Powered by Deep Web Technologies
Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Energy Citations Database (ECD) - Alerts Log On  

Office of Scientific and Technical Information (OSTI)

ECD Alerts Log On You must Log On to use the ECD Alerts. Alerts provide users with e-mail notification of updates to the ECD in specific areas of interest. If you wish to receive...

2

Energy Citations Database (ECD) - Alerts Log On  

Office of Scientific and Technical Information (OSTI)

ECD Alerts Log On Alerts provide users with e-mail notification of updates to the ECD in specific areas of interest. If you wish to receive an Alert and are not registered, please...

3

Synthetic environment employing a craft for providing user perspective reference  

DOE Patents (OSTI)

A multi-dimensional user oriented synthetic environment system allows application programs to be programmed and accessed with input/output device independent, generic functional commands which are a distillation of the actual functions performed by any application program. A shared memory structure allows the translation of device specific commands to device independent, generic functional commands. Complete flexibility of the mapping of synthetic environment data to the user is thereby allowed. Accordingly, synthetic environment data may be provided to the user on parallel user information processing channels allowing the subcognitive mind to act as a filter, eliminating irrelevant information and allowing the processing of increase amounts of data by the user. The user is further provided with a craft surrounding the user within the synthetic environment, which craft, imparts important visual referential an motion parallax cues, enabling the user to better appreciate distances and directions within the synthetic environment. Display of this craft in close proximity to the user's point of perspective may be accomplished without substantially degrading the image resolution of the displayed portions of the synthetic environment.

Maples, Creve (Albuquerque, NM); Peterson, Craig A. (Albuquerque, NM)

1997-10-21T23:59:59.000Z

4

A KNOWLEDGE BASED SYSTEM FOR PROVIDING INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE  

E-Print Network (OSTI)

INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE Steven

Rosenberg, Steven

2011-01-01T23:59:59.000Z

5

Method and system for providing work machine multi-functional user interface  

DOE Patents (OSTI)

A method is performed to provide a multi-functional user interface on a work machine for displaying suggested corrective action. The process includes receiving status information associated with the work machine and analyzing the status information to determine an abnormal condition. The process also includes displaying a warning message on the display device indicating the abnormal condition and determining one or more corrective actions to handle the abnormal condition. Further, the process includes determining an appropriate corrective action among the one or more corrective actions and displaying a recommendation message on the display device reflecting the appropriate corrective action. The process may also include displaying a list including the remaining one or more corrective actions on the display device to provide alternative actions to an operator.

Hoff, Brian D. (Peoria, IL); Akasam, Sivaprasad (Peoria, IL); Baker, Thomas M. (Peoria, IL)

2007-07-10T23:59:59.000Z

6

Energy Citations Database (ECD) - Alerts Registration  

Office of Scientific and Technical Information (OSTI)

Registration Registration To be able to receive alerts from the ECD, please fill in and submit an Alerts Registration. Please note that passwords expire 6 months after registration. At this time you will be required to change your password in order to continue to receive Alert notification(s). After submitting an Alerts Registration, you will receive an e-mail indicating that the Alerts Registration has been successfully submitted and received. This e-mail will also provide instructions for confirming your e-mail address. After you have confirmed your e-mail address, you will be able to make an Alert Request. If you have previously registered, you may Log On. Please remember your E-mail Address and Password for future use. E-mail Address Password** Repeat Password** Submit Registration Clear Registration

7

TIAA: A Visual Toolkit for Intrusion Alert Analysis  

Science Conference Proceedings (OSTI)

This paper presents the development of TIAA, a visual toolkit for intrusion alert analysis. TIAA is developed to provide an interactive platform for analyzing potentially large sets of intrusion alerts reported by heterogeneous intrusion detection systems ...

Ning, P

2003-03-01T23:59:59.000Z

8

EVADER: Electric Vehicle Alert for Detection and Emergency Response  

E-Print Network (OSTI)

EVADER: Electric Vehicle Alert for Detection and Emergency Response F. Duboisa , G. Baudeta and J effect of vehicle exterior noise for vulnerable users has recently emerged. Quieter cars could reduce pedestrians' ability to travel safely. One of the objectives of the EVADER (Electric Vehicle Alert

Paris-Sud XI, Université de

9

Information Bridge: DOE Scientific and Technical Information - Alerts  

Office of Scientific and Technical Information (OSTI)

Alerts Registration Alerts Registration To be able to receive alerts from the Information Bridge:DOE Scientific and Technical Information, please fill in and submit an Alerts Registration. Please note that passwords expire 6 months after registration. At this time you will be required to change your password in order to continue to receive Alert notification(s). After submitting an Alerts Registration, you will receive an e-mail indicating that the Alerts Registration has been successfully submitted and received. This e-mail will also provide instructions for confirming your e-mail address. After you have confirmed your e-mail address, you will be able to make an Alert Request. If you have previously registered, you may Log On. Please remember your E-mail Address and Password for future use.

10

Efficient Monitoring Algorithm for Fast News Alerts  

Science Conference Proceedings (OSTI)

Recently, there has been a dramatic increase in the use of XML data to deliver information over the Web. Personal Weblogs, news Web sites, and discussion forums are now publishing RSS feeds for their subscribers to retrieve new postings. As the popularity ... Keywords: Information search and retrieval, online information services, performance evaluation, user profiles, alert services.

Ka Cheung Sia; Junghoo Cho; Hyun-Kyu Cho

2007-07-01T23:59:59.000Z

11

SOAJ Search : User Login  

Office of Scientific and Technical Information (OSTI)

Login Login The SOAJ Search ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

12

Science Accelerator : User Login  

NLE Websites -- All DOE Office Websites (Extended Search)

Login Login The Science Accelerator ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

13

Changing Uses of Climate Predictions in Agriculture: Implications for Prediction Research, Providers, and Users  

Science Conference Proceedings (OSTI)

A series of seven studies of the usage of climate predictions by U.S. agribusinesses were conducted during 1981–2001, and their results have been reviewed to identify information to guide future predictive research, providers of predictions, and ...

Stanley A. Changnon

2004-06-01T23:59:59.000Z

14

Improving DOE-2's RESYS routine: User defined functions to provide more accurate part load energy use and humidity predictions  

SciTech Connect

In hourly energy simulations, it is important to properly predict the performance of air conditioning systems over a range of full and part load operating conditions. An important component of these calculations is to properly consider the performance of the cycling air conditioner and how it interacts with the building. This paper presents improved approaches to properly account for the part load performance of residential and light commercial air conditioning systems in DOE-2. First, more accurate correlations are given to predict the degradation of system efficiency at part load conditions. In addition, a user-defined function for RESYS is developed that provides improved predictions of air conditioner sensible and latent capacity at part load conditions. The user function also provides more accurate predictions of space humidity by adding ''lumped'' moisture capacitance into the calculations. The improved cooling coil model and the addition of moisture capacitance predicts humidity swings that are more representative of the performance observed in real buildings.

Henderson, Hugh I.; Parker, Danny; Huang, Yu J.

2000-08-04T23:59:59.000Z

15

Second Line of Defense: Electronic Maintenance Reports, Local Maintenance Provider User Guide, Rev. 3  

Science Conference Proceedings (OSTI)

The Electronic Maintenance Report forms allow Local Maintenance Providers (LMP) and other program staff to enter maintenance information into a simple and secure system. This document describes the features and information required to complete the Maintenance Report forms. It is expected that all Corrective Maintenance Reports from LMPs will be submitted electronically into the SLD Portal. As an exception (e.g., when access to the SLD Portal is unavailable), Maintenance Reports can be submitted via a secure Adobe PDF form available through the Sustainability Manager assigned to each country.

Leigh, Richard J.

2012-09-01T23:59:59.000Z

16

Energy Citations Database (ECD) - Alerts Help  

Office of Scientific and Technical Information (OSTI)

Help Help Alerts Registration - Receiving Alerts - Renewing your registration Alerts Log On Changing E-mail Address ECD Alerts Contact Us Managing your Alerts - Requesting an Alert or revising an Alert request - Canceling all Alerts and your registration - Summary of your Alerts - Weekly Alert notification - Not receiving an Alert? - Excessive Alerts ECD Alerts FAQ Passwords - Password requirements - Changing your password - Forgot your password? ECD Help ECD FAQs OSTI FAQs Alerts Registration Receiving Alerts In order to receive Alerts, you must register. Enter your e-mail address, a password, and repeat the password. Passwords must meet requirements. After submitting an Alerts Registration, you will receive an e-mail indicating that your Alerts Registration has been successfully submitted

17

Alert Service Sends International Research to Public Desktops | OSTI, US  

Office of Scientific and Technical Information (OSTI)

Alert Service Sends International Research to Public Desktops Alert Service Sends International Research to Public Desktops NEWS MEDIA CONTACT: Cathey Daniels, (865) 576-9539 FOR IMMEDIATE RELEASE April 4, 2006 Alert Service Sends International Research to Public Desktops Oak Ridge, TN - Citizens can set up a free e-mail alert account and receive information on a wide variety of energy-related research through a new U.S. Department of Energy (DOE) developed service. Users can target information of interest, and then choose whether to receive updates on a weekly, biweekly, monthly, quarterly or annual basis. Registration is required. The alert service can be accessed through ETDEWEB or Energy Technology Data Exchange World Energy Base. Information is available from 16 ETDE member countries plus other international partners, including research on energy

18

EERE News: EERE Progress Alerts http://www1.eere.energy.gov/news/progress_alerts/progress_alert.asp... 1 of 1 4/3/07 12:29 PM  

E-Print Network (OSTI)

EERE News: EERE Progress Alerts http://www1.eere.energy.gov/news/progress_alerts/progress_alert.asp... 1 of 1 4/3/07 12:29 PM Search Help More Search Options EERE Information Center Printable Version New Industrial Technologies Program within EERE, are run by 26 universities and provide no-cost energy

Washington at Seattle, University of

19

PNNL: EDO - SBIR Alerting Service Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

SBIR Alerting Service Back Issues SBIR Alerting Service Back Issues NOTICE - This service has been discontinued, effective October 1, 2013. Federal R&D funding is available through the Small Business Innovative Research and Small Business Technology Research (SBIR/STTR) Programs. The SBIR/STTR Alerting Service was a free service that provided bi-weekly notification of SBIR and STTR solicitation announcements, news and information, and Internet resources relevant to the SBIR/STTR programs. This service was provided by the Economic Development Office of Pacific Northwest National Laboratory (PNNL). To receive tips on SBIR/STTR proposals and project execution from the Greenwood Consulting Group, send an email to: gail-jim@g-jgreenwood.com with "subscribe" in the subject line.

20

An open meteorological alerting system: issues and solutions  

Science Conference Proceedings (OSTI)

This paper describes an experimental alerting system under development by the Australian Bureau of Meteorology, initially targetted at (but not restricted to) the aviation sector. The system provides alert routing and filtering: for example pressure ... Keywords: artificial intelligence, distributed systems, real-time systems, software engineering

Ian Mathieson; Sandy Dance; Lin Padgham; Malcolm Gorman; Michael Winikoff

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Improving DOE-2's RESYS routine: User defined functions to provide more accurate part load energy use and humidity predictions  

E-Print Network (OSTI)

Hirsch & Associates. 1993. DOE-2 SUPPLEMENT, VERSION 2.1e.LBL34947. November DOE 1979. Test procedures for central airin the Proceedings. Improving DOE-2's RESYS Routine: User

Henderson, Hugh I.; Parker, Danny; Huang, Yu J.

2000-01-01T23:59:59.000Z

22

Energy Citations Database (ECD) - Alerts FAQ  

Office of Scientific and Technical Information (OSTI)

Frequently Asked Questions (FAQs) Frequently Asked Questions (FAQs) What is an ECD Alert? Is there a charge for receiving Alerts? How do I register to receive an Alert? and how do I renew my registration? How do I request, revise, or cancel an Alert? How often will I receive an Alert? Where can I find a summary of my Alerts? And how long is my summary available? What do I do if I do not receive an Alert that I am expecting? What are the password requirements to receive Alerts? What do I do if I have forgotten my Alerts password? How do I change my Alerts password? How do I change my Alerts e-mail address? How do I cancel my registration for Alerts? How do I get help with ECD Alerts? How do I get help with ECD? What other databases/products/services are available from DOE's Office of Scientific and Technical Information (OSTI)?

23

Efficient resource allocation for optimizing objectives of cloud users, IaaS provider and SaaS provider in cloud environment  

Science Conference Proceedings (OSTI)

The cloud architecture is usually composed of several XaaS layers--including Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). The paper studies efficient resource allocation to optimize objectives of ... Keywords: Cloud computing, IaaS provider, Resource allocation, SaaS provider

Chunlin Li; Layuan Li

2013-08-01T23:59:59.000Z

24

Method and apparatus for extraction of low-frequency artifacts from brain waves for alertness detection  

DOE Patents (OSTI)

Methods and apparatus automatically detect alertness in humans by monitoring and analyzing brain wave signals. Steps include: acquiring the brain wave (EEG or MEG) data from the subject, digitizing the data, separating artifact data from raw data, and comparing trends in f-data to alertness indicators, providing notification of inadequate alertness.

Clapp, Ned E. (Knoxville, TN); Hively, Lee M. (Knoxville, TN)

1997-01-01T23:59:59.000Z

25

The use of social media within the global disaster alert and coordination system (GDACS)  

Science Conference Proceedings (OSTI)

The Global Disaster Alert and Coordination System (GDACS) collects near real-time hazard information to provide global multi-hazard disaster alerting for earthquakes, tsunamis, tropical cyclones, floods and volcanoes. GDACS alerts are based on calculations ... Keywords: disaster management, emergency response, impact analysis, social media, twitter

Beate Stollberg; Tom de Groeve

2012-04-01T23:59:59.000Z

26

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

27

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

28

Method and apparatus for extraction of low-frequency artifacts from brain waves for alertness detection  

DOE Patents (OSTI)

Methods and apparatus automatically detect alertness in humans by monitoring and analyzing brain wave signals. Steps include: acquiring the brain wave (EEG or MEG) data from the subject, digitizing the data, separating artifact data from raw data, and comparing trends in f-data to alertness indicators, providing notification of inadequate alertness. 4 figs.

Clapp, N.E.; Hively, L.M.

1997-05-06T23:59:59.000Z

29

Federal Technology Alert: Ground-Source Heat Pumps Applied to Federal Facilities--Second Edition  

SciTech Connect

This Federal Technology Alert, which was sponsored by the U.S. Department of Energy's Office of Federal Energy Management Programs, provides the detailed information and procedures that a Federal energy manager needs to evaluate most ground-source heat pump applications. This report updates an earlier report on ground-source heat pumps that was published in September 1995. In the current report, general benefits of this technology to the Federal sector are described, as are ground-source heat pump operation, system types, design variations, energy savings, and other benefits. In addition, information on current manufacturers, technology users, and references for further reading are provided.

Hadley, Donald L.

2001-03-01T23:59:59.000Z

30

E-print Network Alerts -- Energy, science, and technology for the research  

Office of Scientific and Technical Information (OSTI)

E-print Alerts E-print Alerts Login User Name: Enter User Name Password: Forgot username or password? Login The E-print Alerts feature is a service that will automatically notify you when new e-print information is available in your specific areas of interest. Simply register for the service and then create a search strategy, which will be matched automatically against each new weekly update. Patrons will receive the results of the alert via e-mail. If you are a NEW PATRON, learn how to set up E-print Alerts to meet your needs. If you are an existing patron, enter your user name and password in the box on the right, then press the login button. You may review or modify your search, add a new search, and see search results. Some links on this page may take you to non-federal websites. Their

31

E-print Network : User Account  

Office of Scientific and Technical Information (OSTI)

New Search | My Selections (0) | | | | Alerts | E-print Network Create User Account User Name: Email Address: I want to: Always receive emails Receive emails if there are new...

32

Prospective Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Prospective Users Prospective Users Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

33

Science Open Access Journals - Alerts Help  

Office of Scientific and Technical Information (OSTI)

SOAJ Alerts Fast Facts SOAJ Alerts Fast Facts You can easily create an alert right from the results page. Alerts run automatically, based on the schedule you choose. New relevantly ranked results are automatically sent to you through email or an individual or shared RSS/ATOM feed. There is no limit to the number of alerts you can create. Up to 6 previous sets of alert results may be accessed, with permanent links to the sources where possible. Selected results can be emailed, printed, or downloaded into a citation manager such as EndNote, RefWorks or Bib Tex. Alerts Help Alerts will make your recurring searches even easier by automating your search and sending you the results on a regular basis. To receive alerts on your topic(s) of interest, simply create an Alerts account, specify your

34

Prospective Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Prospective Users Print Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

35

Vital Alert's C1000 mine and tunnel radios use magnetic induction...  

NLE Websites -- All DOE Office Websites (Extended Search)

Vital Alert's C1000 mine and tunnel radios use magnetic induction, advanced digital communications techniques and ultra-low frequency transmission to wirelessly provide...

36

Information Bridge: DOE Scientific and Technical Information - Alerts  

Office of Scientific and Technical Information (OSTI)

Help Help Alerts Registration - Receiving Alerts - Renewing your registration Alerts Log On Changing E-mail Address IB Alerts Comments Managing your Alerts - Requesting an Alert or revising an Alert request - Canceling all Alerts and your registration - Summary of your Alerts - Weekly Alert notification - Not receiving an Alert? - Excessive Alerts IB Alerts FAQ Passwords - Password requirements - Changing your password - Forgot your password? IB Help IB FAQs OSTI FAQs Alerts Registration Receiving Alerts In order to receive Alerts, you must register. Enter your e-mail address, a password, and repeat the password. Passwords must meet requirements. After submitting an Alerts Registration, you will receive an e-mail indicating that your Alerts Registration has been successfully submitted

37

ADVISORY ALERT: Dekker, Ltd. Digital Signature - PARS II Reporting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ADVISORY ALERT: Dekker, Ltd. Digital Signature - PARS II Reporting ADVISORY ALERT: Dekker, Ltd. Digital Signature - PARS II Reporting As you know, to run reports in the PARS II, users must install an active X control to their workstations. The FIRST TIME a user attempts to run a report after installing the Active X control, a Security Warning will appear stating: That warning appears because, although the digital signature is valid, the digital signature is from a publisher (in this case Dekker, Ltd.) whom you have not yet chosen to trust. The following steps instruct you how to clear the security warning so that you may continue working with PARS II reports. Please note: Once you complete the process of accepting the Dekker, LTd. digital signature, this warning will not re-appear. This process must be done ONCE to "inform" your PC that Dekker, LTd. is an

38

Alert correlation using artificial immune recognition system  

Science Conference Proceedings (OSTI)

High volumes of low-level alerts that are generated by intrusion detection systems (IDSs) are serious obstacle for using them effectively. These high volumes of alerts overwhelm system administrators in such a way that they cannot manage and ...

Mehdi Bateni; Ahmad Baraani; Ali Ghorbani

2012-06-01T23:59:59.000Z

39

Alert correlation survey: framework and techniques  

Science Conference Proceedings (OSTI)

Managing raw alerts generated by various sensors are becoming of more significance to intrusion detection systems as more sensors with different capabilities are distributed spatially in the network. Alert Correlation addresses this issue by reducing, ...

Reza Sadoddin; Ali Ghorbani

2006-10-01T23:59:59.000Z

40

Alerts for Healthcare Process and Data Integration  

Science Conference Proceedings (OSTI)

In healthcare chain workflow management, urgent requests and critical messages in these systems (referred to as alerts) have to be delivered and handled timely. Presently, most systems cannot address urgency and alerts are often handled in an ad-hoc ...

Dickson K. W. Chiu; Benny W. C. Kwok; Ray L. S. Wong; S. C. Cheung; Eleanna Kafeza; Marina Kafeza

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Energy Citations Database (ECD) - Alerts Comments  

Office of Scientific and Technical Information (OSTI)

Alerts Comments If you have a question about Energy Citations Database Alerts, we recommend you check frequently asked questions. If your question still has not been answered or if...

42

National Library of Energy : User Login  

Office of Scientific and Technical Information (OSTI)

Login Login The National Library of Energy ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts

43

E-print Network : User Login  

Office of Scientific and Technical Information (OSTI)

New Search | New Search | My Selections (0) | | | | Alerts | E-print Network Login The E-print Network ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register!

44

Techniques and tools for analyzing intrusion alerts  

Science Conference Proceedings (OSTI)

Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts ... Keywords: Intrusion detection, alert correlation, security management

Peng Ning; Yun Cui; Douglas S. Reeves; Dingbang Xu

2004-05-01T23:59:59.000Z

45

Improving DOE-2's RESYS routine: User defined functions to provide more accurate part load energy use and humidity predictions  

SciTech Connect

In hourly energy simulations, it is important to properly predict the performance of air conditioning systems over a range of full and part load operating conditions. An important component of these calculations is to properly consider the performance of the cycling air conditioner and how it interacts with the building. This paper presents improved approaches to properly account for the part load performance of residential and light commercial air conditioning systems in DOE-2. First, more accurate correlations are given to predict the degradation of system efficiency at part load conditions. In addition, a user-defined function for RESYS is developed that provides improved predictions of air conditioner sensible and latent capacity at part load conditions. The user function also provides more accurate predictions of space humidity by adding ''lumped'' moisture capacitance into the calculations. The improved cooling coil model and the addition of moisture capacitance predicts humidity swings that are more representative of the performance observed in real buildings.

Henderson, Hugh I.; Parker, Danny; Huang, Yu J.

2000-08-04T23:59:59.000Z

46

ALS Users' Association Charter  

NLE Websites -- All DOE Office Websites (Extended Search)

Users' Executive Committee ALS Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the...

47

Hanford Site Emergency Alerting System siren testing report  

Science Conference Proceedings (OSTI)

The purpose of the test was to determine the effective coverage of the proposed upgrades to the existing Hanford Site Emergency Alerting System (HSEAS). The upgrades are to enhance the existing HSEAS along the Columbia River from the Vernita Bridge to the White Bluffs Boat Launch as well as install a new alerting system in the 400 Area on the Hanford Site. Five siren sites along the Columbia River and two sites in the 400 Area were tested to determine the site locations that will provide the desired coverage.

Weidner, L.B.

1997-08-13T23:59:59.000Z

48

Improving the Quality of Alerts and Predicting Intruder's Next Goal with Hidden Colored Petri-Net  

SciTech Connect

Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next likely goal. In this paper, we propose a novel approach to alert post-processing and correlation, the Hidden Colored Petri-Net (HCPN). Different from most other alert correlation methods, our approach treats the alert correlation problem as an inference problem rather than a filter problem. Our approach assumes that the intruder’s actions are unknown to the IDS and can be inferred only from the alerts generated by the IDS sensors. HCPN can describe the relationship between different steps carried out by intruders, model observations (alerts) and transitions (actions) separately, and associate each token element (system state) with a probability (or confidence). The model is an extension to Colored Petri-Net (CPN) .It is so called “hidden” because the transitions (actions) are not directly observable but can be inferred by looking through the observations (alerts). These features make HCPN especially suitable for discovering intruders’ actions from their partial observations (alerts,) and predicting intruders’ next goal. Our experiments on DARPA evaluation datasets and the attack scenarios from the Grand Challenge Problem (GCP) show that HCPN has promise as a way to reducing false positives and negatives, predicting intruder’s next possible action, uncovering intruders’ intrusion strategies after the attack scenario has happened, and providing confidence scores.

Yu, Dong; Frincke, Deb A.

2006-06-22T23:59:59.000Z

49

Secure Safe - Personnel Alerting Device - Available ...  

PNNL’s Secure Safe device strengthens your security methods and protects your corporate assets by alerting you with an audible alarm if you begin to ...

50

Information Bridge: DOE Scientific and Technical Information - Alerts FAQ  

Office of Scientific and Technical Information (OSTI)

Frequently Asked Questions (FAQs) Frequently Asked Questions (FAQs) What is an Information Bridge (IB) Alert? Is there a charge for receiving Alerts? How do I register to receive an Alert? and how do I renew my registration? How do I request, revise, or cancel an Alert? How often will I receive an Alert? Where can I find a summary of my Alerts? And how long is my summary available? What do I do if I do not receive an Alert that I am expecting? What are the password requirements to receive Alerts? What do I do if I have forgotten my Alerts password? How do I change my Alerts password? How do I change my Alerts e-mail address? How do I cancel my registration for Alerts? How do I get help with IB Alerts? How do I get help with IB? What other databases/products are available from DOE's Office of

51

Stability of alert survivable forces during reductions  

Science Conference Proceedings (OSTI)

The stability of current and projected strategic forces are discussed within a framework that contains elements of current US and Russian analyses. For current force levels and high alert, stability levels are high, as are the levels of potential strikes, due to the large forces deployed. As force levels drop towards those of current value target sets, the analysis becomes linear, concern shifts from stability to reconstitution, and survivable forces drop out. Adverse marginal costs generally provide disincentives for the reduction of vulnerable weapons, but the exchange of vulnerable for survivable weapons could reduce cost while increasing stability even for aggressive participants. Exchanges between effective vulnerable and survivable missile forces are studied with an aggregated, probabilistic model, which optimizes each sides` first and determines each sides` second strikes and costs by minimizing first strike costs.

Canavan, G.H.

1998-01-01T23:59:59.000Z

52

User Obligations  

NLE Websites -- All DOE Office Websites (Extended Search)

User Obligations User Obligations Summary of what APS expects of users in return for access to the facility. Registration Register with the APS as far in advance of your initial visit as possible (even when you are simply planning an experiment). User Agreement Ensure that a User Agreement is in place between the APS and your home institution. Training Ensure that you complete all required training before conducting hands-on work at the APS. Safety Assessement Complete Experiment Safety Assessment Forms. End of Experiment Form Complete End of Experiment form to provide feedback (required for General Users, optional for others). Published Reports of Work Carried Out at the APS As an APS user, you are required to notify both the APS and your host beamline staff of all work published in the open literature (including

53

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

54

E-print Network Alerts Help -- Energy, science, and technology for the  

Office of Scientific and Technical Information (OSTI)

Alerts Help Alerts Help Alerts will make your recurring searches even easier by automating your search and sending you the results on a regular basis. To receive alerts on your topic(s) of interest, simply create an Alerts account, specify your alert parameters and check your email. For additional information, please choose from one of the below help topics. Alerts Help Topics: Creating an Alerts account Alerts Homepage Create an alert Creating an alert from your search Receiving alerts Viewing alerts Selecting printing, emailing, and exporting alerts Storing alerts Modifying alerts Deleting an alert Alerts Search Tips E-print Network Alerts Fast Facts You can easily create an alert right from the results page. Alerts run automatically, based on the schedule you choose. New relevantly ranked results are automatically sent to you through

55

User Information | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

User Information The Advanced Photon Source provides a variety of guides, resources, and information for prospective, new, and current users. In this section: For Prospective Users...

56

E-print Network Alert Service  

Office of Scientific and Technical Information (OSTI)

E-print Web Log E-print Web Log alert image About Search Browse by Discipline Find Scientific Societies Receive E-print Alerts Contact Us Help Home Site Map OSTI DOE Welcome to E-print Alerts! This feature can be used to automatically keep abreast of the latest e-prints posted on ArXiv databases as well as a number of other science and engineering databases and Web sites, based on a search profile you submit to us. You can even receive new postings from a number of sites by submitting a single profile based on your specific area of interest. The Service is free, and you can create as many profiles as you wish. Simply register for the Service and create your search strategies for your profiles. This will be run against all selected databases and Web sites, and you will receive a weekly Alert via e-mail with the results of your automatic profile search.

57

Alert-Driven E-Service Management  

Science Conference Proceedings (OSTI)

Process management technology has recently been employed not only within businesses but also in provision of E-services over the Internet. Urgent requests and critical messages in these systems (referred to as alerts) should be delivered and handled ...

Dickson K. W. Chiu; Benny W. C. Kwok; Ray L. S. Wong; S. C. Cheung; Eleanna Kafeza

2004-01-01T23:59:59.000Z

58

Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment  

Science Conference Proceedings (OSTI)

With the growing deployment of host and network intrusion detection systems, managing alerts from these systems becomes critically important. A promising approach is to develop a cooperation module between several IDS to achieve alerts correlation and ... Keywords: alert correlation, prerequisites and consequences, hyper-alert type, vulnerability tuple

Wen Long; Yang Xin; Yixian Yang

2009-07-01T23:59:59.000Z

59

STANDARD USER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

USER. CONTRACTOR is not obligated to continue to provide USER access to andor use of the User Facility unless it is holding an adequate advance. Upon completion of the project...

60

V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote 10: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions October 25, 2012 - 6:00am Addthis PROBLEM: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions PLATFORM: 3COM, and H3C Routers & Switches Specific products and model numbers is provided in the vendor's advisory. ABSTRACT: A vulnerability was reported in 3Com, HP, and H3C Switches. REFERENCE LINKS: HP Support document ID: c03515685 SecurityTracker Alert ID: 1027694 CVE-2012-3268 IMPACT ASSESSMENT: High DISCUSSION: A remote user with knowledge of the SNMP public community string can access potentially sensitive data (e.g., user names, passwords) in the

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

User_ApproveTrainingRequest  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Approving User Training Requests Approving User Training Requests © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Approving User Training Requests Purpose The purpose of this job aid is to guide users through the step-by-step process of approving a user training request. Task A. Approve a User Training Request From the Home Page, click the You have pending approval requests link in the Alerts box. The Pending Reviews and Approvals page displays and defaults open to the pending approval. Click the expand icon ( ) next to the user's name and/or click the Title link for additional information on the request. Select the Enter Reasons for Approvals or Denials checkbox to allow for comments. Select the Approve radio

62

OSTI Announces Alert Service for arXiv Patrons | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

Announces Alert Service for arXiv Patrons Announces Alert Service for arXiv Patrons March 2005 Oak Ridge, TN - The Office of Scientific and Technical Information (OSTI) is pleased to announce implementation of an Alert Service that serves patrons of arXiv, a source in the fields of physics, mathematics, non-linear science, computer science, and quantitative biology. ArXiv, a service of Cornell University Library System, is one of the sources included in OSTI's E-print Network. Through this Alert Service, patrons can subscribe to be automatically notified of the latest information posted on arXiv, as well as other e-print sources in the E-print Network. A special interface is provided for arXiv patrons through the E-print Network. E-print Network is a vast, integrated network of electronic scientific and

63

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

User Policy Print User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

64

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

65

User Centric Community Clouds  

Science Conference Proceedings (OSTI)

With the evolution in cloud technologies, users are becoming acquainted with seamless service provision. Nevertheless, clouds are not a user centric technology, and users become completely dependent on service providers. We propose a novel concept for ... Keywords: Cloud infrastructure, Identity management, User-centric systems

Joăo Paulo Barraca; Alfredo Matos; Rui L. Aguiar

2011-05-01T23:59:59.000Z

66

Reducing false positives in anomaly detectors through fuzzy alert aggregation  

Science Conference Proceedings (OSTI)

In this paper we focus on the aggregation of IDS alerts, an important component of the alert fusion process. We exploit fuzzy measures and fuzzy sets to design simple and robust alert aggregation algorithms. Exploiting fuzzy sets, we are able to robustly ... Keywords: Aggregation, Anomaly detection, Fuzzy measures, Fuzzy sets, Intrusion detection, Multisensor fusion

Federico Maggi; Matteo Matteucci; Stefano Zanero

2009-10-01T23:59:59.000Z

67

A cognitive model for alert correlation in a distributed environment  

Science Conference Proceedings (OSTI)

The area of alert fusion for strengthening information assurance in systems is a promising research area that has recently begun to attract attention. Increased demands for “more trustworthy” systems and the fact that a single sensor cannot ... Keywords: alert correlation, fuzzy cognitive modeling, intelligent alert fusion, network security

Ambareen Siraj; Rayford B. Vaughn

2005-05-01T23:59:59.000Z

68

User Manual  

NLE Websites -- All DOE Office Websites (Extended Search)

Manual Manual Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net User Manual Introduction The OSCARS Interdomain Controller (IDC) allows end users to reserve high

69

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

70

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

71

ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

SHUG banner SNS-HFIR User Group The SNS-HFIR User Group (SHUG) consists of all persons interested in using the neutron scattering facilities at Oak Ridge. It provides input to the...

72

User Information  

NLE Websites -- All DOE Office Websites (Extended Search)

User Information User Information Print User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Includes information about submitting a...

73

Restoration Prioritization Toolset: Documentation and User’s Guides 2007  

SciTech Connect

This user’s guide provides technical background and details on the Restoration Prioritization Toolset developed for GoMRC as well as instructions for use.

Judd, Chaeli; Woodruff, Dana L.; Thom, Ronald M.; Anderson, Michael G.; Borde, Amy B.

2007-10-26T23:59:59.000Z

74

The User Agreement  

NLE Websites -- All DOE Office Websites (Extended Search)

User Agreement User Agreement Oak Ridge National Laboratory is home to a number of highly sophisticated experimental user facilities. These research facilities, instruments, and laboratories are designed to serve Laboratory researchers, engineers, and technical staff, as well as external researchers from universities, industries, foreign institutions and other government laboratories. Sharing these state-of-the-art facilities with the scientific, industrial, and technical communities provides access to unique and specialized technology, equipment and instrumentation without burdening the user with the astronomical capital costs of building such facilities. Characteristics of User Agreements * User Agreements come in two types; proprietary and non-proprietary. The characteristics of

75

User Facilities | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

USER PORTAL USER PORTAL BTRICBuilding Technologies Research Integration Center CNMSCenter for Nanophase Materials Sciences CSMBCenter for Structural Molecular Biology CFTFCarbon Fiber Technology Facility HFIRHigh Flux Isotope Reactor MDF Manufacturing Demonstration Facility NTRCNational Transportation Research Center OLCFOak Ridge Leadership Computing Facility SNSSpallation Neutron Source Keeping it fresh at the Spallation Neutron Source Nanophase material sciences' nanotech toolbox Home | User Facilities SHARE ORNL User Facilities ORNL is home to a number of highly sophisticated experimental user facilities that provide unmatched capabilities to the broader scientific community, including a growing user community from universities, industry, and other laboratories research institutions, as well as to ORNL

76

Users from Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

Users from Industry Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

77

NIST Study of Hazard to Firefighters Leads to Safety Alert  

Science Conference Proceedings (OSTI)

NIST Study of Hazard to Firefighters Leads to Safety Alert. ... NIST-led research "validated the adverse consequences to firefighters when lens ...

2012-07-25T23:59:59.000Z

78

Albert Einstein Alerts President Roosevelt of German Atomic Energy...  

National Nuclear Security Administration (NNSA)

Albert Einstein Alerts President Roosevelt of German Atomic Energy Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation...

79

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts for Users Contacts for Users User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

80

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Users from Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

Users from Industry Print Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

82

ETC Alert Disaster Procedure, 8am 5pm Weekdays  

E-Print Network (OSTI)

work area "The hospital disaster response plan is in effect. Remain at your regular duties and awaitETC Alert Disaster Procedure, 8am ­ 5pm Weekdays ETC ALERT DISASTER ETC Charge Nurse Hospital Operator ETC Tech 3JCP Reception Pager 3735 Phone 6-3350 General Diagnostic Supervisor (Disaster Only) Ass

83

Management Alert: IG-0864 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IG-0864 IG-0864 Management Alert: IG-0864 May 17, 2012 Extended Assignments at Princeton Plasma Physics Laboratory Princeton University operates the Princeton Plasma Physics Laboratory (Princeton) under a contract with the Department of Energy's Office of Science. Princeton works with partners around the world to develop fusion as an energy source. The Laboratory's annual operating costs are about $80 million, all of which is reimbursed by the Department. On May 8, 2012, we issued a separate contract audit report on Audit Coverage of Cost Allowability for Princeton Plasma Physics Laboratory during Fiscal Years 2009-2010 under Department of Energy Contract Numbers DE-AC02-76CH03073 and DE-AC02-09CH11466 (OAS-V-12-06, May 2012). One of the objectives of that audit was to determine whether questioned costs and

84

Management Alert: IG-0864 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IG-0864 IG-0864 Management Alert: IG-0864 May 17, 2012 Extended Assignments at Princeton Plasma Physics Laboratory Princeton University operates the Princeton Plasma Physics Laboratory (Princeton) under a contract with the Department of Energy's Office of Science. Princeton works with partners around the world to develop fusion as an energy source. The Laboratory's annual operating costs are about $80 million, all of which is reimbursed by the Department. On May 8, 2012, we issued a separate contract audit report on Audit Coverage of Cost Allowability for Princeton Plasma Physics Laboratory during Fiscal Years 2009-2010 under Department of Energy Contract Numbers DE-AC02-76CH03073 and DE-AC02-09CH11466 (OAS-V-12-06, May 2012). One of the objectives of that audit was to determine whether questioned costs and

85

Management Alert: IG-0871 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IG-0871 IG-0871 Management Alert: IG-0871 October 3, 2012 The 2020 Vision One System Proposal for Commissioning and Startup of the Waste Treatment and Immobilization Plant The Department of Energy (Department) is considering a proposal known as the 2020 Vision One System (2020 Vision) that would implement a phased approach to commissioning the $12.2 billion Waste Treatment and Immobilization Plant (WTP) including making the Low-Activity Waste (LAW) facility operational approximately 15 months before commissioning the remainder of the project. Although the implementation of the phased approach offers potential benefits, early operation of the LAW facility presents significant cost, technological and permitting risks that could adversely affect the overall success of the Office of the River Protection

86

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Contact Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

87

Considerations in missile reductions and de-alerting  

SciTech Connect

Earlier analyses assumed that all survivable forces could withstand first strikes and retaliate. Only those on alert, at sea, or capable of launching under attack meet that assumption. The sensitivity of those results to non-alert forces is discussed. Reduced alert rates decrease stability indices, primarily by reducing second strikes. Survivable, mobile Russian ICBMs could increase both sides stability. Dealerting hastens expected reductions and raises the possibility of abuse. And the low-force goal of arms reductions has some poorly understood and awkward attributes.

Canavan, G.H.

1998-04-01T23:59:59.000Z

88

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

89

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

90

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

91

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

92

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

93

Alert! Industry and Academia - The Energy Department Seeks Your Novel  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Alert! Industry and Academia - The Energy Department Seeks Your Alert! Industry and Academia - The Energy Department Seeks Your Novel Ideas for Advanced Energy Systems Alert! Industry and Academia - The Energy Department Seeks Your Novel Ideas for Advanced Energy Systems January 7, 2014 - 12:37pm Addthis Alert! Industry and Academia — The Energy Department Seeks Your Novel Ideas for Advanced Energy Systems Do you care about power and our environment? Are you buzzing with innovative ideas? If so, the Energy Department wants to hear your new and creative concepts for improving the cost and performance of power or industrial systems that depend on fossil energy. Please note that this is a request for information (RFI) only; it is NOT a request for proposals. Your response may be used to guide the planned funding opportunity announcement (FOA) that will be issued at a later date

94

Alert! Industry and Academia - The Energy Department Seeks Your Novel  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Alert! Industry and Academia - The Energy Department Seeks Your Alert! Industry and Academia - The Energy Department Seeks Your Novel Ideas for Advanced Energy Systems Alert! Industry and Academia - The Energy Department Seeks Your Novel Ideas for Advanced Energy Systems January 7, 2014 - 12:37pm Addthis Alert! Industry and Academia — The Energy Department Seeks Your Novel Ideas for Advanced Energy Systems Do you care about power and our environment? Are you buzzing with innovative ideas? If so, the Energy Department wants to hear your new and creative concepts for improving the cost and performance of power or industrial systems that depend on fossil energy. Please note that this is a request for information (RFI) only; it is NOT a request for proposals. Your response may be used to guide the planned funding opportunity announcement (FOA) that will be issued at a later date

95

OSTI Announces Alert Service for arXiv Patrons  

Office of Scientific and Technical Information (OSTI)

Enter Search Terms GO OSTI Announces Alert Service for arXiv Patrons March 2005 Oak Ridge, TN - The Office of Scientific and Technical Information (OSTI) is pleased to...

96

User Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

Guide Guide User Guide Print 1. Apply for Beam Time Submit a new proposal or a Beam Time Request (BTR) using an existing active proposal. 2. Establish a User Agreement Your institute must have a signed agreement with Berkeley Lab before you may do work at the ALS. 3. Complete Experiment Safety Documentation and Review Safety for Users Safety documentation must be completed and reviewed before your beam time. Experiments involving any biological material or radioactive material require more review steps so please allow several weeks for these. 4. Register with the User Office New and returning users need to register with the User Office TWO weeks before arriving at the ALS. Users arriving out of regular office hours must either have a valid Berkeley Lab ID badge, or have completed registration to be granted access to the ALS.

97

APS Users Organization  

NLE Websites -- All DOE Office Websites (Extended Search)

APSUO APSUO By-Laws Steering Commitee Employment Meetings Compton Award Franklin Award APS Users Organization The APSUO is responsible for advising the APS Associate Laboratory Director in the following areas: The Organization will serve as an advocacy group for the Facility and its user community. The Organization will provide advice to the ALD on matters affecting the user community. The Organization will assure good communication between the APS user community and the APS management. APSUO By-Laws The by-laws upon which the APS User Organization is based. List of Steering Committee Members Steering committee for the APS Users Organization. Employment Bulletin Board APS-related employment opportunities. APSUO Steering Committee Meetings Minutes and presentations from the APSUO meetings.

98

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

99

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

100

User Facilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Lawrence Berkeley National Laboratory's National User Facilities are available for cooperative research with institutions and the private sector worldwide. The Environmental...

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

PARS II User Guide  

Energy.gov (U.S. Department of Energy (DOE))

This document serves as a reference manual to assist DOE end-users in performing their respective functions within the PARS II web application. The document provides a description and “How To” for...

102

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

103

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

104

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

105

Radiological Toolbox User's Manual  

Science Conference Proceedings (OSTI)

A toolbox of radiological data has been assembled to provide users access to the physical, chemical, anatomical, physiological and mathematical data relevant to the radiation protection of workers and member of the public. The software runs on a PC and provides users, through a single graphical interface, quick access to contemporary data and the means to extract these data for further computations and analysis. The numerical data, for the most part, are stored within databases in SI units. However, the user can display and extract values using non-SI units. This is the first release of the toolbox which was developed for the U.S. Nuclear Regulatory Commission.

Eckerman, KF

2004-07-01T23:59:59.000Z

106

U-051: Skype Discloses IP Addresses to Remote Users | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51: Skype Discloses IP Addresses to Remote Users 51: Skype Discloses IP Addresses to Remote Users U-051: Skype Discloses IP Addresses to Remote Users December 5, 2011 - 7:00am Addthis PROBLEM: A remote user can determine the IP address of a Skype user. PLATFORM: Skype application ABSTRACT: Skype Discloses IP Addresses to Remote Users reference LINKS: SecurityTracker Alert ID: 1026370 Forbes: Skype Flaw IMPACT ASSESSMENT: High Discussion: A remote user can initiate a Skype call to a target user to determine the target user's IP address and then terminate the call before the target user's Skype application has indicated an incoming call. The remote user does not need to be on the target user's contact list. Armed with an IP address, hackers can uncover specific information about victims, including who they chat with, what they download while online, and

107

Passive pavement-mounted acoustical linguistic drive alert system and method  

DOE Patents (OSTI)

Systems and methods are described for passive pavement-mounted acoustical alert of the occupants of a vehicle. A method of notifying a vehicle occupant includes providing a driving medium upon which a vehicle is to be driven; and texturing a portion of the driving medium such that the textured portion interacts with the vehicle to produce audible signals, the textured portion pattern such that a linguistic message is encoded into the audible signals. The systems and methods provide advantages because information can be conveyed to the occupants of the vehicle based on the location of the vehicle relative to the textured surface.

Kisner, Roger A. (Knoxville, TN); Anderson, Richard L. (Oak Ridge, TN); Carnal, Charles L. (Cookeville, TN); Hylton, James O. (Clinton, TN); Stevens, Samuel S. (Harriman, TN)

2001-01-01T23:59:59.000Z

108

User Community  

NLE Websites -- All DOE Office Websites (Extended Search)

Community Community Given the pressures of conducting experiments, it's sometimes hard to find time to connect with new potential colleagues, even though they may be working at the next beamline. There are many opportunities for making informal connections with other users and with APS staff; this page lists only a few of the many communication channels at the APS. Reaching Other Users Coffee Cart A source of morning sustenance and a chance to see who's been working in the hutch next to yours all night. An APS manager makes the rounds with the Coffee Cart each morning. Scientific Interest Groups Self-organizing groups of users and beamline staff interested in advancing synchrotron research in a particular area. User Science Seminars, General Seminars and Conferences

109

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

110

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

111

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

112

Smart Solar Home System with Safety Device Low Voltage Alert  

Science Conference Proceedings (OSTI)

For many reasons Bangladeshi people are now using renewable energy. So, solar energy is the best renewable energy till now, in respect of Bangladesh. So using of solar system is common nowadays. Bangladesh Government has taken some steps to make solar ... Keywords: Smart Solar Home System (SSHS), Rooftop, Safety Device, Low voltage alert

Tawheed Hasan; Md. Faysal Nayan; Md. Asif Iqbal; Monzurul Islam

2012-03-01T23:59:59.000Z

113

An adaptive architecture of applying vulnerability analysis to IDS alerts  

Science Conference Proceedings (OSTI)

With increasing intrusions and attacks on the Internet, there is an urgent need to develop techniques for network security. Current standalone network security products, such as the firewall systems, the Intrusion Detection System (IDS), the anti-virus ... Keywords: alert, intrusion detection, network security, predicate-based evaluation, vulnerability analysis

Xuejiao Liu; Xin Zhuang; Debao Xiao

2008-07-01T23:59:59.000Z

114

Survey A model-based survey of alert correlation techniques  

Science Conference Proceedings (OSTI)

As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely ... Keywords: Alert correlation, Fault localization, Intrusion detection systems, Network management systems, SCADA systems

Saeed Salah; Gabriel Maciá-FernáNdez; JesúS E. DíAz-Verdejo

2013-04-01T23:59:59.000Z

115

Application of Short-Range Lidar in Wind Shear Alerting  

Science Conference Proceedings (OSTI)

Long-range lidar systems have been used operationally at the Hong Kong International Airport for wind shear alerting. They are used for monitoring the headwinds over the last 3 n mi of all of the runway corridors of the Hong Kong International ...

P. W. Chan; Y. F. Lee

2012-02-01T23:59:59.000Z

116

A User's Manual  

E-Print Network (OSTI)

Then and Now A User’s Manual The rationale for Part II isIn addition to this “User’s Manual,” Part II contains three

Ascoli, Albert Russell; Starn, Randolph

2011-01-01T23:59:59.000Z

117

2006 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

6 User Survey Results 6 User Survey Results Show All | 1 2 3 4 5 ... 15 | Next » 2006 User Survey Results Table of Contents Survey Results Users are invited to provide overall comments about NERSC: Here are the survey results: Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings All Usefulness Topics Hardware Resources Software Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Survey Results Many thanks to the 256 users who responded to this year's User Survey. This represents a response rate of about 13 percent of the active NERSC users. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's

118

Office 2007 User Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

Office 2007 User Workshop Office 2007 User Workshop M. Westbrook, APS-IT June 30, 2010 Goal: Quick Start for New Office 2007 Users Introduce and highlight new Office 2007 program feature (Word, Excel and PowerPoint) Identify sources of help with Office 2007 Provide opportunity for users to share experiences Office 2007: Introduction  Format for today's presentation is that of a workshop rather than training course  Many of the new features presented here apply to multiple Office applications  Sources for more information are identified throughout the presentation  Presenter is no expert, but plans to share what has been learned thus far  Attendees are encouraged to share what you have learned for the benefit of all

119

User Operation Manual  

NLE Websites -- All DOE Office Websites (Extended Search)

SNS-NSSD-TOF-TD-0002 - R00 SNS-NSSD-TOF-TD-0002 - R00 1 SEQUOIA Operations Manual for Users G.E. Granroth SEQUOIA Lead Instrument Scientist A.I. Kolesnikov SEQUOIA Instrument Scientist L.M. DeBeer-Schmitt SEQUOIA Scientific Associate T.E. Sherline Sample Environment Scientist Revised - May 13, 2013 SNS-NSSD-TOF-TD-0002 - R00 2 Abstract The SEQUOIA Operations Manual for Users presents a description of the SEQUOIA spectrometer located at beamline 17 (BL17) of the Spallation Neutron Source (SNS). It is the intent of this manual to inform the user regarding the SEQUOIA spectrometer and available sample environment, to run experiments, to access and analyze the collected data, and to provide the user with other potentially useful information. The first section serves to describe the components of which the instrument is comprised.

120

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

122

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

123

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

124

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

125

Provide Data and Tools  

NLE Websites -- All DOE Office Websites (Extended Search)

Provide Data and Tools Print E-mail Provide Data and Tools Print E-mail With the advance of observational capabilities, computational power, and scientific research, there is both an opportunity for scientific progress in the study of the Earth system and a need to manage the data and information generated about it. As computational capabilities improve, data volume will continue to grow at an accelerating rate. It is crucial to continue to collect and store these records, but this increased output will also present data management challenges. Addressing this data-volume challenge will require advanced technology to link users to the various data providers and cloud-based tools to facilitate collaboration. In the coming decade, USGCRP will take a leadership role in coordinating these networks, by providing shared data access, analytic capabilities, and modeling frameworks to support integrated research and decision support.

126

User Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You may NOT modify the .bashrc or .cshrc files. These are set to read-only on NERSC systems and specify system specific customizations. Instead you should modify a file called .bashrc.ext or .cshrc.ext. Learn more about the global homes user environment. Important Environment Variables

127

User's Manual  

NLE Websites -- All DOE Office Websites (Extended Search)

User's User's Manual for Pelegant - Yusong Wang, Michael Borland, Robert Soliday - APS Accelerator Systems Division, Advanced Photon Source 1 Introduction Pelegant stands for "parallel elegant," which is a parallelized version of elegant [1]. Written in the C programming language with MPICH, the Pelegant has been successfully ported to several clusters and supercomputers, such as the "weed" cluster (a heterogeneous system of 100 CPUs) at Advanced Photon Source (APS), and the Jazz cluster (350 Intel Xeon CPUs) at Argonne National Lab (ANL) and the BlueGene/L supercomputer (1024 dual PowerPC 440 nodes) at Argonne National Lab. Thanks to careful design in parallelization and good architecture of the serial elegant, the Pelegant achieves very good performance. For example, for a simulation of 10 5 particles in APS including symplectic element-by-element tracking,

128

EMSL User Executive Committe Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

129

2001 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

1 User Survey Results 1 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2001 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years NERSC Information Management (NIM) System Web and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary NERSC extends its thanks to the 237 users who participated in this year's survey; this compares with 134 respondents last year. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well

130

Science.gov Alerts Help Track Latest Science Information | OSTI, US Dept of  

Office of Scientific and Technical Information (OSTI)

Alerts Help Track Latest Science Information Alerts Help Track Latest Science Information NEWS MEDIA CONTACT: Cathey Daniels, (865) 576-9539 FOR IMMEDIATE RELEASE March 1, 2006 Science.gov Alerts Help Track Latest Science Information Oak Ridge, TN - The Science.gov Alert Service has been updated to take advantage of the new Science.gov 3.0 query capabilities. The Alert Service tracks the latest information on your science topics of interest and delivers that information to your desktop e-mail each Monday. The Alert Service is free, and registration is available at the Science.gov home page. New Science.gov query capabilities allow you to better define your search terms by using phrases, date ranges and more. Once you have defined your search terms and set your alert, Science.gov will do your searching for you

131

Neutron Science User Program  

E-Print Network (OSTI)

provides a user gateway for SNS and HFIR 11 Managed by UT-Battelle for the U.S. Department of Energy #12.) · Complementary to SNS HFIR produces the world's highest thermal neutron flux #12;13 UT-Battelle Department infrastructure (REDC, HFIR, etc.): $3B+ national asset ORNL is uniquely positioned to support advanced nuclear

132

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

133

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

134

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

135

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

136

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

137

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

138

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

139

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

140

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

142

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

143

V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Flash Plug-in Lets Remote Users Conduct 4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 - 12:56am Addthis PROBLEM: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028694 CVE-2013-2866 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted Flash content that, when loaded by the target user, will display the Flash settings in a transparent manner, which may allow the remote user to cause the target user to modify their Flash settings. This may allow the remote user to obtain potentially

144

RADTRAN 5 user guide.  

SciTech Connect

This User Guide for the RADTRAN 5 computer code for transportation risk analysis describes basic risk concepts and provides the user with step-by-step directions for creating input files by means of either the RADDOG input file generator software or a text editor. It also contains information on how to interpret RADTRAN 5 output, how to obtain and use several types of important input data, and how to select appropriate analysis methods. Appendices include a glossary of terms, a listing of error messages, data-plotting information, images of RADDOG screens, and a table of all data in the internal radionuclide library.

Kanipe, Frances L.; Neuhauser, Karen Sieglinde

2003-07-01T23:59:59.000Z

145

PALP - a User Manual  

E-Print Network (OSTI)

This article provides a complete user's guide to version 2.1 of the toric geometry package PALP by Maximilian Kreuzer and others. In particular, previously undocumented applications such as the program nef.x are discussed in detail. New features of PALP 2.1 include an extension of the program mori.x which can now compute Mori cones and intersection rings of arbitrary dimension and can also take specific triangulations of reflexive polytopes as input. Furthermore, the program nef.x is enhanced by an option that allows the user to enter reflexive Gorenstein cones as input. The present documentation is complemented by a Wiki which is available online.

Andreas P. Braun; Johanna Knapp; Emanuel Scheidegger; Harald Skarke; Nils-Ole Walliser

2012-05-18T23:59:59.000Z

146

User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Awards Print ALS User Meeting Awards See the 2012 ALS User Meeting Award Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops...

147

2012 ALS User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

2012 ALS User Meeting 2012 ALS User Meeting Print Tuesday, 14 June 2011 12:37 user meeting web banner Home Agenda Awards Exhibitors Lodging Posters Registration Transportation...

148

NERSC Users Group  

NLE Websites -- All DOE Office Websites (Extended Search)

Policies Data Analytics & Visualization Science Gateways User Surveys NERSC Users Group Teleconferences Annual Meetings NUGEX Elections Charter User Announcements Help Operations...

149

SSRL Users' Organization Ballot  

NLE Websites -- All DOE Office Websites (Extended Search)

2003 SSRL Users' Organization Executive Committee (SSRLUO-EC) Ballot The SSRL Users' Organization Executive Committee represents the scientific user community to the SSRL...

150

User Facilities - Learn More  

NLE Websites -- All DOE Office Websites (Extended Search)

Neutron Source Search by Equipment or Process User Portal Quick Links ORNL home User facility contacts ORNL Guest House Open Helpful Travel Information Learn More User...

151

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

152

1999 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

9 User Survey Results 9 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 1999 User Survey Results Table of Contents Respondent Summary Overall Satisfaction User Information Visualization Consulting and Account Support Information Technology and Communication Hardware Resources Software Training Comments about NERSC All Satisfaction Questions and FY 1998 to FY 1999 Changes Respondent Summary NERSC would like to thank all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, point us to areas we can improve, and show how we compare to similar facilities. This year 177 users responded to our survey, compared with 138 last year.

153

2000 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

0 User Survey Results 0 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2000 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and FY 1999 to FY 2000 Changes Consulting and Account Support Web and Communications Hardware Resources Software Resources Training User Comments Response Summary NERSC extends its thanks to all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. Every year we institute changes based on the survey; the FY 1999 survey resulted in the following changes: We created a long-running queue (12 hours maximum) for jobs using up

154

User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Awards User Meeting Awards Print Monday, 20 June 2011 14:12 ALS User Meeting Awards See the 2012 ALS User Meeting Award Winners Home Agenda Awards Exhibitors Lodging...

155

Management Alert - Extended Assignments at Princeton Plasma Physics Laboratory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Extended Assignments at Princeton Extended Assignments at Princeton Plasma Physics Laboratory DOE/IG-0864 May 2012 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 May 17, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert on "Extended Assignments at Princeton Plasma Physics Laboratory" BACKGROUND Princeton University operates the Princeton Plasma Physics Laboratory (Princeton) under a contract with the Department of Energy's Office of Science. Princeton works with partners around the world to develop fusion as an energy source. The Laboratory's annual operating costs

156

Science Accelerator : User Account  

NLE Websites -- All DOE Office Websites (Extended Search)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

157

INCISM: Users Manual  

E-Print Network (OSTI)

AND HIGHWAYS INCISIM: USERS MANUAL June 28, 2000 Heng LiuBERKELEY INCISIM: Users Manual Heng Liu, Randolph Hall

Liu, Heng; Hall, Randolph

2000-01-01T23:59:59.000Z

158

SOAJ Search : User Account  

Office of Scientific and Technical Information (OSTI)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

159

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

160

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

162

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

163

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

164

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

165

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

166

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

167

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

168

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

169

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

170

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

171

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

172

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

173

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

174

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

175

APS User News, Issue 67  

NLE Websites -- All DOE Office Websites (Extended Search)

Overview Visiting the APS Mission & Goals Find People Organization Charts Committees Job Openings User Information Prospective Users New Users Current Users APS User Portal...

176

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

177

Internet Users’ Glossary  

E-Print Network (OSTI)

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them. Acknowledgements This document is the work of the User Glossary Working Group of the

G. Malkin; Xylogics Inc; T. Laquey Parker

1993-01-01T23:59:59.000Z

178

Domestic Water Conservation Technologies: Federal Energy Management Program (FEMP) Federal Technology Alert (Booklet)  

SciTech Connect

Executive Order 13123 calls for the Federal government to conserve water as well as energy in its 500,000 facilities. To help set priorities among water-saving measures, the Federal Energy Management Program conducted a study of Federal water use in 1997. The study indicated that the government consumes more than 50% of its water in just three types of Federal facilities: housing, hospitals, and office buildings. These facilities have enough kitchens, rest rooms, and laundry areas to provide facility managers with many opportunities to begin reducing their water use (and utility costs) with appropriate water-saving fixtures and products. Therefore, this Federal Technology Alert focuses on domestic technologies, products, and appliances such as water-efficient faucets, showerheads, toilets, urinals, washing machines, and dishwashers. Conserving water also saves the energy needed to treat, pump, and heat that water in homes, businesses, and other buildings.

2002-10-01T23:59:59.000Z

179

Plant alert: Don`t let erosion/corrosion compromise safety  

Science Conference Proceedings (OSTI)

One year ago, the rupture of a feed-water-pipe section just upstream of the economizer resulted in a fatal accident at a US utility drum-boiler unit. The direct cause of the accident was thinning of the pipe wall, apparently the result of erosion/corrosion. An accident similar in origin and consequences occurred in December 1986 at a nuclear pressurized-water reactor (PWR) unit in virginia. Although such serious accidents are rare, erosion/corrosion is a relatively common occurrence in all types of steam systems. It joins drum-boiler waterwall-tube failures and deaerator cracking as the most extensive and expensive waterside problems encountered at powerplants. The purpose of this alert is to urge powerplant owners ad operators to inspect locations in feedwater and wet steam components that may be susceptible to wall thinning caused by erosion/corrosion. (An extensive list of references is provided for assistance in obtaining background information.)

Jonas, O. [Jonas Inc., Wilmington, DE (United States)

1996-02-01T23:59:59.000Z

180

Making Linux protection mechanisms egalitarian with UserFS  

Science Conference Proceedings (OSTI)

UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted code. One key idea in UserFS ...

Taesoo Kim; Nickolai Zeldovich

2010-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

2004 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

4 User Survey Results 4 User Survey Results Show All | 1 2 3 4 5 ... 13 | Next » 2004 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Security and One Time Passwords Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 209 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The

182

2005 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

5 User Survey Results 5 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2005 User Survey Results Table of Contents Response Summary Respondent Demographics All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Visualization and Data Analysis Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 201 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The survey results are listed below.

183

Distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms ...

Haodong Wang; Qun Li

2006-06-01T23:59:59.000Z

184

Cooperative Monitoring Center Occasional Paper/9: De-Alerting Strategic Ballistic Missiles  

Science Conference Proceedings (OSTI)

This paper presents a framework for evaluating the technical merits of strategic ballistic missile de-alerting measures, and it uses the framework to evaluate a variety of possible measures for silo-based, land-mobile, and submarine-based missiles. De-alerting measures are defined for the purpose of this paper as reversible actions taken to increase the time or effort required to launch a strategic ballistic missile. The paper does not assess the desirability of pursuing a de-alerting program. Such an assessment is highly context dependent. The paper postulates that if de-alerting is desirable and is used as an arms control mechanism, de-alerting measures should satisfy specific cirteria relating to force security, practicality, effectiveness, significant delay, and verifiability. Silo-launched missiles lend themselves most readily to de-alerting verification, because communications necessary for monitoring do not increase the vulnerabilty of the weapons by a significant amount. Land-mobile missile de-alerting measures would be more challenging to verify, because monitoring measures that disclose the launcher's location would potentially increase their vulnerability. Submarine-launched missile de-alerting measures would be extremely challlenging if not impossible to monitor without increasing the submarine's vulnerability.

Connell, Leonard W.; Edenburn, Michael W.; Fraley, Stanley K.; Trost, Lawrence C.

1999-03-01T23:59:59.000Z

185

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

186

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

187

U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Symantec LiveUpdate Administrator Lets Local Users Gain 4: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges June 19, 2012 - 7:00am Addthis PROBLEM: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privileges . PLATFORM: Version(s): 2.3 and prior versions Abstract: Users Gain Elevated Privileges reference LINKS: Vendor Advisory SecurityTracker Alert ID: 1027182 CVE-2012-0304 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Symantec LiveUpdate Administrator. A local user can obtain elevated privileges on the target system.The default installation of Symantec LiveUpdate Administrator installs files with full control privileges granted to the 'Everyone' group.A local user can exploit

188

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

189

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

190

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

191

U-044: HP Operations Agent and Performance Agent Lets Local Users Access a  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: HP Operations Agent and Performance Agent Lets Local Users 44: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory November 23, 2011 - 8:00am Addthis PROBLEM: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory. PLATFORM: HP Operations Agent v11.00 and Performance Agent v4.73, v5.0 for AIX, HP-UX, Linux, and Solaris ABSTRACT: A local user can access a directory on the target system. reference LINKS: HP Security Bulletin Document ID: c03091656 CVE-2011-4160 SecurityTracker Alert ID: 1026345 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Operations Agent and Performance Agent. A local user can access data on the target system. A local user can gain

192

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

193

T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Linux Kernel GFS2 Allocation Error Lets Local Users Deny 69: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service July 15, 2011 - 2:14am Addthis PROBLEM: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. PLATFORM: 2.6.39 and prior versions ABSTRACT: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service. references LINKS: SecurityTracker Alert ID: 1025776 Linux Kernel Updates CVE-2011-2689 IMPACT ASSESSMENT: Medium Discussion: A local user can invoke the gfs2_fallocate() function in 'fs/gfs2/file.c' in certain cases to allocate a non-blksize aligned amount, resulting in an error in subsequent code that requires blksize aligned offsets. Impact: A local user can cause denial of service conditions on the target system.

194

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

195

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

196

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

197

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

NLE Websites -- All DOE Office Websites (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

198

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

199

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

200

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

202

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users 0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information August 21, 2012 - 7:00am Addthis PROBLEM: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Apple Remote Desktop after 3.5.1 and prior to 3.6.1 ABSTRACT: A remote user can monitor potentially sensitive information. reference LINKS: Apple.com Apple Article: HT5433 SecurityTracker Alert ID: 1027420 CVE-2012-0681 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apple Remote Desktop. When a user connects to a third-party VNC server with the 'Encrypt all network data' setting enabled, network data is not encrypted. A remote user monitoring the

203

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

204

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

205

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

206

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

207

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

208

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP-UX System Administration Manager Lets Local Users Gain 0: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

209

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

210

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

211

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: HP-UX System Administration Manager Lets Local Users Gain 40: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

212

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets 45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger a heap corruption error in 'vidplin.dll' and execute arbitrary code on the target system. The code will run with the

213

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

214

User Facility Science Highlights  

NLE Websites -- All DOE Office Websites (Extended Search)

user-facilities/highlights/ The Office of Science user-facilities/highlights/ The Office of Science is the single largest supporter of basic research in the physical sciences in the United States, providing more than 40 percent of total funding for this vital area of national importance. It oversees - and is the principal federal funding agency of - the Nation's research programs in high-energy physics, nuclear physics, and fusion energy sciences. en {611EDD39-818D-4CBA-BFD7-9568495C1566}http://science.energy.gov/bes/highlights/2013/bes-2013-09-a/ The Role of Stripes in Superconducting Behavior Using neutron diffraction, movement of charged atoms arranged as "stripes"

215

Safety for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety for Users Safety for Users Print Tuesday, 01 September 2009 08:01 Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe...

216

2012 User Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2012 ALS User Meeting was held Monday, October 8 through Wednesday, October 10. Some of...

217

2012 NERSC User Survey  

NLE Websites -- All DOE Office Websites (Extended Search)

Results 2012 User Survey Text 2012 NERSC User Survey Text The 2012 NERSC User Survey is closed. The following is the text of the survey. Section 1: Overall Satisfaction with...

218

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Archives ALS User Meeting Archives Print Monday, 06 June 2011 09:25 Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley...

219

Argonne CNM: Call for User Proposals  

NLE Websites -- All DOE Office Websites (Extended Search)

research program provides users with access to a broad range of capabilities for design, synthesis, characterization, and theory & modeling in order to significantly...

220

New User Guide | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. Feedback Form New User Guide Step 1. Request...

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

BNL Guest, User and Visitor Center | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Brookhaven National Laboratory (BNL) is dedicated to providing a healthy and safe work environment for all employees, guests, users, and contractors who perform work....

222

2012 User Meeting Workshops  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Workshops Print 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being...

223

Users Meeting 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

Americas - Sky Shows at the Adler Planetarium UChicago Argonne, LLC - User Meeting banquet What's Different This Year: The Users Meeting this year has a few new twists. The...

224

Partner User Information  

NLE Websites -- All DOE Office Websites (Extended Search)

User Policies and Procedures page. Types of Partner Users Collaborative Access Teams (CATs)-an external group that builds and operates a beamline Collaborative Development Team...

225

NSLS User Access  

NLE Websites -- All DOE Office Websites (Extended Search)

After checking in with the Guest, User, Visitor (GUV) Center, and upon arrival at the NSLS, Beamline Operation and Safety Awareness (BLOSA) training is required for all users....

226

ARM - Become a User  

NLE Websites -- All DOE Office Websites (Extended Search)

ARMBecome a User About Become a User Recovery Act Mission FAQ History Organization Participants Facility Statistics Forms Contacts Facility Documents ARM Management Plan (PDF,...

227

Baytap08 User's Manual  

E-Print Network (OSTI)

Baytap08 User’s Manual OriginalBAYTAP-G Manual by Y. Tamura National AstronomicalProgram version 1.9; Manual date 30 June 2008 Introduction

Tamura, Y; Agnew, D C

2008-01-01T23:59:59.000Z

228

ZAP User's Manual  

E-Print Network (OSTI)

Division ZAP USER'S MANUAL M.S. Zisman, S. Chattopadhyay,21270 ESG-15 ZAP USER'S MANUAL* Michael S. Zisman, Swapanthe typed version of this manual. REFERENCES A. Hofmann, "

Bisognano, J.J.

2010-01-01T23:59:59.000Z

229

Neutron and Nano User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Workshops: New Techniques, New Users, and Enhancing the User Experience Please click HERE for the agenda....

230

User Financial Accounts | Stanford Synchrotron Radiation Lightsource  

NLE Websites -- All DOE Office Websites (Extended Search)

Financial Accounts Financial Accounts Why Have a User Financial Account? Each user group should establish a user financial account to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. Establishing/Renewing a User Financial Account The most common method of establishing or renewing a user financial account is by providing a purchase order (PO) (or a letter from the financial officer of the user institution). The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). The PO should include the expiration date, user names, funding agency, grant/contract number and whether expenditures

231

Neutron and Nano User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Workshops "New Techniques, New Users, and Enhancing the User Experience" Oak Ridge National Laboratory, Building 5200 Monday and Thursday, August 12 and 15, 2013 The User...

232

U-223: Bugzilla May Disclose Confidential Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Bugzilla May Disclose Confidential Information to Remote 3: Bugzilla May Disclose Confidential Information to Remote Users U-223: Bugzilla May Disclose Confidential Information to Remote Users July 30, 2012 - 7:00am Addthis PROBLEM: Bugzilla May Disclose Confidential Information to Remote Users PLATFORM: Version(s): 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to 4.2.1, 4.3.1 ABSTRACT: Two vulnerabilities were reported in Bugzilla. reference LINKS: The Vendor's Advisory Security Advisories CVE-2012-1969 CVE-2012-1968 SecurityTracker Alert ID: 1027320 Bug 777586 IMPACT ASSESSMENT: High Discussion: Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: In HTML bugmails, an improper validation of the permissions of the addressee can lead to confidential information about bugs and attachments

233

U-223: Bugzilla May Disclose Confidential Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Bugzilla May Disclose Confidential Information to Remote 3: Bugzilla May Disclose Confidential Information to Remote Users U-223: Bugzilla May Disclose Confidential Information to Remote Users July 30, 2012 - 7:00am Addthis PROBLEM: Bugzilla May Disclose Confidential Information to Remote Users PLATFORM: Version(s): 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to 4.2.1, 4.3.1 ABSTRACT: Two vulnerabilities were reported in Bugzilla. reference LINKS: The Vendor's Advisory Security Advisories CVE-2012-1969 CVE-2012-1968 SecurityTracker Alert ID: 1027320 Bug 777586 IMPACT ASSESSMENT: High Discussion: Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: In HTML bugmails, an improper validation of the permissions of the addressee can lead to confidential information about bugs and attachments

234

XTV users guide  

SciTech Connect

XTV is an X-Windows based Graphical User Interface for viewing results of Transient Reactor Analysis Code (TRAC) calculations. It provides static and animated color mapped visualizations of both thermal-hydraulic and heat conduction components in a TRAC model of a nuclear power plant, as well as both on-screen and hard copy two-dimensional plot capabilities. XTV is the successor to TRAP, the former TRAC postprocessor using the proprietary DISSPLA graphics library. This manual describes Version 2.0, which requires TRAC version 5.4.20 or later for full visualization capabilities.

Dearing, J.F.; Johns, R.C. [Los Alamos National Lab., NM (United States). Technology and Safety Assessment Div.

1996-09-01T23:59:59.000Z

235

Information Bridge: DOE Scientific and Technical Information...  

Office of Scientific and Technical Information (OSTI)

Information Bridge Alerts Log On Alerts provide users with e-mail notification of updates to the Information Bridge in specific areas of interest. If you wish to receive an Alert...

236

User Questionnaire Page  

NLE Websites -- All DOE Office Websites (Extended Search)

Questionnaire Page 1 of 3 041613 TANDEM FACILITY USER QUESTIONNAIRE Organization: Contact Person:...

237

Franklin: User Experiences  

SciTech Connect

The newest workhorse of the National Energy Research Scientific Computing Center is a Cray XT4 with 9,736 dual core nodes. This paper summarizes Franklin user experiences from friendly early user period to production period. Selected successful user stories along with top issues affecting user experiences are presented.

National Energy Research Supercomputing Center; He, Yun (Helen); Kramer, William T.C.; Carter, Jonathan; Cardo, Nicholas

2008-05-07T23:59:59.000Z

238

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

239

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

240

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

242

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

243

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

244

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

245

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

246

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

247

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

248

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

249

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

250

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

251

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

252

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

253

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

254

T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Linux Kernel dns_resolver Key Processing Error Lets Local 1: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services March 7, 2011 - 3:05pm Addthis PROBLEM: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services. PLATFORM: Linux Kernel 2.6.37 and prior versions ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID:1025162 Latest Stable Kernel CVE-2011-1076 IMPACT ASSESSMENT: High Discussion: When a DNS resolver key is instantiated with an error indication, a local user can attempt to read the key to trigger a null pointer dereference and cause a kernel crash. A local user can cause the target system to crash.

255

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

256

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

257

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

258

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

259

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

260

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Windows Remote Desktop Client DLL Loading Error Lets Remote 3: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code March 9, 2011 - 3:05pm Addthis PROBLEM: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution. PLATFORM: Remote Desktop Connection Client Version(s): 5.2, 6.0, 6.1, 7.0 ABSTRACT: A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Microsoft Security Bulletin MS11-017 SecurityTracker Alert ID:1025172 CVE-2011-0029 IMPACT ASSESSMENT: Moderate Discussion: A remote user can create a specially crafted DLL file on a remote share (e.g., WebDAV, SMB share). When the target user opens a valid Remote

262

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

263

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

264

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

265

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

266

V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain 3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges February 18, 2013 - 12:53am Addthis PROBLEM: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges PLATFORM: Symantec PGP Desktop 10.2.x,10.1.x,10.0.x Symantec Encryption Desktop 10.3.0 ABSTRACT: Two vulnerabilities were reported in Symantec PGP Desktop. REFERENCE LINKS: Symantec Security Advisory SYM13-001 Bugtraq ID: 57170 SecurityTracker Alert ID: 1028145 CVE-2012-4351 CVE-2012-4352 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger an integer overflow in 'pgpwded.sys' to execute arbitrary code on the target system [CVE-2012-4351]. On Windows XP and Windows Sever 2003, a local user can trigger a buffer

267

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

268

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

269

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

270

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

271

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: Avaya IP Office Manager TFTP Server Lets Remote Users 48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Avaya IP Office Manager. A remote user can view files on the target system. PLATFORM: Versions 5.0.x - 6.1.x ABSTRACT: The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. reference LINKS: ASA-2011-156 SecurityTracker Alert ID: 1025664 Secunia Advisory: SA43884 Avaya Support IMPACT ASSESSMENT: Medium Discussion: Avaya IP Office Manager is an application for viewing and editing an IP Office system's configuration. It can be used to securely connect to and

272

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

273

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

274

U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook File Sharing Option Lets Local Users 9: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges December 13, 2011 - 6:00am Addthis PROBLEM: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges. PLATFORM: BlackBerry PlayBook tablet software version 1.0.8.4985 and earlier ABSTRACT: A local user can obtain root privileges on the target tablet system. reference LINKS: SecurityTracker Alert ID:1026386 Vulnerability Summary for CVE-2011-0291 BlackBerry Technical Solution Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A local user can obtain elevated privileges on the target system. On a tablet with File Sharing enabled and connected via USB to a system running BlackBerry

275

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

276

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

277

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

278

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

279

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

280

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

282

SLAC Linac Coherent Light Source User Site  

NLE Websites -- All DOE Office Websites (Extended Search)

Schedules Schedules Schedule of Experiments for the Current Run | User Support Requests | Changes to the Operating Schedule LCLS Operations Schedules Step-By-Step Instructions to Working at LCLS Review LCLS Policies Review Machine FAQ & Parameters Register at User Portal Confirm User Agreement Reserve Accommodations Complete Safety Training Request Computer Account Establish User Account Ship Samples/Equipment Review Check-in Procedures Provide Feedback Inform us of Publications Participate in LCLS Users' Organization Tentative Long-Range Operating Plans Experiments Scheduled March to August 2014 Experiments Scheduled July 2013 to March 2014 Experiments Scheduled January to July 2013 Experiments Scheduled June to December 2012 Experiments Scheduled November 2011 to May 2012

283

VISION 2008 User's Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

VISION 2008 User's Guide VISION 2008 User's Guide ANL-08/34 Energy Systems Division VISION 2008 User's Guide ANL-08/34 User's Guide by J. Ward Vehicle Technologies Program, U.S. Department of Energy, Energy Efficiency and Renewable Energy VISION model by A. Vyas and M. Singh Transportation Technology R&D Center, Argonne National Laboratory October 2008 VISION 2008 User's Guide October 2008 i Table of Contents Copyright Notification .............................................................................................................................. ii List of Abbreviations ................................................................................................................................ iii

284

The Burst Alert Telescope (BAT) on the Swift MIDEX Mission  

E-Print Network (OSTI)

The Burst Alert Telescope (BAT) is one of 3 instruments on the Swift MIDEX spacecraft to study gamma-ray bursts (GRBs). The BAT first detects the GRB and localizes the burst direction to an accuracy of 1-4 arcmin within 20 sec after the start of the event. The GRB trigger initiates an autonomous spacecraft slew to point the two narrow field-of-view (FOV) instruments at the burst location within 20-70 sec so to make follow-up x-ray and optical observations. The BAT is a wide-FOV, coded-aperture instrument with a CdZnTe detector plane. The detector plane is composed of 32,768 pieces of CdZnTe (4x4x2mm), and the coded-aperture mask is composed of approximately 52,000 pieces of lead (5x5x1mm) with a 1-m separation between mask and detector plane. The BAT operates over the 15-150 keV energy range with approximately 7 keV resolution, a sensitivity of approximately 10E-8 erg*cm^-2*s^-1, and a 1.4 sr (half-coded) FOV. We expect to detect >100 GRBs/yr for a 2-year mission. The BAT also performs an all-sky hard x-ray survey with a sensitivity of approximately 2 mCrab (systematic limit) and it serves as a hard x-ray transient monitor.

S. D. Barthelmy; L. M. Barbier; J. R. Cummings; E. E. Fenimore; N. Gehrels; D. Hullinger; H. A. Krimm; C. B. Markwardt; D. M. Palmer; A. Parsons; G. Sato; M. Suzuki; T. Takahashi; M. Tashiro; J. Tueller

2005-07-18T23:59:59.000Z

285

Tcl/Tk in the development of user-extensible graphical user interfaces  

Science Conference Proceedings (OSTI)

This paper describes the use of Tcl/Tk in the development of user-extensible Graphical User Interfaces. We describe a GUI that provides two facilities, employing Tcl/Tk, that allow its users to extend the basic GUI at runtime. The first facility is a ...

John M. Skinner; Richard S. LaBarca; Robert M. Sweet

1996-07-01T23:59:59.000Z

286

Alert Services | OSTI, US Dept of Energy, Office of Scientific and  

Office of Scientific and Technical Information (OSTI)

Alert Services Alert Services Get weekly e-mail notification of new information about your specific area(s) of interest. Simply register for the service on one or all of the OSTI products described below and then sign up for topic(s) which will be matched automatically against each new weekly update. E-Print Network E-print Network Alerts Searchable gateway to over 5 million e-print documents and over 32,000 websites and databases worldwide. OSTIblog E-mail notifications OSTIblog E-mail Notifications Automatic notifications by e-mail when new OSTIblog articles are posted to the OSTI website. Science Accelerator Science Accelerator Alerts Searchable gateway to key DOE/OSTI resources that contain research and development results, project descriptions, accomplishments, and more.

287

Effects of psychostimulants on alertness and spatial bias in healthy participants  

Science Conference Proceedings (OSTI)

Converging evidence from neuropsychological and neuroimaging studies suggests that the ability to maintain an alert, ready-to-respond state is mediated by a network of right-hemisphere frontal and parietal cortical areas. This right lateralization may ...

Chris Dodds; Ulrich Müller; Tom Manly

2009-03-01T23:59:59.000Z

288

Human factors studies of an ADS-B based traffic alerting system for general aviation  

E-Print Network (OSTI)

Several recent high profile mid-air collisions highlight the fact that mid-air collisions are a concern for general aviation. Current traffic alerting systems have limited usability in the airport environment where a ...

Silva, Sathya Samurdhi

2012-01-01T23:59:59.000Z

289

User_ViewRecords  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

User Records User Records © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Viewing User Records Purpose The purpose of this job aid is to guide users through the step-by-step process of viewing their records. Each task demonstrates viewing of different records. Task A. View To-Do List Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. View To-Do List (filter, view) 7 Steps Task A View Completed Work 8 Steps Task B View Curriculum Status and Details 11 Steps Task C 3 3 1 2 2 1 SuccessFactors Learning v 6.4 User Job Aid Viewing User Records

290

FACET User Facility  

NLE Websites -- All DOE Office Websites

AD SLACPortal > Accelerator Research Division > FACET User Facility AD SLACPortal > Accelerator Research Division > FACET User Facility Sign In Launch the Developer Dashboard SLAC National Accelerator Laboratory DOE | Stanford | SLAC | SSRL | LCLS | AD | PPA | Photon Science | PULSE | SIMES FACET User Facility : FACET An Office of Science User Facility Search this site... Search Help (new window) Top Link Bar FACET User Facility FACET Home About FACET FACET Experimental Facilities FACET Users Research at FACET SAREC Expand SAREC FACET FAQs FACET User Facility Quick Launch FACET Users Home FACET Division ARD Home About FACET FACET News FACET Users FACET Experimental Facilities FACET Research Expand FACET Research FACET Images Expand FACET Images SAREC Expand SAREC FACET Project Site (restricted) FACET FAQs FACET Site TOC All Site Content

291

Achieving distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user an access right to the stored information. It is essential for future real sensor network deployment in which sensors may provide users with different services in terms of data ... Keywords: Elliptic Curve Cryptography, Public key cryptography, Sensor networks, User access control

Haodong Wang; Qun Li

2012-05-01T23:59:59.000Z

292

Federal technology alert. Parabolic-trough solar water heating  

DOE Green Energy (OSTI)

Parabolic-trough solar water heating is a well-proven renewable energy technology with considerable potential for application at Federal facilities. For the US, parabolic-trough water-heating systems are most cost effective in the Southwest where direct solar radiation is high. Jails, hospitals, barracks, and other facilities that consistently use large volumes of hot water are particularly good candidates, as are facilities with central plants for district heating. As with any renewable energy or energy efficiency technology requiring significant initial capital investment, the primary condition that will make a parabolic-trough system economically viable is if it is replacing expensive conventional water heating. In combination with absorption cooling systems, parabolic-trough collectors can also be used for air-conditioning. Industrial Solar Technology (IST) of Golden, Colorado, is the sole current manufacturer of parabolic-trough solar water heating systems. IST has an Indefinite Delivery/Indefinite Quantity (IDIQ) contract with the Federal Energy Management Program (FEMP) of the US Department of Energy (DOE) to finance and install parabolic-trough solar water heating on an Energy Savings Performance Contract (ESPC) basis for any Federal facility that requests it and for which it proves viable. For an ESPC project, the facility does not pay for design, capital equipment, or installation. Instead, it pays only for guaranteed energy savings. Preparing and implementing delivery or task orders against the IDIQ is much simpler than the standard procurement process. This Federal Technology Alert (FTA) of the New Technology Demonstration Program is one of a series of guides to renewable energy and new energy-efficient technologies.

NONE

1998-04-01T23:59:59.000Z

293

Argonne CNM: Industrial Users  

NLE Websites -- All DOE Office Websites (Extended Search)

For Industrial Users For Industrial Users The Center for Nanoscale Materials (CNM) has specific interest in growing the industrial user program and encourages researchers in industry to consider the capabilities and expertise we have to offer. As a CNM user, you have easy access to sophisticated scientific instrumentation geared toward nanoscience and nanotechnology. Moreover, our widely recognized staff researchers offer support in designing your experiments, using the equipment, and analyzing your data. Access to the CNM is through peer review of user proposals. Before you submit your first user proposal, we encourage you to contact any of our staff researchers, group leaders, the User Office, or division management to discuss the feasibility of your intended research using the expertise and facilities at the CNM. We are here to serve you as part of our user community and will be happy to address any questions you might have.

294

Fermilab Users' Meeting, 2009  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Meeting Poster Fermilab Users' Meeting Users Meeting Poster Fermilab Users' Meeting June 3-4, 2009 The annual gathering of the Fermilab Users Organization will be held on June 3-4, 2009. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. The meeting will also feature selected talks from outstanding young physicists. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans Full Agenda Registration is now closed. NEW!: Pictures from the 2009 Users' Meeting can be found here. A poster session organized by the GSA will be held on June 3rd in the Atrium. The public lecture at this year's Users' Meeting will be given by Prof. Tom Katsouleas

295

NSLS Services | User Accounts  

NLE Websites -- All DOE Office Websites (Extended Search)

User Accounts User Accounts Operating Accounts (81000 accounts) General Users who are allocated beam time and Participating Research Teams (PRTs) or Contributing Users (CUs) who operate beamlines should establish a BNL operating account to cover the costs of materials while running an experiment, shipping, and/or miscellaneous BNL services (telephone & fax codes), if these needs are anticipated. The term of the purchase order must be specified and names of persons having signature authorization for charges against this account must be listed. Brookhaven's Fiscal Division will bill the user for any charges the user makes to the account. Users are obligated to pay outstanding debts promptly. All users should set up a $1,000 operating account to cover operating expenses while at the NSLS, such as charges for use of trades, shops, and

296

Teaching user interface prototyping  

Science Conference Proceedings (OSTI)

User interface prototyping is a proven technique for evaluating design alternatives and for obtaining user feedback. It is heavily employed by software development organizations. However, it is often ignored in computer science education. This paper ...

Charles E. Frank; David Naugler; Michael Traina

2005-06-01T23:59:59.000Z

297

ALS User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting ALS User Meeting Print Tuesday, 14 June 2011 12:37 Due to the current lapse of federal funding, Berkeley Lab Web sites, including ALS sites, are accessible, but may...

298

ORNL DAAC User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Ready to Answer Your Questions The ORNL DAAC's User Services Office is the first point of contact for answering your questions concerning data and information held by...

299

TWOZONE USERS MANUAL  

E-Print Network (OSTI)

C C. ). ,.. TWOZONE Users Manual TWO-WEEK LOAN COpy This isBEV 78-2 TWOZONE Users Manual Ashok J. Gadgil, Gay Gibson,pp 633-67. NECAP Engineers Manual. Stephenson, D. G. and G.

Gadgil, Ashok J.

2008-01-01T23:59:59.000Z

300

TWOZONE USERS MANUAL  

E-Print Network (OSTI)

C C. ). ,.. TWOZONE Users Manual TWO-WEEK LOAN COpy This isBEV 78-2 TWOZONE Users Manual Ashok J. Gadgil, Gay Gibson,pp 633-67. NECAP Engineers Manual. Stephenson, D. G. and G.

Gadgil, Ashok J.

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

STANDARD USER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

acceptance by the Parties. In order for the USER to gain access to andor use of the User facilities, the research must first receive programmatic approval of the facility director...

302

SOAJ Search : User Account  

Office of Scientific and Technical Information (OSTI)

Create User Account User Name: Email Address: I want to: Always receive emails Receive emails if there are new results Never receive emails Email Format: HTML Text New Password:...

303

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

304

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

305

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

306

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

307

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

308

V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe ColdFusion Lets Local Users Bypass Sandbox 5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: A vulnerability was reported in Adobe ColdFusion. REFERENCE LINKS: SecurityTracker Alert ID: 1027853 Adobe Vulnerability identifier: APSB12-26 CVE 2012-5675 IMPACT ASSESSMENT: High DISCUSSION: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This hotfix resolves a vulnerability which could result in a sandbox permissions violation in a shared hosting environment. Adobe recommends users update their product installation using

309

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

310

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

311

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

312

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

313

T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Red Hat system-config-firewall Lets Local Users Gain Root 1: Red Hat system-config-firewall Lets Local Users Gain Root Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges July 19, 2011 - 2:42pm Addthis PROBLEM: A vulnerability was reported in Red Hat system-config-firewall. A local user can obtain root privileges on the target system. PLATFORM Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat system-config-firewall Lets Local Users Gain Root Privileges reference LINKS: RHSA-2011:0953-1 SecurityTracker Alert ID: 1025793 CVE-2011-2520 Red hat Article ID: 11259 IMPACT ASSESSMENT: Medium Discussion: The system-config-firewall utility uses the Python pickle module in an

314

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

315

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

316

T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: VMware vmrun Utility Lets Local Users Gain Elevated 1: VMware vmrun Utility Lets Local Users Gain Elevated Privileges T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges March 30, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware. A local user can obtain elevated privileges on the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. reference LINKS: VM Advisory ID:VMSA-2011-0006 Secunia Advisory: SA43885 SecurityTracker Alert ID: 1025270 CVE-2011-1126 VM Post IMPACT ASSESSMENT: Medium Discussion: A security issue has been reported in VMware Workstation, which can be exploited by malicious, local users to gain potentially escalated

317

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

318

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

319

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

320

U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: cURL Lets Remote Users Decrypt SSL/TLS Traffic 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

322

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

323

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

324

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

325

U-095: HP Data Protector Media Operations Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP Data Protector Media Operations Lets Remote Users Execute 5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 - 1:33am Addthis PROBLEM: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code PLATFORM: Windows (2003, XP, 2008), HP Data Protector Media Operations version 6.11 and earlier ABSTRACT: Remote execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026626 HP Support Center Document ID: c03179046 CVE-2011-4791 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Data Protector Media Operations. A remote user can execute arbitrary code on the target system. Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Impact:

326

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

327

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

328

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

329

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

330

U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP MFP Digital Sending Software Lets Local Users Obtain 7: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information October 24, 2011 - 12:30pm Addthis PROBLEM: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information . PLATFORM: HP MFP Digital Sending Software v4.91.21 and all previous 4.9x versions ABSTRACT: A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information. reference LINKS: HP Advisory ID: c03052686 SecurityTracker Alert ID: 1026228 CVE-2011-3163 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP MFP Digital Sending Software running on Windows. The vulnerability could result in

331

T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Citrix XenServer Lets Local Administrative Users on the 21: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 - 3:00pm Addthis PROBLEM: A vulnerability was reported in Citrix XenServer. A local administrative user on the guest operating system can cause denial of service conditions. PLATFORM: Citrix XenServer 5.6 Feature Pack 1 and prior ABSTRACT: A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor. reference LINKS: Document ID: CTX129208 SecurityTracker Alert ID: 1025524 Document ID: CTX129103 Document ID: CTX129102 Document ID: CTX128844 Document ID: CTX129101 Document ID: CTX129100 Citrix Support IMPACT ASSESSMENT Medium Discussion:

332

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

333

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

334

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

335

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

336

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

337

U-094: EMC Documentum Content Server Lets Local Administrative Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC Documentum Content Server Lets Local Administrative 4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges February 2, 2012 - 9:15am Addthis PROBLEM: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges PLATFORM: EMC Documentum Content Server 6.0, 6.5, 6.6 ABSTRACT: EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. reference LINKS: SecurityTracker Alert ID: 1026624 EMC Resource Library CVE-2011-4144 bugtraq ESA-2012-009 IMPACT ASSESSMENT: Medium Discussion: EMC Documentum Content Server contains a security vulnerability that may allow a system administrator to elevate their or other users privileges to

338

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

339

T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux Kernel sigqueueinfo() Process Lets Local Users Send 53: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM: Userland should be able to trust the pid and uid of the sender of a signal if the si_code is SI_TKILL. PLATFORM: Version(s): prior to 2.6.38 ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. reference LINKS: OSVDB ID: 71652 SecurityTracker Alert ID: 1025690 Linux Update CVE-2011-1182 Linux Reference 1 Linux Reference 2 IMPACT ASSESSMENT: High Discussion: A local user with the ability to send signals to a process can spoof the uid and pid of the sending process via the sigqueueinfo() system call.

340

DOSFAC2 user`s guide  

Science Conference Proceedings (OSTI)

This document describes the DOSFAC2 code, which is used for generating dose-to-source conversion factors for the MACCS2 code. DOSFAC2 is a revised and updated version of the DOSFAC code that was distributed with version 1.5.11 of the MACCS code. included are (1) an overview and background of DOSFAC2, (2) a summary of two new functional capabilities, and (3) a user`s guide. 20 refs., 5 tabs.

Young, M.L.; Chanin, D.

1997-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

STANDARD USER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

REV 6/3/2010 REV 6/3/2010 Proprietary User Agreement No. PR-14- BETWEEN UT-BATTELLE, LLC. ("CONTRACTOR") Operator of Oak Ridge National Laboratory (hereinafter "Laboratory") under U.S. Department of Energy (DOE) Contract No. DE-AC05-00OR22725 and NAME OF USER INSTITUTION ("USER") (Collectively, "the Parties") The obligations of the Contractor may be transferred and shall apply to any successor in interest to said Contractor continuing the operation of the DOE facilities involved in this Proprietary User Agreement. ARTICLE I. FACILITIES AND SCOPE OF WORK CONTRACTOR will make available to employees, consultants and representatives of USER

342

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Archives Print User Meeting Archives Print Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

343

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Archives ALS User Meeting Archives Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

344

Safety for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety for Users Safety for Users Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a culture and environment where performing research using the proper safeguards and fulfilling all safety requirements result in the success of the facility and its scientific program. The documents and guidance below will assist users and staff to achieve these goals. How Do I...? A series of fact sheets that explain what users need to know and do when preparing to conduct experiments at the ALS. Complete Experiment Safety Documentation? Work with Biological Materials? Work with Chemicals? Work with Regulated Soil? Bring and Use Electrical Equipment at the ALS?

345

NSLS User Access | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

346

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting....

347

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

Awards 2012 ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User...

348

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David...

349

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

2012 ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User...

350

1998 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

8 User Survey Results 1998 User Survey Results Respondent Summary NERSC has completed its first user survey since its move to Lawrence Berkeley National Laboratory. The survey is...

351

2013 PDSF User Meering Minutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Announcements and Meetings Monthly PDSF Users Meeting Users Meeting Minutes 2013 Minutes 2013 PDSF User Meeting Minutes September 3 Attending Craig, Alex, Yuen-Dat,...

352

ORNL Neutron Sciences User Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

Staff User Office neutronusers@ornl.gov User Program Manager Laura Morris Edwards Proposal System Gabrielle Boudreau Outreach Al Ekkebus User Assistants Robbie DeJarnette Lisa...

353

HTGR Cost Model Users' Manual  

Science Conference Proceedings (OSTI)

The High Temperature Gas-Cooler Reactor (HTGR) Cost Model was developed at the Idaho National Laboratory for the Next Generation Nuclear Plant Project. The HTGR Cost Model calculates an estimate of the capital costs, annual operating and maintenance costs, and decommissioning costs for a high-temperature gas-cooled reactor. The user can generate these costs for multiple reactor outlet temperatures; with and without power cycles, including either a Brayton or Rankine cycle; for the demonstration plant, first of a kind, or nth of a kind project phases; for a single or four-pack configuration; and for a reactor size of 350 or 600 MWt. This users manual contains the mathematical models and operating instructions for the HTGR Cost Model. Instructions, screenshots, and examples are provided to guide the user through the HTGR Cost Model. This model was design for users who are familiar with the HTGR design and Excel. Modification of the HTGR Cost Model should only be performed by users familiar with Excel and Visual Basic.

A.M. Gandrik

2012-01-01T23:59:59.000Z

354

User-assisted ink-bleed reduction  

Science Conference Proceedings (OSTI)

This paper presents a novel user-assisted approach to reduce Ink-bleed interference found in old manuscripts. The problem is addressed by first having the user provide simple examples of foreground ink, ink-bleed, and the manuscript's background. From ... Keywords: document imaging processing, dual-layer Markov random field (MRF), ink-bleed reduction

Yi Huang; Michael S. Brown; Dong Xu

2010-10-01T23:59:59.000Z

355

DAKOTA JAGUAR 2.1 user's Manual.  

Science Conference Proceedings (OSTI)

JAGUAR (JAva GUi for Applied Research) is a Java software tool providing an advanced text editor and graphical user interface (GUI) to manipulate DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) input specifications. This document focuses on the features necessary for a user to use JAGUAR.

Adams, Brian M.; Lefantzi, Sophia; Chan, Ethan; Ruthruff, Joseph R.

2011-06-01T23:59:59.000Z

356

SLAC Linac Coherent Light Source User Site  

NLE Websites -- All DOE Office Websites (Extended Search)

User Logistics User Logistics Accommodations/Hours/Maps | Agreements | Check-In | Computing | Safety | Shipping | Supplies & Gases | User Feedback | Publications Proposal Submission and Scheduling Step-By-Step Instructions to Working at LCLS Review LCLS Policies Review Machine FAQ & Parameters Register and Submit Proposals Confirm User Agreement Reserve Accommodations Complete Safety Training Request Computer Account Establish User Account Ship Samples/Equipment Review Check-in Procedures Provide Feedback Inform us of Publications Participate in LCLS Users' Organization LCLS experiments start with submitting a proposal, usually due twice a year. Each proposal is for one specific experiment and each proposal is valid for one scheduling cycle only. There is no limit to the number of

357

The Annual DOE JGI User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Workshops 1 Workshops IMG Workshop Date: Monday, March 21 Time: 9:00 AM - 5:00 PM Location: Walnut Creek Marriott Audience: Users and potential users of the Integrated Microbial Genomes (IMG) data analysis systems. Description: 1-day workshop with hands-on tutorials on IMG. IMG-Metagenomes Workshop Date: Tuesday, March 22 Time: 9:00 AM - 12:00 PM Location: Walnut Creek Marriott Audience: Users and potential users of the Integrated Microbial Genomes (IMG) with Microbiome Samples (IMG/M) data analysis system. Description: half day workshop with hands-on tutorials on IMG/M. Mycocosm Workshop Date: Tuesday, March 22 Time: 9:00 AM - 12:00 PM Location: Walnut Creek Marriott Audience: Users and potential users of the Mycocosm fungal genomics portal. Description: The JGI Mycocosm web-portal provides data access,

358

Let your users do the ranking.  

Science Conference Proceedings (OSTI)

Ranking search results is a thorny issue for enterprise search. Search engines rank results using a variety of sophisticated algorithms, but users still complain that search can't ever seem to find anything useful or relevant! The challenge is to provide results that are ranked according to the users' definition of relevancy. Sandia National Laboratories has enhanced its commercial search engine to discover user preferences, re-ranking results accordingly. Immediate positive impact was achieved by modeling historical data consisting of user queries and subsequent result clicks. New data is incorporated into the model daily. An important benefit is that results improve naturally and automatically over time as a function of user actions. This session presents the method employed, how it was integrated with the search engine,metrics illustrating the subsequent improvement to the users' search experience, and plans for implementation with Sandia's FAST for SharePoint 2010 search engine.

Spomer, Judith E.

2010-12-01T23:59:59.000Z

359

Zimbra for APS Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Calendar Calendar Zimbra Calendar  ZWC Benefits: - Usable lab-wide, can schedule meetings with users and rooms outside APS - User friendly  Each Zimbra user has a personal calendar - Users migrated from Sun Calendar System optionally elected to migrate data from their personal calendar  With Zimbra, calendar terminology: - Appointments - Events - Meetings  Users can: - Create appointments - Create recurring events - Schedule all day events - Accept/Tentative/Reject an invitation with one click - Create additional calendars - Share their calendars with other users on and off-site - Delegate calendar management - Accept calendar shares - View calendar in various ways and print - Use color for quick calendar recognition - Schedule meetings * View multiple calendars to see potential scheduling

360

User_Login  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Logging In to SuccessFactors Learning Logging In to SuccessFactors Learning © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Logging In to SuccessFactors Learning Purpose The purpose of this job aid is to guide users through the step-by-step process of logging in to the SuccessFactors Learning Management System (LMS), retrieving your forgotten password and/or user ID, and using the LMS Help system. Task A. Log In to SuccessFactors Learning Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. 3 3 Log In to SuccessFactors Learning 5 Steps Task A Retrieve Forgotten Password and/or User

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

User_Navigation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Online Learning Center v 6.4 Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 1 - Online Learning Center (OLC) Job Aid: Navigation Purpose The purpose of this job aid is to guide users through the step-by-step process of navigating and identifying areas of the OLC, The Department of Energy's Learning Management System (LMS) user interface, and identifying some commonly used navigation icons. Identify Areas of the User Interface Task A Navigation Tips Task B How to Access in Online Learning Center Task C Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 2 - Online Learning Center (OLC) Task A. Identify Areas of the OLC User Interface (OLC) Top Menu: Use the Home menu options in the top menu to navigate within the Online

362

User Financial Account Form  

NLE Websites -- All DOE Office Websites (Extended Search)

URA REVISED 2/20/13 URA REVISED 2/20/13 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). Send this form with the PO (or a letter from the financial officer of your institution) to: Jackie Kerlegan (SSRL) or Theresa Wong (LCLS) User Research Administration, MS 99 User Research Administration, MS 99 SLAC National Accelerator Laboratory

363

JGI User Meeting 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

Second Annual Second Annual DOE Joint Genome Institute User Meeting Marriott Hotel Walnut Creek, California March 28-30, 2007 The U.S. Department of Energy Joint Genome Institute (JGI) welcomed its users and collaborators, as well as prospective new users, to the second annual JGI User Meeting. This international gathering of researchers with an interest in sequence-based science offered three days of user presentations, tours, workshops, and poster sessions. This was a unique opportunity to meet fellow users and JGI staff. Sessions and posters in the fields of microbial genomics, microbial communities, eukaryotic genomics, and genome technologies were presented. ©2006-2007, The Regents of the University of California. Last updated May 9, 2007. Disclaimer | Webmaster Agenda

364

Recovery Act Energy Home Improvement Loan Scam Alert | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery Act Energy Home Improvement Loan Scam Alert Recovery Act Energy Home Improvement Loan Scam Alert Recovery Act Energy Home Improvement Loan Scam Alert May 24, 2010 - 1:05pm Addthis The U.S. Department of Energy is aware of fraudulent solicitations being received through the United States Postal Service that solicit personal information for purported "Federal Energy Home Improvement Loans" under the American Reinvestment and Recovery Act. These solicitations falsely appear to be on U.S. Department of Energy letterhead, and offer recipients the prospect of obtaining up to a $50,000 loan. A sample of the fraudulent solicitation can be found here. Should you receive such a solicitation, you should not return the enclosed application, but instead report the matter immediately in one of the following manners:

365

Management Alert on Protective Force Training Facility Utilization at the Pantex Plant, IG-0855  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Alert on Protective Management Alert on Protective Force Training Facility Utilization at the Pantex Plant DOE/IG-0855 September 2011 Department of Energy Washington, DC 20585 September 27, 2011 MEMORANDUM FOR THE ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert on "Protective Force Training Facility Utilization at the Pantex Plant" IMMEDIATE CONCERN As part of our ongoing audit to determine whether the Department of Energy is effectively utilizing its protective force training facilities, we determined that the National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) plans to spend approximately $2 million for a new Physical Training/Intermediate Use of Force (PT/IUF) facility at the Pantex

366

e-Alert from Fermilab Education Office Sept 2013 - Spring 2014  

NLE Websites -- All DOE Office Websites (Extended Search)

Program E-Alert - September 2013 - Spring 2014 Program E-Alert - September 2013 - Spring 2014 Calendar * What we're planning * What we're reading ed.fnal.gov Spread the word to your colleagues. Find interesting opportunities and resources in the Fermilab Education Office E-Alert newsletter. E-mail sdahl@fnal.gov to be added to or deleted from our mailing list. Calendar Watch our website for details on these future events. September 25, 2013 - STEM Family Night Planning Workshop October 24-26, 2013 - ISEC, Tinley Park, IL Mid-November 2013 - FFSE Online Scholarship application opens. Spring 2014 -- Save the date for future events. What we're planning STEM Family Night Planning Workshop September 25, 2013 - 7:00 p.m.-9:30 p.m. ed.fnal.gov/sciadv Is your organization (school, PTA, library or co-op) planning a STEM Family

367

NSLS Industrial User Program  

NLE Websites -- All DOE Office Websites (Extended Search)

| Industrial Program Coordinator | Publications Courtesy of The New York Times, Noah Berger The overall goal of the plan to enhance the NSLS facility's Industrial Users'...

368

User account | .EDUconnections  

Office of Scientific and Technical Information (OSTI)

.EDUconnections Bookmark and Share Home Spotlight Archive Contact Search this site: Search User account Log in Request new password Username: * Enter your .EDUconnections username....

369

2012 User Meeting Workshops  

NLE Websites -- All DOE Office Websites (Extended Search)

Workshops 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots....

370

2012 User Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

2012 User Meeting Agenda Print Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You...

371

NERSC User Accounts  

NLE Websites -- All DOE Office Websites (Extended Search)

Accounts User Accounts (Logins) Acknowledge NERSC Please acknowledge in your pubications the role NERSC facilities played in your research. Read More How to get a NERSC account...

372

For Current Users: Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

of the APS Users Organization, with featured scientific talks, updates from APS and DOE management, and special workshops. Administrative Contacts Contact information by area...

373

COMcheck Software User's Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

COMcheck Software User's Guide for 90.1-2004 and 90.1-2007 Building Energy Codes Program Table Of Contents Overview ......

374

User Facility Agreement Form  

NLE Websites -- All DOE Office Websites (Extended Search)

5. Which Argonne user facility will be hosting you? * Advanced Leadership Computing Facility (ALCF) Advanced Photon Source (APS) Argonne Tandem Linear...

375

User Agreement Questionnaire  

NLE Websites -- All DOE Office Websites (Extended Search)

*required 5. Which user facility will be hosting you? *required Advanced Leadership Computing Facility (ALCF) Advanced Photon Source (APS) Argonne Tandem Linear Accelerator...

376

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

and Mike Scheinfein (Arizona State University) for development of the PEEM2 photoemission electron microscope. to the members of the ALS User Services Office (Ruth Pepe, Bernie...

377

User Facilities - Learn More  

NLE Websites -- All DOE Office Websites (Extended Search)

solving materials problems that limit the efficiency and reliability of systems for power generation and energy conversion, distribution and use. The six user centers in the High...

378

ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Submission and Performance Statistics General User Proposal Program-Most recent proposal submission metrics and trending data. Performance metrics for HFIR and SNS FY 2011 Mid-Year...

379

User Facilities - Learn More  

NLE Websites -- All DOE Office Websites (Extended Search)

Shared Research Equipment (ShaRE) The Shared Research Equipment (ShaRE) User Facility at the Oak Ridge National Laboratory (ORNL) is one of three Electron Beam...

380

EMSL: User Access  

NLE Websites -- All DOE Office Websites (Extended Search)

WHAT CAN EMSL DO FOR YOU? Researcher with microscope As a national scientific user facility with a diverse range of capabilities and expertise, EMSL has something to offer...

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

- 1171 1970 USERS EXECUTIVE COMMITTEE ELECTION C. Baltay, Columbia 870 - 572 E. C. Fowler, Purdue (Chairman 1270-572) 870 - 572 G. Masek, UCSD 870 - 572 L. Pondrom,...

382

ORNL User Week 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

User Week 2010 September 13 - 17, 2010, Oak Ridge National Laboratory, Oak Ridge, TN ORNL has an extensive history of collaborative research with colleagues in academia, other...

383

Photon Sciences | User Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Administration Postal Address User Administration Office Brookhaven National Laboratory 75 Brookhaven Avenue, Bldg. 725B Upton, NY 11973-5000 USA Office Hours Monday through...

384

STANDARD USER AGREEMENT  

allocating and scheduling usage of the User Facilities and equipment needed for or involved under this Agreement. ARTICLE VII: INDEMNITY AND LIABILITY***

385

User experience design of complex systems  

E-Print Network (OSTI)

Over recent years, the global marketplace and its consumers have developed a mutual recognition for the rising prominence of design that delivers high quality user experience. For the provider of products and services, ...

Reily, Todd R. (Todd Richard)

2012-01-01T23:59:59.000Z

386

SHUG Chairman's Message | ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

shall be the Spallation Neutron Source (SNS) and High Flux Isotope Reactor (HFIR) User Group, "SHUG." II. PURPOSE The purpose of the SHUG is to: Provide a formal and...

387

Paper Airplane user's manual : version four  

E-Print Network (OSTI)

Preface: This document provides the user with a step-by-step guide to using Paper Airplane, Version IV. Although this program can be used to design any system (once given the proper set of design equations), this manual ...

Lajoie, Ronnie M.

388

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

389

T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

664: Apache Santuario Buffer Overflow Lets Remote Users Deny 664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service July 8, 2011 - 12:32pm Addthis PROBLEM: A vulnerability was reported in Apache Santuario. A remote user can cause denial of service conditions. PLATFORM: Prior to 1.6.1 - Apache Santuario XML Security for C++ library versions prior to V1.6.1 ABSTRACT: A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. reference LINKS: SecurityTracker Alert ID: 1025755 Bugzilla: 719698: CVE-2011-2516 xml-security-c The Apache Software Foundation - CVE-2011-2516

390

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

391

U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets 7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code November 16, 2011 - 7:43am Addthis PROBLEM: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Kernel version 2.6.x ABSTRACT: A remote server can cause the target connected client to crash. reference LINKS: The Linux Kernel Archives CVE-2011-4131 SecurityTracker Alert ID: 1026324 Linux Kernel [PATCH 1/1] NFSv4 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in the Linux Kernel. A remote user can cause denial of service conditions. Impact: A remote server can return specially crafted data to the connected target

392

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

393

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

394

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

395

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

396

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

397

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

398

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

399

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

400

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

402

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:15pm 3:15pm Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

403

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

404

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

405

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

406

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

407

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

408

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:03am 7:03am Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

409

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

410

Towards user psychological profile  

Science Conference Proceedings (OSTI)

Recents studies have demonstrated how useful and fundamental psychological aspects such as people Personality Traits and Emotions are during human decision-making process. Some research towards the identification and model of user's Emotions have been ... Keywords: personality traits, recommendation, reputation, user psychological profile

Maria Augusta S. N. Nunes; Stefano A. Cerri; Nathalie Blanc

2008-10-01T23:59:59.000Z

411

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

412

The EMA system: a CTI based e-mail alerting service  

Science Conference Proceedings (OSTI)

The integration of Internet services and telephony services is a new area for the development of telecommunications services. One example is an e-mail alerting service that uses the telephony network for e-mail notification. The EMA system is a computer ...

D. Frank; H. Lucic; M. Opsenica; L. Puksec; M. Zic; S. Brajkovic; V. Maricic

2000-02-01T23:59:59.000Z

413

Design of Electric or Hybrid vehicle alert sound system for pedestrian  

E-Print Network (OSTI)

on a track of our test center located in La Ferté Vidame. Two cars were used: -a diesel-vehicle - an electricDesign of Electric or Hybrid vehicle alert sound system for pedestrian J.-C. Chamard and V, France 1691 #12;The arrival of fully or hybrid electric vehicles raised safety problems respect

Paris-Sud XI, Université de

414

Alert correlation in collaborative intelligent intrusion detection systems-A survey  

Science Conference Proceedings (OSTI)

As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuse- and anomaly-based. ... Keywords: Alert correlation, Collaborative intrusion detection, Computational intelligence approaches, False positive analysis

Huwaida Tagelsir Elshoush; Izzeldin Mohamed Osman

2011-10-01T23:59:59.000Z

415

An Alert Classification System for Monitoring and Assessing the ENSO Cycle  

Science Conference Proceedings (OSTI)

An alert classification system for the ENSO cycle is introduced. The system includes watches, advisories, and a five-class intensity scale for warm and cold phases of the ENSO cycle. A watch is issued when conditions are favorable for the ...

V. E. Kousky; R. W. Higgins

2007-04-01T23:59:59.000Z

416

my account e-alert subscribe register Can quantum computers be  

E-Print Network (OSTI)

my account e-alert subscribe register Can quantum computers be made with solid-state electronics & Ecology Genetics Immunology Materials Science Medical Research 28 August 2004 Quantum computers get in tune Ultra-powerful quantum computers could use nanoscale resonators for passing information between

Geller, Michael R.

417

TMAP7 User Manual  

DOE Green Energy (OSTI)

The TMAP Code was written at the Idaho National Engineering and Environmental Laboratory by Brad Merrill and James Jones in the late 1980s as a tool for safety analysis of systems involving tritium. Since then it was upgraded to TMAP4 and has been used in numerous applications including experiments supporting fusion safety, predictions for advanced systems such as the International Thermonuclear Experimental Reactor (ITER), and estimates involving tritium production technologies. Its further upgrade to TMAP2000 and now to TMAP7 was accomplished in response to several needs. TMAP and TMAP4 had the capacity to deal with only a single trap for diffusing gaseous species in solid structures. TMAP7 includes up to three separate traps and up to 10 diffusing species. The original code had difficulty dealing with heteronuclear molecule formation such as HD and DT under solution-law dependent diffusion boundary conditions. That difficulty has been overcome. TMAP7 automatically generates heteronuclear molecular partial pressures when solubilities and partial pressures of the homonuclear molecular species are provided for law-dependent diffusion boundary conditions. A further sophistication is the addition of non-diffusing surface species. Atoms such as oxygen or nitrogen or formation and decay or combination of hydroxyl radicals on metal surfaces are sometimes important in reactions with diffusing hydrogen isotopes but do not themselves diffuse appreciably in the material. TMAP7 will accommodate up to 30 such surface species, allowing the user to specify relationships between those surface concentrations and partial pressures of gaseous species above the surfaces or to form them dynamically by combining diffusion species or other surface species. Additionally, TMAP7 allows the user to include a surface binding energy and an adsorption barrier energy. The code includes asymmetrical diffusion between the surface sites and regular diffusion sites in the bulk. All of the previously existing features for heat transfer, flows between enclosures, and chemical reactions within the enclosures have been retained, but the allowed problem size and complexity have been increased to take advantage of the greater memory and speed available on modern computers. One additional feature unique to TMAP7 is the addition of radioactive decay for both trapped and mobile species. Whereas earlier versions required a separate FORTRAN compiler to operate, TMAP7 is based on a publiclicense compiler, distributed with the code.

Glen R. Longhurst

2008-12-01T23:59:59.000Z

418

Identification of User Facility Related Publications  

SciTech Connect

Scientific user facilities provide physical resources and technical support that enable scientists to conduct experiments or simulations pertinent to their respective research. One metric for evaluating the scientific value or impact of a facility is the number of publications by users as a direct result of using that facility. Unfortunately, for a variety of reasons, capturing accurate values for this metric proves time consuming and error-prone. This work describes a new approach that leverages automated browser technology combined with text analytics to reduce the time and error involved in identifying publications related to user facilities. With this approach, scientific user facilities gain more accurate measures of their impact as well as insight into policy revisions for user access.

Patton, Robert M [ORNL; Stahl, Christopher G [ORNL; Potok, Thomas E [ORNL; Wells, Jack C [ORNL

2012-01-01T23:59:59.000Z

419

Provider issues in quality-constrained data provisioning  

Science Conference Proceedings (OSTI)

Formal frameworks exist that allow service providers and users to negotiate the quality of a service. While these agreements usually include non-functional service properties, the quality of the information offered by a provider is neglected. Yet, in ...

Paolo Missier; Suzanne Embury

2005-06-01T23:59:59.000Z

420

User modelling for live help systems: initial results  

Science Conference Proceedings (OSTI)

This paper explores the role of user modelling in live help systems for e-commerce web sites. There are several potential benefits with user modelling in this context: 1) Human assistants can use the personal information in the user models to provide ...

Johan Aberg; Nahid Shahmehri; Dennis Maciuszek

2001-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Montana Rivers Information System: Edit/entry program user`s manual  

DOE Green Energy (OSTI)

The Montana Rivers Information System (MRIS) was initiated to assess the state`s fish, wildlife, and recreation value; and natural cultural and geologic features. The MRIS is now a set of data bases containing part of the information in the Natural Heritage Program natural features and threatened and endangered species data bases. The purpose of this User`s Manual is to: (1) describe to the user how to maintain the MRIS database of their choice by updating, changing, deleting, and adding records using the edit/entry programs; and (2) provide to the user all information and instructions necessary to complete data entry into the MRIS databases.

Not Available

1992-07-01T23:59:59.000Z

422

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

423

SOWFA + Super Controller User's Manual  

DOE Green Energy (OSTI)

SOWFA + Super Controller is a modification of the NREL's SOWFA tool which allows for a user to apply multiturbine or centralized wind plant control algorithms within the high-fidelity SOWFA simulation environment. The tool is currently a branch of the main SOWFA program, but will one day will be merged into a single version. This manual introduces the tool and provides examples such that a user can implement their own super controller and set up and run simulations. The manual only discusses enough about SOWFA itself to allow for the customization of controllers and running of simulations, and details of SOWFA itself are reported elsewhere Churchfield and Lee (2013); Churchfield et al. (2012). SOWFA + Super Controller, and this manual, are in alpha mode.

Fleming, P.; Gebraad, P.; Churchfield, M.; Lee, S.; Johnson, K.; Michalakes, J.; van Wingerden, J. W.; Moriarty, P.

2013-08-01T23:59:59.000Z

424

User_TalentProfile  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Accessing and Modifying Talent Profile Accessing and Modifying Talent Profile © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Accessing and Modifying Talent Profile Purpose The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile information. Task A. Access Talent Profile Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. Access Talent Profile 4 Steps Task A Add Information to Talent Profile Sections 5 Steps Task B Edit Talent Profile Sections

425

REScheck Software User's Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

REScheck Software REScheck Software User's Guide Building Energy Codes Program Table Of Contents Overview ................................................................................... 1 Tutorials ................................................................................. 2 Table Columns and Rows ............................................................. 3 Rows ...................................................................................... 3 Columns ................................................................................. 5 Project Information ..................................................................... 7 Location.................................................................................. 7 Project Type (2006 IECC) ..........................................................

426

JGI Compute User Training  

NLE Websites -- All DOE Office Websites (Extended Search)

JGI Compute JGI Compute User Training Series JGI Compute User Training Series homeh1 Overview NERSC and IT staff will host a series training sessions and open office hours to introduce new services and review best practices for using the Crius cluster. All sessions are hands on, so please bring your laptop. If you are or were a user of any of the following systems, Crius, Rhea, Kronos, Theia, Oceanus or Phoebe, it will be beneficial for you to attend these training sessions. And if you plan to use JGI compute resources in the future, we also encourage you to attend. It will also be an opportunity for JGI compute users to ask questions and give NERSC and IT staff feedback on your requirements. Session 3: February 24th, 2012 1:30-5pm rm 100-101 Agenda 1:30-1:45 - Intro and presentation of the transition schedule we talked

427

Bevalac user's handbook  

SciTech Connect

This report is a users manual on the Bevalac accelerator facility. This paper discuses: general information; the Bevalac and its operation; major facilities and experimental areas; and experimental equipment.

Not Available

1990-04-01T23:59:59.000Z

428

International aeronautical user charges  

E-Print Network (OSTI)

Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

Odoni, Amedeo R.

1985-01-01T23:59:59.000Z

429

User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Community Tim Renner was a beamline scientist at the ALS who died at an early age, and who during his career touched everyone that knew him with his caring attitude to...

430

2011 User Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

11:00 The Energy Sciences Network: Moving Data, Advancing Science Eli Dart, LBNL ESnet 11:30 Lunch (ALS Patio and Exhibitor Tent) 12:45 2011 User Meeting Workshops 14:45...

431

ALS User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Print Due to the current lapse of federal funding, Berkeley Lab Web sites, including ALS sites, are accessible, but may not be updated until Congress approves...

432

Partner Users Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Partner User Council Members Back Row (standing) from left: Andrzej Joachimiak (SBC-CAT), Bruce Bunker (MR-CAT), Jim Viccaro (CARS-CAT), Wayne Anderson (LS-CAT), Robert Gordon...

433

User’s guide Version 8 - Energy Information Administration  

U.S. Energy Information Administration (EIA)

Form EIA-176 Query System User’s guide Version 8.0 Energy Information Administration U.S. Department of Energy ...

434

Service/Product Provider  

NLE Websites -- All DOE Office Websites (Extended Search)

construction, installed unit controls and installed a Web-based Building Management System. Benham provided 14 Air Rotation Units (ARU) with related field devices, metering, and...

435

Providing Grid Flexibility in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Providing Grid Flexibility in Wyoming and Montana Introduction Powder River Energy Corporation (PRECorp) is an electric cooperative serving approximately 11,900 customers in a...

436

Demonstration and Validation Assets: User Manual Development  

SciTech Connect

This report documents the development of a database-supported user manual for DEMVAL assets in the NSTI area of operations and focuses on providing comprehensive user information on DEMVAL assets serving businesses with national security technology applications in southern New Mexico. The DEMVAL asset program is being developed as part of the NSPP, funded by both Department of Energy (DOE) and NNSA. This report describes the development of a comprehensive user manual system for delivering indexed DEMVAL asset information to be used in marketing and visibility materials and to NSTI clients, prospective clients, stakeholders, and any person or organization seeking it. The data about area DEMVAL asset providers are organized in an SQL database with updateable application structure that optimizes ease of access and customizes search ability for the user.

None

2008-06-30T23:59:59.000Z

437

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

2 ALS User Meeting Awards 2012 ALS User Meeting Awards Print Wednesday, 10 October 2012 15:30 Recipients of the 2012 Users' Executive Committee awards and Student Poster...

438

DYN-OPT Users Manual  

E-Print Network (OSTI)

Hall (1996). LANE-OPT Users Manual Version 1.0, PATH WorkingBERKELEY DYN-OPT Users Manual Cenk Caliskan Randolph W. Hall1055-1417 DYN-OPT Users Manual December, 1996 Cenk Caliskan

Caliskan, C.; Hall, R. W.

1997-01-01T23:59:59.000Z

439

ORP Providers ORP Employee  

E-Print Network (OSTI)

Original Amended ORP Providers ORP Employee Voluntary Contribution Investment Providers Biweekly.14% (Tax Sheltered Annuities in addition to ORP) Enter as a dollar amount or a percent 4B ING 403(b) % 4P __________________ Date Processed _______________ University of Central Florida Voluntary Contributions for ORP

Foroosh, Hassan

440

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

442

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

443

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

444

User Facilities in the Environmental Assessment Division (EVS...  

NLE Websites -- All DOE Office Websites (Extended Search)

The ARM Climate Research Facility, a Department of Energy (DOE) Office of Science user facility, provides data from strategically located climate observatories around the...

445

Neutron and Nano User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Science @ Neutron and Nano Facilities User Workshops Integrated Agendas Venue Travel Information Contacts and Sponsors Registration Talks Neutron and Nano User Meeting August...

446

User contributions | Open Energy Information  

Open Energy Info (EERE)

(Geochart) 16:53, 31 January 2013 (diff | hist) . . (+95) . . User:JayhugginsTest (top) 16:31, 31 January 2013 (diff | hist) . . (+214) . . User:JayhugginsTest...

447

Diversity at Fermilab - User Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

User Contacts Fermilab users with concerns or questions about discriminatory treatment can get in touch with the designated Fermilab representative for each experiment. Mike...

448

Biological and Environmental Research User Facilities | U.S. DOE Office of  

Office of Science (SC) Website

BER User Facilities BER User Facilities User Facilities ASCR User Facilities BES User Facilities BER User Facilities FES User Facilities HEP User Facilities NP User Facilities User Facilities Frequently Asked Questions User Facility Science Highlights Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 BER User Facilities Print Text Size: A A A RSS Feeds FeedbackShare Page The Biological & Environmental Research program supports the operation of the following national scientific user facilities: William R. Wiley Environmental Molecular Sciences Laboratory (EMSL): External link The mission of the EMSL at the Pacific Northwest National Laboratory (PNNL) External link in Richland, Washington, is to provide integrated experimental and

449

Advanced Scientific Computing Research User Facilities | U.S. DOE Office of  

Office of Science (SC) Website

ASCR User Facilities ASCR User Facilities User Facilities ASCR User Facilities BES User Facilities BER User Facilities FES User Facilities HEP User Facilities NP User Facilities User Facilities Frequently Asked Questions User Facility Science Highlights Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 ASCR User Facilities Print Text Size: A A A RSS Feeds FeedbackShare Page The Advanced Scientific Computing Research program supports the operation of the following national scientific user facilities: Energy Sciences Network (ESnet): External link The Energy Sciences Network, or ESnet External link , is the Department of Energy's high-speed network that provides the high-bandwidth, reliable connections that link scientists at national laboratories, universities and

450

User Charter Rights and Responsibilities of Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

-G01182/gim -G01182/gim User Charter Rights and Responsibilities of Neutron Sciences Users Rights of Users: * Be treated with respect and courtesy. * Have details of experiment proposals kept confidential. * Have consultations with instrument staff before proposal submission, during experiment planning, and while evaluating results and analyzing data. * Receive beam time on the basis of external peer evaluation of submitted proposals. Users can

451

User Facilities | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

User User Facilities Scientific User Facilities (SUF) Division SUF Home About User Facilities X-Ray Light Sources Neutron Scattering Facilities Nanoscale Science Research Centers Electron-Beam Microcharacterization Centers Accelerator & Detector Research & Development Principal Investigators' Meetings Scientific Highlights Construction Projects BES Home User Facilities Print Text Size: A A A RSS Feeds FeedbackShare Page BES User Facilities Brochure .pdf file (7.4MB)Brochure .pdf file (7.4MB) The BES user facilities provide open access to specialized instrumentation and expertise that enable scientific users from universities, national laboratories, and industry to carry out experiments and develop theories that could not be done at their home institutions. These forefront research facilities require resource commitments well

452

SLAC Linac Coherent Light Source User Site  

NLE Websites -- All DOE Office Websites (Extended Search)

User Support Contact information for LCLS scientific, operations and user support staff. User Support For information about user research administration at LCLS or SSRL. Cathy...

453

User_RunReports  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Running Standard Reports Running Standard Reports © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Running Standard Reports Purpose The purpose of this job aid is to guide users through the step-by-step process of running standard reports in SuccessFactors Learning. Task A. Run Standard Report From the Home page, click the Reports easy link. In the Report Name table, locate the report you want to generate. Click the expand icon ( ) to expand the report group. Click the title link. For this example, select the User Curriculum Status Group by Item Details report. Note: Click Help ( ) for additional information on reports. 1 1 2 2 3 3 Run Standard Report 13 Steps Task A SuccessFactors Learning v 6.4 User Job Aid

454

General User Proposal Scores  

NLE Websites -- All DOE Office Websites (Extended Search)

General User Proposal Scores General User Proposal Scores General User Proposal Scores Print Tuesday, 01 June 2010 10:34 Scoring Proposals are scored on a scale of 1 to 5, with 1 being the best score and 5 the worst. Reviewers are requested to use the following ranking schema: Must do High Priority Medium Priority Low priority Don't do Beam time is assigned based on each proposal's score in relation to all other proposals for a given beamline. For beamlines where beamtime requests exceed available beamtime, a cutoff score is assigned after which no beam time is allocated. proposal scores Beam Time Cutoff Scores for the Current Cycle The table below lists the percent of beam time shifts allocated/requested for each beamline, and the cutoff scores, below which no beam time was assigned.

455

User Electrical Inspection Criteria  

NLE Websites -- All DOE Office Websites (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria User Electronic and Electrical Equipment Inspection Criteria Any electrical or electronic equipment users bring to the APS will have to be inspected. In some cases, this inspection will be quite simple, e.g., if the equipment has already been inspected by a Nationally Recognized Testing Laboratory (NRTL) and is used for its designed purpose. Other equipment will require a more thorough inspection (this may include NRTL inspected equipment if it is assembled into an apparatus with other components). The inspection is based on an eight-part list of criteria. Paraphrased, those criteria are: The equipment must be suitable for its intended use (and if appropriate, installation). For example, a heater controller intended to control a 1000W heater cannot be used to control a 2000W heater. The

456

Fermilab Users' Meeting, 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

6-7, 2007 6-7, 2007 The annual gathering of the Fermilab Users Organization will be held on June 6-7, 2007. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans This year, both an Outreach Workshop and a Grad Students' Meeting / Career Night (sponsored by the GSA) will be held in association with the Users Meeting on June 5. Watch this page for links to more information on those associated meetings as they become available. Registration Reserve Tickets (for the public lecture by Dr. George Smoot)

457

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

User Science Images User Science Images User Science Images Sort by: Default | Name | Date (low-high) | Date (high-low) | Category NIMROD-1.png FES: NIMROD Simulation February 18, 2010 | Author(s): Dr. Charlson C. Kim (University of Washington) | Category: Fusion Energy | URL: https://nimrodteam.org/ Download Image: NIMROD-1.png | png | 1.5 MB Trajectory of an energetic ion in a Field Reverse Configuration (FRC) magnetic field. Magnetic separatrix denoted by green surface. Spheres are colored by azimuthal velocity. Image courtesy of Charlson Kim, University of Washington; NERSC repos m487, mp21, m1552 Scheibe.png BER: Pore-Scale Fluid Flow for Subsurface Reactive Transport January 1, 2008 | Author(s): Timothy D. Scheibe, PNNL | Category: Environmental Science | URL: http://http://subsurface.pnl.gov/

458

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

459

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

460

V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Cisco Mobility Services Engine Configuration Error Lets 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an unauthenticated, remote attacker to connect to a database replication port anonymously via Secure Sockets Layer (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to the misconfiguration of the Oracle SSL service. An attacker could exploit this vulnerability by connecting to an

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

User's guide to DOE facilities  

SciTech Connect

The Department of Energy's research laboratories represent valuable, often unique, resources for university and industrial scientists. It is DOE policy to make these laboratories and facilities available to qualified scientists. The answers to such questions as who are eligible, what and where are the facilities, what is the cost, when can they be used, are given. Data sheets are presented for each facility to provide information such as location, user contact, description of research, etc. A subject index refers to areas of research and equipment available.

Not Available

1984-01-01T23:59:59.000Z

462

MRDAP User/Developer Documentation  

SciTech Connect

The Multi-Reactor Design and Analysis Platform (MRDAP) is designed to simplify the creation, transfer and processing of data between computational codes. MRDAP accomplishes these objectives with three parts: 1. allows each integrated code, through a plugin, to specify the required input for execution and the required output needed, 2. creates an interface for execution and data transfer, 3. enables the creation of Graphical User Interfaces (GUI) to assist with input preparation and data visualization. Ultimately, the main motivation of this work is to enable analysts (who perform reactor physics calculations routinely), by providing a tool that increases efficiency and minimizes the potential for errors or failed executions.

Joshua Cogliati; Michael Milvich

2009-09-01T23:59:59.000Z

463

Rivet user manual  

E-Print Network (OSTI)

This is the manual and user guide for the Rivet system for the validation and tuning of Monte Carlo event generators for high energy physics. As well as the core Rivet library, this manual describes the usage of the rivet program and the AGILe generator interface library. The depth and level of description is chosen for users of the system, starting with the basics of using validation code written by others, and then covering sufficient details to write new Rivet analyses and calculational components.

Andy Buckley; Jonathan Butterworth; David Grellscheid; Hendrik Hoeth; Leif Lonnblad; James Monk; Holger Schulz; Frank Siegert

2010-03-02T23:59:59.000Z

464

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

465

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

466

APS User News, Issue 73  

NLE Websites -- All DOE Office Websites (Extended Search)

3, September 15, 2011 3, September 15, 2011 CONTENTS DIRECTOR'S CORNER USER MATTERS -- Tweet Time! APS Beamlines Now Tweet Operational Status Info -- Changes to User Electrical Safety Training Requirements -- Groundbreaking for the New Advanced Protein Crystallization Facility -- Meg Vigliocco-Hagen, APS General User Program Administrator, Retires! -- Meet Beverly Knott, New APS Beam Time Access Administrator -- Safety Snippets: Practice Good Housekeeping BRIEFLY NOTED -- 4th Annual Postdoctoral Research Symposium: Registration Deadline September 21 -- 2011 Advanced Light Source Users' Meeting, October 3-5, 2011 -- 2011 SSRL/LCLS Annual Users' Meeting & Workshops, October 22-26, 2011 -- General Users Proposals Now Being Accepted -- Changes to User Training Course Requirements

467

User Authentication Policy | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

468

User Services | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Services User Support Machine Status Presentations Training & Outreach User Survey User Services The ALCF User Assistance Center provides support for ALCF resources. The center's normal support hours are 9 a.m. until 5 p.m. (Central time) Monday through Friday, exclusive of holidays. Contact Us Email: support@alcf.anl.gov Telephone: 630-252-3111 866-508-9181 Service Desk: Building 240, 2-D-15/16 Argonne National Laboratory 9700 South Cass Avenue Argonne, IL 60439 Trouble Ticket System You can check the status of your existing tickets as well as send new support tickets. To do this, log in with your ALCF username and ALCF web accounts system password. (This is the password you chose when you requested your account, or which was assigned to you and sent with your new

469

FACET: SLAC___s New User Facility  

Science Conference Proceedings (OSTI)

FACET (Facility for Advanced Accelerator Experimental Tests) is a new User Facility at SLAC National Accelerator Laboratory. The first User Run started in spring 2012 with 20 GeV, 3 nC electron beams. The facility is designed to provide short (20 {micro}m) bunches and small (20 {micro}m wide) spot sizes, producing uniquely high power beams. FACET supports studies from many fields but in particular those of Plasma Wakefield Acceleration and Dielectric Wakefield Acceleration. The creation of drive and witness bunches and shaped bunch profiles is possible with 'Notch' Collimation. FACET is also a source of THz radiation for material studies. Positrons will be available at FACET in future user runs. We present the User Facility and the available tools and opportunities for future experiments.

Clarke, C.I.; Decker, F.-J.; England, R.J.; Erickson, R.A.; Hast, C.; Hogan, M.J.; Li, S.Z.; Litos, M.D.; Nosochkov, Y.; Seeman, J.T.; Sheppard, J.; Wienands, U.; Woodley, M.; Yocky, G.; /SLAC

2012-05-16T23:59:59.000Z

470

VULCAN User Information | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

Useful Information for VULCAN Users Useful Information for VULCAN Users Become a VULCAN User Contact us for capabilities, experiment design, and development of proposals. Refer to VULCAN Proposal Key Points before writing the proposal. Submit your proposal Approved Proposals You will be notified of an experiment date and will need to confirm the date by replying to the email and the experiment in the IPTS system. Prepare and Ship Your Samples We recommend VULCAN standard samples. If you cannot provide standard sample geometry, please prepare grip adapters. Ship your samples Non-activated samples coming to SNS: Attention: Special requirements (like refrigeration) To: Neutron Sciences User Sample IPTS # XXXX, Beam line 7 Oak Ridge National Laboratory/SNS Site Chestnut Ridge, Bldg 8920 Oak Ridge, TN 37830

471

Manufactured Home Energy Audit user`s manual  

SciTech Connect

The Manufactured Home Energy Audit (MHEA) is a software tool that predicts manufactured home energy consumption and recommends weatherization retrofit measures. It was developed to assist local weatherization agencies working with the US Department of Energy (DOE) Weatherization Assistance Program. Whether new or experienced, employed within or outside the Weatherization Assistance Program, all users can benefit from incorporating MHEA into their manufactured home weatherization programs. DOE anticipates that the state weatherization assistance programs that incorporate MHEA into their programs will find significant growth in the energy and cost savings achieved from manufactured home weatherization. The easy-to-use MHEA displays a colorful, graphical interface for entering simple inputs and provides understandable, usable results. The user enters information about the manufactured home construction, heating equipment, cooling equipment, and weather site. MHEA then calculates annual energy consumption using a simplified building energy analysis technique. MHEA stands apart from other building energy analysis tools in many ways. Calculations incorporated into the computer code specifically address manufactured home heating and cooling load trends. The retrofit measures evaluated by MHEA are all applicable to manufactured homes. Help messages describe common manufactured home weatherization practices as well as provide hints on how to install retrofit measures. These and other features help make MHEA easy to use when evaluating energy consumption and the effects of weatherization retrofit measures for manufactured homes.

NONE

1997-09-01T23:59:59.000Z

472

2002 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

2 User Survey Results 2 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2002 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years Visualization and Grid Computing Web, NIM, and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary Many thanks to the 300 users who responded to this year's User Survey -- this represents the highest response level in the five years we have conducted the survey. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. You can see the FY 2002 User Survey text, in which users rated us on a 7-point satisfaction scale. Some areas were also rated on a 3-point

473

Data Provider Questions  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Home Data Provider Questions At the beginning the process of archival with the ORNL DAAC, you will be asked to fill out a short online form to help us better understand your data set. These questions should only take a few minutes to answer. Information About Your Data Set Have you looked at our recommendations for the preparation of data files and documentation? Who produced this data set? What agency and program funded the project? What awards funded this project? (comma separate multiple awards) Data Set Description Provide a title for your data set. (maximum 84 characters) What type of data does your data set contain? What does the data set describe? (2-3 sentences) What parameters did you measure, derive, or generate? (comma separated, limit to ten) Have you analyzed the uncertainty in your data?

474

T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users 9:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service September 16, 2011 - 11:30am Addthis PROBLEM: Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service PLATFORM: Apache version(s) prior to 2.2.21 ABSTRACT: A remote user can cause the backend server to remain in an error state until the retry timeout expires. reference LINKS: SecurityTracker Alert ID: 1026054 Apache Releases CVE-2011-3348 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache mod_proxy_ajp. A remote user can cause denial of service conditions. When mod_proxy_ajp is used together with mod_proxy_balancer, a remote user can send specially crafted HTTP requests to place the backend server in an error state until the retry

475

User-centric PKI  

Science Conference Proceedings (OSTI)

The goal of supporting Single Sign-On to the Web has proven elusive. A number of solutions have been proposed -- and some have even been deployed -- but the capability remains unavailable to most users and the solutions deployed raise concerns for both ... Keywords: PKI, authentication, single sign-on, web services

Radia Perlman; Charlie Kaufman

2008-03-01T23:59:59.000Z

476

ITOUGH2 user`s guide version 2.2  

Science Conference Proceedings (OSTI)

ITOUGH2 is a program to estimate hydrogeologic model parameters for the numerical simulator TOUGH2. TOUGH2 was developed by Karsten Pruess at Lawrence Berkeley Laboratory for simulating non-isothermal flows of multicomponent, multiphase fluids in porous and fractured media. ITOUGH2 solves the inverse problem by automatic model calibration based on an indirect approach, in which some function of the difference between observed and model-predicted system response and appropriately weighted prior information about the parameters is minimized using standard optimization techniques. ITOUGH2 also provides a detailed error analysis of the estimated parameter set, and employs some procedures to study error propagation for prediction runs. This report includes a review of the inverse modeling theory, and a detailed description of the program architecture, input language, and the various user features provided by ITOUGH2. A sample problem is given to illustrate code application.

Finsterle, S.

1993-08-01T23:59:59.000Z

477

Service/Product Provider  

NLE Websites -- All DOE Office Websites (Extended Search)

DTE Energy Ford Motor Company DTE Energy Ford Motor Company 2000 Second Ave. 550 Town Center Dr., Ste. 200 Detroit, MI 48266 Dearborn, MI 48126 Business: Utility Energy Consultant Business: Automotive George Biandis, Principal Supervisor Bill Allemon, Energy Program Manager Phone: 313-235-5179 Phone: 313-323-7910 Email: biandisg@dteenergy.com Email: wallemon@ford.com DTE Energy assists Ford with energy initiatives and realizes $40 million in annual savings. Project Scope Since 1995, DTE Energy has supplemented the Ford energy team and assisted in identifying, developing, and implementing over 550 energy saving projects and initiatives. Project Summary DTE Energy has provided project engineering and management services to perform energy surveys

478

Service/Product Provider  

NLE Websites -- All DOE Office Websites (Extended Search)

Wheatstone Energy Frito-Lay Wheatstone Energy Frito-Lay 1975 The Exchange, Ste. 320 7701 Legacy Dr. Atlanta, GA 30339 Plano, TX 75024 Business: Lighting, Electrical, HVAC Business: Snack Foods James B. Dore, Director, Sales and Marketing Rob Schasel, Director, Energy & Utilities Phone: 770-916-7107 Phone: 972-334-5567 Email: jim.dore@wheatstoneenergy.com Email: robert.d.schasel@fritolay.com Frito-Lay leverages its energy effort by partnering with Wheatstone Energy to identify and implement lighting improvements resulting in savings of $2.2 million. Project Scope Wheatstone provided turnkey services in upgrading the lighting systems at 96 distribution centers and 16 snack food production plants across North America. Project Summary In addressing lighting retrofits and lighting control strategies, Wheatstone's turnkey services included

479

NERSC User Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Environment NERSC User Environment Home Directories, Shells and Startup Files All NERSC systems (except PDSF) use global home directories, which are are pre-populated with startup files (also known as dot files) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Changing Your Default Login Shell Use the NERSC Information management (NIM) portal if you want to to change your default login shell. To do this, select Change Shell from the NIM Actions pull-down menu. Managing Your Startup Files The "standard" dot-files are symbolic links to read-only files that NERSC controls. For each standard dot-file, there is a user-writable ".ext" file.

480

User_Sup_Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Employees (Supervisors) Employees (Supervisors) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Managing Employees (Supervisors) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing employees within SuccessFactors Learning. Task A. Open and View a Employee's Record From the Home page, select the My Employees tab. 1 1 Run Reports 5 Steps Task C Approve or Deny Training Requests 9 Steps Task B Open and View an Employee's Record 5 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Managing Employees (Supervisors) © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Confidential. All rights reserved. The My Employees section is designed to

Note: This page contains sample records for the topic "alerts provide users" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

NERSC User Group Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC User Group Meeting NERSC User Group Meeting Oct 18, 2010 Outline * About OpenMP * Parallel Regions * Worksharing Constructs * Synchronization * Data Scope * Tasks * Using OpenMP at NERSC 2 3 Common Architectures * Shared Memory Architecture - Multiple CPUs share global memory, could have local cache - Uniform Memory Access (UMA) - Typical Shared Memory Programming Model: OpenMP, Pthreads, ... * Distributed Memory Architecture - Each CPU has own memory - Non-Uniform Memory Access (NUMA) - Typical Message Passing Programming Model: MPI, ... * Hybrid Architecture - UMA within one SMP node - NUMA across nodes - Typical Hybrid Programming Model: mixed MPI/OpenMP, ... What is OpenMP * OpenMP is an industry standard API of C/C++ and Fortran for shared memory parallel programming.

482

User_Sup_Registration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Registration (Supervisor) Registration (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Registration (Supervisor) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing the registration of employees into scheduled offerings within SuccessFactors Learning. Task A. Register Employees in a Scheduled Offering From the Home page, click the My Employees tab. Click the Register/Withdraw Employees Supervisor Link. View Employee's Registrations 3 Steps Task C Withdraw Employees from a Scheduled Offering - 14 Steps Task B Register Employees in a Scheduled Offering - 17 Steps Task A 1 1 2 2 SuccessFactors Learning v 6.4 User Job Aid Registration (Supervisor)

483

NERSC Users Group  

NLE Websites -- All DOE Office Websites (Extended Search)

NUGEX NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconfernces and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There are three representatives from each office and three members-at-large. Name Institution Email Address DOE Office Term Expires PI's Project Title Mark Adams Columbia University mark.adams@columbia.edu ASCR Dec 2015 Composable Hierarchically Nested Solvers Anubhav Jain Berkeley Lab

484

User_LaunchSurvey  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Completing Assigned Survey and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching and Completing Assigned Survey Purpose The purpose of this job aid is to guide users through the step-by-step process of launching and completing assigned surveys. Task A. Launch and Complete Assigned Survey From the Home page, f