen, Donald R. Cantrell, 2005. ReVised Manuscript ReceiVed NoVember 29, 2005 Carbide-derived carbon (CDC) nanowires (NWs) have

462

RESIDENTIAL WATER DEMAND MANAGEMENT: LESSONS FROM AURORA, COLORADO1 Douglas S. Kenney, Christopher Goemans, Roberta Klein, Jessica Lowrey, and Kevin Reidy2  

E-Print Network [OSTI]

(members of the NOAA-sponsored Western Water Assessment), University of Colorado, UCB 401, BoulderRESIDENTIAL WATER DEMAND MANAGEMENT: LESSONS FROM AURORA, COLORADO1 Douglas S. Kenney, Christopher). In this study of Aurora, Colorado, factors influencing residential water demand are reviewed during a turbulent

Colorado at Boulder, University of

463

MAMMALIAN SPECIES No. 667, pp. 13, 2 figs. Eumops maurus. By Troy L. Best, John L. Hunt, Lisa A. McWilliams, and Kevin G. Smith  

E-Print Network [OSTI]

Surinam (female, Rijksmuseum van Natuurlijke Historie 12943). Greatest length of cranium is 20.1 mm geijskesi Husson, 1962:246. Type locality ``Suriname, ex- act locality unknown.'' CONTEXT AND CONTENT. Order from Surinam have P3 (Eger 1977; Freeman 1981). The most conspicuous external feature of E. maurus

Hayssen, Virginia

464

UBC Social Ecological Economic Development Studies (SEEDS) Student Report Brandon Green, Jason Tam, Jeremy Jin, Kai Marder, Kevin Preston, Sam Eichenberger  

E-Print Network [OSTI]

UBC Social Ecological Economic Development Studies (SEEDS) Student Report Brandon Green, Jason Tam of sustainability, a concept embedded in the visions of UBC and UBCBG for greener buildings and infrastructure Research on Sustainability) Building. The system consists of the following: 1200 m2 roof to collect

465

Modern Methods of Monosaccharide Synthesis from Non-Carbohydrate Tomas Hudlicky,* David A. Entwistle, Kevin K. Pitzer, and Andrew J. Thorpe  

E-Print Network [OSTI]

and Tafel to consist of a mixture of carbo- hydrates, two of which were identified as DL-arabino- hexulose, and propagation. Figure 1. Fischer and Tafel's synthesis of nonracemic sugars from formose. Figure 2. The first

Hudlicky, Tomas

466

Bicyclists converge on Schenley Plaza on National Bike to Work Day, May 16. Kevin Sheehy of Parking, Transportation and Services estimated 60-70 bicycle commuters visited Schenley  

E-Print Network [OSTI]

, Transportation and Services estimated 60-70 bicycle commuters visited Schenley Plaza between 7-10 a.m. During that time, Pitt police registered 36 bicycles, Pitt's bicycle police inspected 36 bicycles and Oakland

Jiang, Huiqiang

467

Policy Flash 2014-28 Updated Class Deviation for FAR 52.209-5, Certifications Regarding Responsibility Matters  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov , or at (202) 287-1614.

468

Policy Flash 2013-48 OMB memorandum M-13-10, Antideficiency Act Implications of Certain Online Terms of Service Agreements  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov or at (202) 287-1614.

469

00 cover com_tech  

National Nuclear Security Administration (NNSA)

Nat. Wildl. Fed. Sci. and Tech. Series No. 12. * Harmata, A.R. 1991. Impacts of oil and gas development on raptors associated with Kevin Rim, Montana. Kevin Rim Raptor Study...

470

EDF Scheduling on Heterogeneous Multiprocessors Shelby Hyatt Funk  

E-Print Network [OSTI]

: Sanjoy K. Baruah, Advisor James Anderson, Reader Kevin Jeffay, Reader Jane W. S. Liu, Reader Montek Singh. In addition, I would like to thank my committee members Jim Anderson, Kevin Jeffay, Jane Liu, Montek Singh

Whitton, Mary C.

471

POlicy Flash 2013-60  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov, or at (202) 287-1614.

472

MA373 F12 Test 4-1.pdf  

E-Print Network [OSTI]

Kevin purchases a 3 year interest rate swap which allows him to swap a floating rate interest rate for a fixed interest rate on a loan. The swap provides that Kevin...

473

Policy Flash 2012-66 | Department of Energy  

Energy Savers [EERE]

or Template Changes Questions concerning this policy flash should be directed to Kevin Smith at (202) 287- 1614 or kevin.m.smith@hq.doe.gov (for Acquisition) or Ellen Colligan at...

474

Vehicle Technologies Office: Organization and Contacts | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Technology Managers Kevin Stork (kevin.stork@ee.doe.gov) Deployment Managers Dennis Smith (dennis.a.smith@ee.doe.gov) Linda Bluestein (linda.bluestein@ee.doe.gov) Shannon Shea...

475

TO: Procurement Directors/Contracting Officers FROM: Director  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

policy-flashes. Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov...

476

Policy Flash 2012-55 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

in STRIPES Questions concerning this policy flash should be directed to Kevin Smith at (202) 287- 1614 or kevin.m.smith@hq.doe.gov (for Acquisition) or Ellen Colligan at...

477

Policy Flash 2014-28 Updated Class Deviation for FAR 52.209-5...  

Energy Savers [EERE]

Matters Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov...

478

Policy Flash 2012-68 | Department of Energy  

Office of Environmental Management (EM)

is Policy Flash 2012-68 Political Activity Questions should be directed to Kevin Smith at (202) 287-1705 or kevin.m.smith@hq.doe.gov. Policy Flash 2012-68 Contractor...

479

TO: Procurement Directors FROM: Office of Procurement and Assistance...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

flashes.htm Questions relating to the Guide Chapter may be directed to Mr. Kevin M. Smith at (202) 287-1614, or kevin.m.smith@,hq.doe.gov. Michael P. Fischetti, Duector Office...

480

POlicy Flash 2013-60 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Flash 2013-60 Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov...

Note: This page contains sample records for the topic "addthis kevin craft" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Policy Flash 2013-48 OMB memorandum M-13-10, Antideficiency Act...  

Broader source: Energy.gov (indexed) [DOE]

Agreements Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov...

482

Policy Flash 2013-74 Quarterly Notification of the DOE's Differing...  

Broader source: Energy.gov (indexed) [DOE]

Opinion Process Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov...

483

Policy Flash 2013-47 Management and Security of Personally Identifiabl...  

Broader source: Energy.gov (indexed) [DOE]

Information Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov...

484

Biomedical Engineering  

E-Print Network [OSTI]

#12;Biomedical Engineering Dr. Kevin Lear, Director, Undergraduate Program Ms. Brett Eppich Beal Professor of Biomedical Sciences Associate Director ­ Kevin Lear Professor of Electrical & Computer Scott ­ Director, Regulatory Affairs Interdisciplinary Program #12;Biomedical Engineering at CSU

485

Enhancing Railroad Hazardous Materials Transportation Safety...  

Office of Environmental Management (EM)

Enhancing Railroad Hazardous Materials Transportation Safety Enhancing Railroad Hazardous Materials Transportation Safety Presented by Kevin R. Blackwell, Radioactive Materials...

486

E-Print Network 3.0 - accelerated type biological Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems biology applications... acceleration. Index Terms--Biological Systems, Simulation, ... Source: Skadron, Kevin - Department of Computer Science, University of Virginia...

487

E-Print Network 3.0 - acceleration type biological Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems biology applications... acceleration. Index Terms--Biological Systems, Simulation, ... Source: Skadron, Kevin - Department of Computer Science, University of Virginia...

488

http://nyti.ms/113BSkJ Lightning Might Strike More in a Warmer World  

E-Print Network [OSTI]

that helps to break down methane, a powerful greenhouse gas that contributes to global warming. Kevin E

Romps, David M.

489

E-Print Network 3.0 - angustula hymenoptera apidae Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hymenoptera. Because of their haplodiploid genetics (females are diploid, ... Source: Foster, Kevin - Department of Zoology, University of Oxford Collection: Environmental...

490

Enhancing Railroad Hazardous Materials Transportation Safety Rail Routing  

Broader source: Energy.gov [DOE]

Presentation made by Kevin Blackwell for the NTSF annual meeting held from May 14-16, 2013 in Buffalo, NY

491

PHYSICS (Ph.D.) Executive Officer: Professor Steven Greenbaum  

E-Print Network [OSTI]

. Lubell n Marcello Lucia n Kevin R. Lynch n Neepa Tatyana Maitra n Hernan A. Makse n Joseph Malinsky n

Dennehy, John

492

ARTICLE doi:10.1038/nature11922 Mutations in prion-like domains in  

E-Print Network [OSTI]

, Anderson P. Kanagaraj1 , Robert Carter5 , Kevin B. Boylan6 , Aleksandra M. Wojtas6 , Rosa Rademakers6

Shorter, James

493

Electrolytes - Advanced Electrolyte and Electrolyte Additives  

Broader source: Energy.gov (indexed) [DOE]

collaborations * Enerdel , A123 , JCSaft * Central Glass * Grant Smith, University of Utah * Kevin Gering, INEL Partners Overview An integrated...

494

EA-1886: Draft Environmental Assessment  

Broader source: Energy.gov [DOE]

Big Sky Regional Carbon Sequestration Partnership - Phase III: Kevin Dome Carbon Storage Project, Shelby, Toole County, MT

495

Changes in electrical and microstructural properties of microcrystalline cellulose as function  

E-Print Network [OSTI]

of carbonization temperature Yo-Rhin Rhim a , Dajie Zhang b , D. Howard Fairbrother c , Kevin A. Wepasnick c

Bodnar, Robert J.

496

Electrolytes - Advanced Electrolyte and Electrolyte Additives  

Broader source: Energy.gov (indexed) [DOE]

Bedrov, University of Utah * Kevin Gering, INEL * Oleg Borodin, ARL * Enerdel * JSaft Partners Overview Integrated theoreticalexperimental program to develop additives...

497

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

2: ISC BIND Packet Processing Flaw Lets Remote Users Deny 2: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service July 6, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions. PLATFORM: 9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0, 9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2, 9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2, 9.8.0-P3, 9.8.1b1 ABSTRACT: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured

498

U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

7: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users 7: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service May 11, 2012 - 7:00am Addthis PROBLEM: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service PLATFORM: Prior to versions 0.9.8x, 1.0.0j, 1.0.1c ABSTRACT: A vulnerability was reported in OpenSSL. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1027057 CVE-2012-2333 OpenSSL Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted TLS/DTLS records to cause denial of service conditions. The CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS are affected, both clients and servers are affected. DTLS is affected in all versions of OpenSSL. TLS is affected in OpenSSL

499

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

500

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.