Powered by Deep Web Technologies
Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

2

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

3

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

4

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

5

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

6

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

7

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

8

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

9

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

10

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

11

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

12

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

13

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

14

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

15

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

16

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

17

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

18

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

19

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

20

Safari 2000:  

NLE Websites -- All DOE Office Websites (Extended Search)

Southern African Regional Science Initiative: Southern African Regional Science Initiative: Safari 2000: Science Plan Edited by R. J. Swap and H. J. Annegarn 1 Department of Environmental Science, University of Virginia, USA 1 Department of Geology, University of the Witwatersrand, RSA Contributing Authors B. Cook, P. Desanker, G. Djolov, B. Doddridge, P. Dowty, P. Frost, M. Garstang, C. Justice, M. King, D. Kwesha, D. Lesolle, L. Marufu, L. Otter, K. Pienaar, S. Piketh, A. Pinheiro, S. Platnick, J. Privette, S. Ringrose, M. Scholes, R. Scholes, Y. Scorgie, H. Shugart, T. Suttles Additional Contributors* *This document includes ideas initially proposed at the SAFARI planning meetings. The participants in those meetings, listed in Appendix A, are acknowledged for their contributions.

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

SAFARI 2000 Project  

NLE Websites -- All DOE Office Websites (Extended Search)

SAFARI 2000 (S.Africa) SAFARI 2000 (S.Africa) The SAFARI 2000 (S2K) Project Overview [SAFARI 2000 Logo] The SAFARI 2000 (S2K) Project was an international science initiative to study the linkages between land and atmosphere processes in the southern African region. In addition, SAFARI 2000 examined the relationship of biogenic, pyrogenic, and anthropogenic emissions and the consequences of their deposition to the functioning of the biogeophysical and biogeochemical systems. This initiative began in 1999 and concluded in 2001, and was built around a number of ongoing, already-funded activities by NASA, the international community, and African nations in the southern African region. Historical data from 1973 through 1995 were compiled as background data. The ORNL DAAC SAFARI 2000 Data archive includes 109 data products from the

22

Apple Education iTunes U User's Guide  

E-Print Network (OSTI)

Apple Education iTunes U User's Guide September 4, 2007 #12; Apple Inc. © 2007 Apple Inc. All rights reserved. Apple, the Apple logo, iPod, iTunes, Mac, and QuickTime are trademarks of Apple Inc., registered in the U.S. and other countries. Apple TV, iPhone, and Safari are trademarks of Apple Inc. i

Bieber, Michael

23

Apple Education iTunes U User's Guide  

E-Print Network (OSTI)

Apple Education iTunes U User's Guide December 11, 2006 #12; Apple Computer, Inc. © 2006 Apple Computer, Inc. All rights reserved. Apple, the Apple logo, iPod, iTunes, and Mac are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Safari is a trademark of Apple Computer, Inc. i

Li, Teng

24

SAFARI 2000 Special Issue  

NLE Websites -- All DOE Office Websites (Extended Search)

INTERNATIONAL JOURNAL OF REMOTE SENSING 26 (19) INTERNATIONAL JOURNAL OF REMOTE SENSING 26 (19) OCTOBER 10, 2005 Privette JL, Roy DP. Southern Africa as a remote sensing test bed: the SAFARI 2000 Special Issue overview. INTERNATIONAL JOURNAL OF REMOTE SENSING 26 (19): 4141-4158. Eckardt FD, Kuring N. SeaWiFS identifies dust sources in the Namib Desert. INTERNATIONAL JOURNAL OF REMOTE SENSING 26 (19): 4159-4167. Hao WM, Ward DE, Susott RA, et al. Comparison of aerosol optical thickness measurements by MODIS, AERONET sun photometers, and Forest Service handheld sun photometers in southern Africa during the SAFARI 2000 campaign. INTERNATIONAL JOURNAL OF REMOTE SENSING 26 (19): 4169-4183. Sa ACL, Pereira JMC, Silva JMN. Estimation of combustion completeness based on fire-induced spectral reflectance changes in a dambo grassland (Western Province, Zambia).

25

SAFARI 2000 Goals  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Objectives Research Objectives The goal of SAFARI 2000 is to understand the key linkages between the physical, chemical and biological processes, including human activities, that comprise the southern African biogeophysical system. More specifically, SAFARI 2000 aims to: characterize, quantify and understand the processes driving biogenic, pyrogenic and anthropogenic emissions in southern Africa; combine atmospheric transport and chemistry models with ground-based, airborne, and satellite-based observations to validate and extend our understanding of the transport and transformations of these emissions; identify where, when and how the emissions are deposited, and determine their impacts, and, lay the foundation for monitoring longer-term climatic, hydrological, and ecosystem consequences of these biogeochemical and physical processes.

26

SAFARI 2000 Data Sets Available  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Sets Available Data Sets Available The ORNL DAAC announces the release of four data sets for the SAFARI 2000 project. Two data sets, "SAFARI 2000 TOMS Tropospheric Ozone Data, Southern Africa Subset, Dry Season 2000" and "SAFARI 2000 TOMS Aerosol Index Data, Southern Africa, Dry Season 2000," contain ozone and aerosol data from the Earth Probe (EP) Total Ozone Mapping Spectrometer (TOMS) for the time period August-September 2000. The data set "SAFARI 2000 AVHRR Daily Site (1.5 km) and 15-Day Regional (1.5- and 6-km) Imagery" contains remotely sensed satellite data products at the site and regional level provided by the Global Inventory Mapping and Modeling (GIMMS) group at NASA/GSFC. These Advanced Very High Resolution Radiometer (AVHRR) data contain site extracts of SAFARI core sites (Mongu,

27

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

28

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

29

SAFARI 2000 Data Set Released  

NLE Websites -- All DOE Office Websites (Extended Search)

Set Released Set Released The ORNL DAAC announces the release of the data set "SAFARI 2000 MISR Level 2 Data, Southern Africa, Dry Season 2000". This data set is a product of the Southern African Regional Science Initiative containing 240 HDF-EOS formatted MISR Level 2 Top-of-Atmosphere/Cloud and Aerosol/Surface Products focused in a southern African study area which includes: Botswana, Lesotho, Malawi, Mozambique, Namibia, South Africa, Swaziland, Zambia, and Zimbabwe. The MISR Level 2 Products are geophysical measurements derived from the Level 1B2 data which consists of parameters that have been geometrically corrected and projected to a standard map grid. The products are in swaths, each derived from a single MISR orbit, where the imagery is 360 km wide and

30

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

31

SAFARI 2000 MODIS Airborne Simulator Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Airborne Simulator Data Airborne Simulator Data The ORNL DAAC announces the release of a new SAFARI 2000 data set. The data set "SAFARI 2000 MODIS Airborne Simulator Data, Southern Africa, Dry Season 2000" contains MODIS Airborne Simulator (MAS) multispectral data collected during the SAFARI 2000 project. Twenty flights with the MAS instrument were undertaken over Southern Africa by the NASA ER-2 aircraft during August and September 2000. The MAS spectrometer collects 50 multispectral bands at 16-bit resolution with a ground resolution of 50 meters from 20,000 meters altitude and a cross track scan width of 85.92 degrees. This data set is organized by flight, and each flight consists of several straight-line segments called tracks. There is a MAS multispectral data file for each track. The data are available in Hierarchical Data Format

32

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

33

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

34

Update on SAFARI 2000 at the midway point  

NLE Websites -- All DOE Office Websites (Extended Search)

Greetings Greetings Tim, Harold and I are reporting on the activities of the August-September Intensive Flying Campaign of SAFARI 2000. First official science flights began on August 15. To date there have been 9 ER2 science flights; 17 CV-580 flights; with approximately 20 science flights each for JRA and JRB. You can access this data, as well as more detailed information, through the www.safari2000.org. This site is based here in Pietersburg and is supported by SAFARI 2000 operations. We are pleased to say that the SAFARI 2000 Project data server has worked well. For those of you using a MacIntosh, please be advised that you will need to use Internet Explorer 5 to be able to utilize the Geospatial Database. On that database you will find many types of detailed information

35

A bug's leaf | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

36

Microsoft Word - SAFARI 2000_special_ed_refs_20040804.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

SAFARI 2000-Southern African Regional Science Initiative JOURNAL OF GEOPHYSICAL RESEARCH VOL. 108, NO. D13, 2003 Anyamba, A., Justice, C. O., Tucker, C. J., Mahoney, Robert, Seasonal to interannual variability of vegetation and fires at SAFARI 2000 sites inferred from advanced very high resolution radiometer time series data, J. Geophys. Res., 108(D13), 8507, doi:10.1029/2002JD002464, 2003. Bergstrom, R. W., P. Pilewskie, B. Schmid, and P. B. Russell, Estimates of the spectral aerosol single scattering albedo and aerosol radiative effects during SAFARI 2000, J. Geophys. Res., 108(D13), 8474, doi:10.1029/2002JD002435, 2003. Bertschi, I., R. J. Yokelson, D. E. Ward, R. E. Babbitt, R. A. Susott, J. G. Goode, and W. M. Hao, Trace gas and particle emissions from fires in large diameter and belowground biomass

37

Sketch Retrieval via Dense Stroke Features bottle apple apple apple apple apple swan giraffe mug giraffe giraffe giraffe  

E-Print Network (OSTI)

Sketch Retrieval via Dense Stroke Features bottle apple apple apple apple apple swan giraffe mug giraffe giraffe giraffe bottle swan giraffe swan swan swan swan apple apple apple apple bottle bottle swan

Yang, Ming-Hsuan

38

Microsoft Word - SAFARI 2000_special_ed_refs_20040804.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

South African Journal of Science South African Journal of Science Volume 98 Number 3/4 March/April 2002 (http://www.nrf.ac.za/sajs/co_mar02.stm ) Southern Africa's ecosystem in a test-tube: a perspective on the Southern African Regional Science Initiative (SAFARI 2000) - H.J. Annegarn, L. Otter, R.J. Swap and R.J. Scholes....111 SAFARI 2000 Southern African Regional Science Initiative (SAFARI 2000): summary of science plan - R.J. Swap, H.J. Annegarn and L. Otter...119 The Southern African Regional Science Initiative (SAFARI 2000): overview of the dry season field campaign - R.J. Swap, H.J. Annegarn, J.T. Suttles, J. Haywood, M.C. Helmlinger, C. Hely, P.V. Hobbs, B.N. Holben, J. Ji, M.D. King, T. Landmann, W. Maenhaut, L. Otter, B. Pak, S.J. Piketh, S. Platnick, J. Privette, D. Roy, A.M. Thompson, D. Ward and R. Yokelson....125

39

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

40

T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software 34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software June 1, 2011 - 3:35pm Addthis PROBLEM: Apple Mac OS X versions 10.4, 10.5, and 10.6 are the targets of a new campaign of phishing attacks that aim to infect systems with a fake antivirus application called MacDefender. PLATFORM: Mac OS X 10.4, Mac OS X 10.6, Mac OS X 10.5 ABSTRACT: Apple Mac OS X users could infect their systems after visiting a malicious web page. Reports suggest that the Apple Safari web browser could allow automatic download and execution of the JavaScript-based malware because of an incorrectly set security option in Safari. reference LINKS: Security Article: HT4650 IntelliShield ID: 23239 Apple Insider Article

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Microsoft Word - SAFARI 2000_special_ed_refs_20040804.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Change Biology Global Change Biology March 2004 - Volume 10 Issue 3 The SAFARI 2000 - Kalahari Transect Wet Season Campaign of year 2000 HH. Shugart, SA. Macko, P. Lesolle, TA. Szuba, MM. Mukelabai, P. Dowty, RJ. Swap Global Change Biology 2004 10:3 p. 273 Vegetation structure characteristics and relationships of Kalahari woodlands and savannas JL. Privette, Y. Tian, G. Roberts, RJ. Scholes, Y. Wang, KK. Caylor, P. Frost, M. Mukelabai Global Change Biology 2004 10:3 p. 281 Canopy structure in savannas along a moisture gradient on Kalahari sands Robert J. Scholes, Peter GH. Frost, Yuhong Tian Global Change Biology 2004 10:3 p. 292 Effects of precipitation and soil water potential on drought deciduous phenology in the Kalahari William M. Jolly, Steven W. Running

42

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

43

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

44

Chinch Bugs in St. Augustine Lawns  

E-Print Network (OSTI)

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

45

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

46

Summary of Bugs Database Jeremy Kepner  

E-Print Network (OSTI)

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

47

Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking  

E-Print Network (OSTI)

1 Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking Shu Du Ahamed Rice University Abstract As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper, we

Druschel, Peter

48

Carrot Apple Salad Ingredients  

E-Print Network (OSTI)

Carrot Apple Salad Ingredients: 4 carrots 2 apples, finely chopped 1/2 cup crushed pineapple in water, drained 2 tablespoons apple juice, frozen concentrate Directions 1. Wash carrots and use a grater to shred into small pieces. Add to medium bowl. 2. Leave the skin on the apple and cut in half through

Liskiewicz, Maciej

49

Buenos Apple Nachos Ingredients  

E-Print Network (OSTI)

Buenos Apple Nachos Ingredients: 1 apple 3 strawberries 1 tablespoon peanut butter 1 tablespoon vanilla low-fat yogurt Directions 1. Leave the skin on the apple and cut in half through the core of strawberries. Slice into thin slic- es, and spread on top of apples. 3. Put peanut butter in a small micro

Liskiewicz, Maciej

50

Apple Fruit Salad Ingredients  

E-Print Network (OSTI)

Apple Fruit Salad Ingredients: 2 Golden Delicious apples 2 Red Delicious apples 2 banana 1 1/2 cups Directions 1. Leave the skin on the apple and cut in half through the core. Then cut each piece in half again

Liskiewicz, Maciej

51

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

52

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

53

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

54

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

55

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 920 of 29,416 results. 11 - 920 of 29,416 results. Article U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. http://energy.gov/cio/articles/u-222-apple-safari-bugs-let-remote-users-execute-arbitrary-code-spoof-url-address-bar Download EA-1523: Finding of No Significant Impact Modifications at the Strategic Petroleum Reserve's West Hackberry Raw Water Intake Structure Site, Calcasieu Parish, Louisiana http://energy.gov/nepa/downloads/ea-1523-finding-no-significant-impact Page EA-1211: Relocation and Storage of Isotopic Heat Sources, Hanford Site, Richland, Washington This EA evaluates the environmental impacts for the proposal for relocation

56

RECAPITI AZIENDALI Apple m EducationtalentIT@apple.com  

E-Print Network (OSTI)

RECAPITI AZIENDALI Apple m EducationtalentIT@apple.com 1 www.apple.com/jobs/it/retail CHI SIAMO Gli Apple Store non sono soltanto negozi tra i più innovativi al mondo, ma anche tra i più dinamici e, coinvolgenti, collaborative e dinamiche, con una spiccata passione per Apple e i suoi prodotti. OPPORTUNIT?

De Cindio, Fiorella

57

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

58

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

59

Cynthia Sandberg: Love Apple Farm  

E-Print Network (OSTI)

me about the name, Love Apple Farm. Where does that comegrowbetterveggies/about-love-apple-farm.html See http://Photo by Tana Butler Love Apple Farm Cynthia Sandberg is

Rabkin, Sarah

2010-01-01T23:59:59.000Z

60

Apple Trees for Every Garden  

E-Print Network (OSTI)

Grower Press. Organic Apple Production Manual. Publication #of dwarf and semi-dwarf apple varieties can be seen in theGardener Apple Trees for Every Garden Orin Martin manages

Martin, Orin

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

62

Cinnamon Muffin 100% Apple Juice  

E-Print Network (OSTI)

31 ½ Apple Cinnamon Muffin 100% Apple Juice 5oz Milk Chef Michele Pastorello Milk Choices: Whole White 4oz Juice Choices: 100% Apple 100% Orange NO SCHOOL May 17th SCHOOL CLOSED May 28th Updated 4 100% Orange Juice 5oz Milk Cream of Wheat Sliced Pears 5oz Milk Turkey Sausage Biscuit 100% Apple

Delgado, Mauricio

63

AIDP -Apple Interface Design Project  

E-Print Network (OSTI)

AIDP - Apple Interface Design Project AIDP - Apple Interface Design Project m 92-95 m Joy Mountford m Design Centre, Advanced Technology Group m Apple's Industrial Design Group "Encourage ProjectThe Project m Bridge the gulf between the physical and virtual worlds - Apple m Design a new way

Tollmar, Konrad

64

Tuna Apple Salad Sandwiches Ingredients  

E-Print Network (OSTI)

Tuna Apple Salad Sandwiches Ingredients: 6 1/2 ounces tuna in water, canned 1 stalk celery 1 apple and chop in small pieces. Wash and cut apple in half and in half again. Cut out core and chop into small pieces. 3. Add celery and apple to tuna. Stir well. 4. Add mayonnaise and lemon juice. Stir well. 5

Liskiewicz, Maciej

65

Apple Scab of Flowering Crabapples  

E-Print Network (OSTI)

Apple Scab of Flowering Crabapples Flowering crabapples add color and beauty to many home leaves and defoliation by early summer. The cause of this problem is a fungus disease known as apple scab. The same disease is also a common problem on eating apples, refer to BP-1 (Apple Scab in the Home Fruit

66

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

67

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

68

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

69

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

70

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

71

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

72

Reflectivematerials enhance `Fuji'apple  

E-Print Network (OSTI)

Reflectivematerials enhance `Fuji'apple color Harry Andris o Carlos H. Crisosto Red color developmentis an important factor for consumer acceptance of California 'Fuji' apples. Several attempts to im not affect fla- vor, it is an important factor for con- sumer acceptance of apples. Cyanidin is the immediate

Crisosto, Carlos H.

73

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

74

Century Learning through Apple Technology  

E-Print Network (OSTI)

21st Century Learning through Apple Technology July 4 ­ 5, 2013 This exciting institute will appeal to educators who wish to enhance their teaching in support of 21st century learning using Apple technology. This institute begins with a keynote address that looks at how new technologies can enhance 21st century learning

75

Ordering from Apple Royal Holloway University have a special agreement with Apple Distribution International.  

E-Print Network (OSTI)

Ordering from Apple Royal Holloway University have a special agreement with Apple Distribution International. The overall management of the Agreement is via the Universities' Apple Computer Group (UACG at the National Apple Higher Education Agreement price. This pricing can be found at: https://ecommerce.apple

Royal Holloway, University of London

76

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

77

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

78

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

79

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

80

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Apple Price List unh computer store  

E-Print Network (OSTI)

Apple Price List 5/27/14 unh computer store university of new hampshire phone: (603) 862-1328 · faxBook Air AppleCare for MacBook Air AppleCare Protection Plan for Mac extends your coverage to three years Battery life varies by use and configuration. See www.apple.com/batteries for more information. 2 Compared

82

EU Verbraucherrechte Apple One-Year Limited  

E-Print Network (OSTI)

EU Verbraucherrechte Apple One-Year Limited Warranty AppleCare Protection Plan CC Service Pack, Kabel. Zusätzlich bei allen Macs: 1x Time Capsule oder 1x Airport Gerät sowie 1x Apple Display Macs u sowie 1x Apple Display Material- u. Herstellungsfehler. Keine Leistung für Verschlei?teile wie Akku

Fiebig, Peter

83

Fungicide control of apple scab: 2010 field trial  

E-Print Network (OSTI)

communications. 2010 Apple scab field trial, Department ofduring leaf fall to control apple scab (Venturia inaequalis)mixtures on scab control in apple orchards. Plant Pathology

Eynard, James; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

84

Potential of Mineral Uptake Efficiency by Some Apple Rootstocks  

E-Print Network (OSTI)

1999. Drought tolerance of apple rootstocks: Production andwater relations of five apple rootstocks. Acta Horticultureon Mineral Composition of Apple Leaves. J. Am. Soc. Hort.

Amiri, Mohammad E; Fallahi, Esmail

2009-01-01T23:59:59.000Z

85

Did Apples refusal to license proprietary information enabling interoperability with its iPod music player constitute an abuse under Article 82 of the EC Treaty?  

E-Print Network (OSTI)

Did Apples refusal to license proprietary informationtechnology that allowed Apple, as the creator of amises en uvre par la socit Apple Computer, Inc. dans les

Mazziotti, Giuseppe

2005-01-01T23:59:59.000Z

86

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

87

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

88

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

89

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

90

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers (EERE)

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

91

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

92

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

93

Green Bean Apple Salad 1. 3 small apples, cored and thinly sliced  

E-Print Network (OSTI)

Green Bean Apple Salad 1. 3 small apples, cored and thinly sliced 2. 1 lb green beans 3. ½ red keep apples from browning). Remove stems from fresh green beans, place in pot with 1 inch of water into rings. Mix apples, onions, cucumbers, green beans together. Add a splash of lemon juice, olive oil

Jawitz, James W.

94

Fire blight of apple blossoms Fireblight of apples and pears, caused by the  

E-Print Network (OSTI)

Fire blight of apple blossoms Fireblight of apples and pears, caused by the bacterium Erwinia. W. Lightner. 1990. Predicting apple blossom infections by Erwinia amylovora using the Maryblyt model for forecasting fire blight disease in apples and pears. University of Maryland, College Park, MD. #12;

95

Apple Price List unh computer store  

E-Print Network (OSTI)

Apple Price List 6/16/14 unh computer store university of new hampshire phone: (603) 862-1328 · fax for home) Upgrade: 4GB memory to 8GB memory & 128GB storage to 256GB storage $200.00 Apple USB Super http://computerstore.unh.edu/support.shtml for more details on warranty coverage. com #12;Apple Price

96

Malcolm Guite The Magic Apple Tree  

E-Print Network (OSTI)

Malcolm Guite The Magic Apple Tree Someday make a journey through the rain Through sodden streets in darkening December A journey to the magic apple tree. And journey also, darkling, through your past Journey records. You glimpsed it once within the garden wall, The image of an ancient apple tree, The fall

Robertson, Stephen

97

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network (OSTI)

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

98

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network (OSTI)

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

99

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

100

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 22, 2013 March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services March 21, 2013 V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple iOS March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 18, 2013 V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 1, 2012 August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. July 26, 2012 U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability ISC BIND is prone to a denial-of-service vulnerability. July 24, 2012

102

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

103

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2009 Michigan Apple Research Committee Michigan Apple Shippers MSU Extension MSU AgBioResearch NW MICHIGAN APPLE MATURITY REPORT #1 September 16, 2009 General Comments - This year the NWMHRS will be testing apples

104

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2007 Nikki Horticulture Society Michigan Apple Research Committee Michigan apple Shippers MSU Extension MSU Ag Pome Fruit Code-a-phone/Apple Maturity Line (231) 947-3063 NW MICHIGAN APPLE MATURITY REPORT #1 August

105

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

106

Apple Computer: The iCEO Seizes the Internet  

E-Print Network (OSTI)

sales. Table 3: Milestones in Apple direct online retailingDate Event mid-1994 Apple launches first web site Nov. 19971998 Sept. 1998 Jan. 1999 Apple Store (U.S. ) opens; first

West, Joel

2002-01-01T23:59:59.000Z

107

Fungicide control of apple scab: 2007 trial results  

E-Print Network (OSTI)

from Adaskaveg et al. (2007). Apple trial, 2007. W.D. Gublerpp. MacHardy, W.E. 1996. Apple Scab. Biology, Epidemiology,Pest Management for Apples & Pears. 2 nd ed. University of

Janousek, Christopher N; Lorber, Jacob D; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

108

Go on safari with BU and embark on an adventure that every member of the family will remember forever. Experience exceptional wildlife viewing and authentic cultural interactions that outshines any classroom lesson. Spend time as a  

E-Print Network (OSTI)

on double occupancy. Reduced prices are available for teens and children. International flights not included in vehicles Airport transfers for guests who arrive/depart on actual dates of the trip Daily safari Guaranteed window seats in 4-wheel drive Land Rovers Scenic internal flight from the Serengeti Complete pre

Spence, Harlan Ernest

109

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

110

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers (EERE)

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

111

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

112

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

113

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

114

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

115

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network (OSTI)

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

116

Baked Apple and Sweet Potato Casserole Ingredients  

E-Print Network (OSTI)

Baked Apple and Sweet Potato Casserole Ingredients: Non-stick cooking spray 5 sweet potatoes 4 aside. 2. Wash sweet potatoes with a vegetable brush, and use a knife and cutting board to cut into potato into small pieces. Add to large baking dish. 3. Cut apples down the center and in half again, down

Liskiewicz, Maciej

117

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

118

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

119

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

120

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

122

Michigan Apple Committee 2013/14 Request for Proposals  

E-Print Network (OSTI)

1 Michigan Apple Committee 2013/14 Request for Proposals The Michigan Apple Committee (MAC the profitability of apple growing through improving production information and techniques; developing new markets that helps achieve this mission. In keeping with the spirit of the MAC's mission, the Michigan Apple Research

123

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2006 Jim Project GREEEN Michigan State Horticulture Society Michigan Apple Research Committee Michigan apple sites: www.ams.usda.gov/marketnews.htm www.bhfm.com NW Michigan Pome Fruit Code-a-phone/Apple Maturity

124

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2008 Michigan Apple Research Committee Michigan apple Shippers MSU Extension MSU AgBioResearch Current pricing information can be obtained at the following web sites: http://www.bhfm.com/ NW Michigan Pome Fruit Code-a-phone/Apple

125

Michigan Apple Committee 2014/15 Request for Proposals  

E-Print Network (OSTI)

1 Michigan Apple Committee 2014/15 Request for Proposals The Michigan Apple Committee (MAC the profitability of apple growing through improving production information and techniques; developing new markets subcommittee established the following as its charter in early 2009: To help the Michigan Apple Committee

Douches, David S.

126

ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO  

E-Print Network (OSTI)

ADIOS ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO NATIONAL RADIO ASTRONOMY OBSERVATORY TABLES ADIOS - ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE COMPUTER TABLE FOR CONTENTS Page I Module and Apple Card (Photograph) Figure 3 Complete Apple/ADIOS System (Photograph) Figure 4 Analog

Groppi, Christopher

127

Michigan Apple Committee 2012/13 Request for Proposals  

E-Print Network (OSTI)

Michigan Apple Committee 2012/13 Request for Proposals The Michigan Apple Committee (MAC) announces of apple growing through improving production information and techniques; developing new markets and new achieve this mission. In keeping with the spirit of the MAC's mission, the Michigan Apple Research

128

SW MICHIGAN APPLE MATURITY REPORT ISSUE 1 August 25, 2010  

E-Print Network (OSTI)

SW MICHIGAN APPLE MATURITY REPORT ISSUE 1 ­ August 25, 2010 Bill Shane, Diane Brown-Rytlewski, and Mark Longstroth Michigan State University This is the first of weekly apple maturity report for SW. See the Michigan State University apple web site (apples.msu.edu) for more information, including

129

Apple Defect Segmentation by Artificial Neural Networks Devrim Unay a  

E-Print Network (OSTI)

Apple Defect Segmentation by Artificial Neural Networks Devrim Unay a Bernard Gosselin a a TCTS Lab-colored apple fruits performed by several artificial neural networks. Pixel-wise classification approach apple defects. 1 Introduction Quality of apple fruits depends on size, color, shape and presence

Dupont, Stéphane

130

Introduction to Apple Mail with IMAP Version 4 October 2008  

E-Print Network (OSTI)

Introduction to Apple Mail with IMAP Version 4 ­ October 2008 Massachusetts Institute of Technology #12;Apple Mail Quick Start Guide Page 2 Getting Started This Quick Start class assumes that: 1. Apple Mail is configured for use at MIT. If you need help with configuration please see Apple Mail at MIT

Gabrieli, John

131

Michigan Apple Committee Research Priorities for 2014/15  

E-Print Network (OSTI)

Michigan Apple Committee Research Priorities for 2014/15 Following are the 2014/15 priorities of the Michigan Apple Committee. (In priority order.) 1. Increase demand To conduct consumer related research that will help sell Michigan Apples more profitably. a. Market research b. Value ­ convenience, apples versus

Douches, David S.

132

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2005 Jim Project GREEEN Michigan State Horticulture Society Michigan Apple Research Committee Michigan apple sites: www.ams.usda.gov/marketnews.htm www.bhfm.com NW Michigan Pome Fruit Code-a-phone/Apple Maturity

133

Synthetic and organic fungicide control of apple scab: 2009 field trial  

E-Print Network (OSTI)

during leaf fall to control apple scab (Venturia inaequalis)mixtures on scab control in apple orchards. Plant Pathologyscab development in an organic apple orchard. Agriculture,

Janousek, Christopher N; Bay, Ian S; Gubler, W. Douglas

2009-01-01T23:59:59.000Z

134

EFFECT OF TWO ROOTSTOCK SELECTIONS ON THE SEASONAL NUTRITIONAL VARIABILITY OF BRAEBURN APPLE  

E-Print Network (OSTI)

potasium and magnesium into apple fruit in high densityof Golden delicious apple trees. Acta Horticulturae 448:107-in leaves of different apple rootstocks and Elise Scion

Hirzel, Juan Fernando; Best, Stanley

2009-01-01T23:59:59.000Z

135

Abiotic and biotic factors affecting light brown apple moth, Epiphyas postvittana, in California  

E-Print Network (OSTI)

mortality of lightbrown apple moth. In: OCallaghan, M. (tryoni and the light brown apple moth Epiphyas postvittanaof the light brown apple moth, Epiphyas postvittana (

Buergi, Linda Patricia

2012-01-01T23:59:59.000Z

136

Apple Maturity Protocol Tests for apple flesh firmness and starch conversion are important tools for monitoring crop  

E-Print Network (OSTI)

Apple Maturity Protocol Tests for apple flesh firmness and starch conversion are important tools for monitoring crop maturity. Flesh firmness, as measured with a pressure gauge, determines how long apples can adequate firmness for fresh market or processing uses. A second common assay for apple maturity

137

An Apple a Day -- A Futuristic Parable  

Science Journals Connector (OSTI)

...thousands of sidewalk apple vendors. Second, studies of competition and regulation showed that the costs of apple production actually went up more rapidly in regulated industries than in competitive ones (see J. Zwanziger and G. Melnick, "Competition and Regulation in the Wholesale Fruit Industry," Free... It all began about 20 years ago, in early 1994, when somebody joked with Hillary Rodham Clinton that an apple a day keeps the doctor away, noting that this would provide the best cost control imaginable. The idea took root as if both Johnny and Joanie ...

Phelps C.E.

1994-03-17T23:59:59.000Z

138

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

139

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

140

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

142

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

143

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

144

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

145

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

146

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

147

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

148

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

149

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

150

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

151

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

152

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

153

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

154

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

155

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

156

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

157

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

158

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

159

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

160

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

162

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

163

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

164

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

165

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

166

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

167

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

168

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

169

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

170

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

171

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

172

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

173

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

174

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

175

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

176

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

177

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

178

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

179

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

180

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

182

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

183

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

184

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

185

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

186

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

187

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

188

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

189

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

190

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

191

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

192

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

193

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

194

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

195

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

196

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

197

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

198

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

199

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

200

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

202

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

203

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

204

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

205

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

206

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

207

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

208

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

209

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

210

END USER LICENCE AGREEMENT iTUNES STORE, APPLE APP STORE AND iBOOKSTORE ("APPLE iSTORE") DOWNLOADS OF THE JAMES COOK UNIVERSITY MOBILE APP  

E-Print Network (OSTI)

1 END USER LICENCE AGREEMENT ­ iTUNES STORE, APPLE APP STORE AND iBOOKSTORE ("APPLE i and JCU only. Apple Inc. is not a party to this Agreement. JCU, and not Apple Inc., is solely responsible or control that runs the iOS operating system software provided by Apple Inc. ("Device"); (b) for Your own

211

The power of lightness. Apple iPad Price List  

E-Print Network (OSTI)

iPad Air The power of lightness. Apple iPad Price List 6/11/14 unh computer store university of new with iPad (4th generation). 2 Battery life varies by use and configuration. See www.apple with Wi-Fi + Cellular 16GB 32GB 64GB 128GB $629 $729 $829 $929 AppleCare+ for iPad AppleCare+ provides 2

212

Mobile Device Guide Apple iPhone Devices  

E-Print Network (OSTI)

Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised: 1/20/11 Page 1 of 3 ConnectingPhone desktop. 1a. Expand `Mail, Contacts, Calendars' as shown. #12;Mobile Device Guide ­ Apple iPhone Devices (case sensitive). 4. Tap `next'. #12;Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised

de Lijser, Peter

213

Curried Pumpkin Soup with Roasted Apple and Crme Frache  

E-Print Network (OSTI)

Curried Pumpkin Soup with Roasted Apple and Crème Fraîche Recipe courtesy of Gordon Hamersley teaspoon chili powder (optional) 3 medium apples, peeled, cored, and chopped 2 1/2 quarts chicken stock 1 apple, roasted and sliced for garnish crème fraîche DIRECTIONS 1. Preheat the oven to 350 degrees. 2

Spence, Harlan Ernest

214

MSU Fruit Team 2011 Apple Maturity Report Northwest Region Reports  

E-Print Network (OSTI)

1 MSU Fruit Team 2011 Apple Maturity Report Northwest Region Reports During the harvest season, apples from different regions are collected for maturity testing. The data is then compiled by MSU Extension educators into recommendations for harvest and storage of the most commonly grown apple varieties

215

Publish by Abstract RNA Extraction From Different Apple Tissues  

E-Print Network (OSTI)

Publish by Abstract RNA Extraction From Different Apple Tissues Rich in Polyphenols. An efficient procedure for isolating RNA from bud, internodal shoot, flower, and fruit tissues of apple has in apple fruit and flower tissues. Isolated RNA is of high qual- ity and is undegraded as assessed

Korban, Schuyler S.

216

MSU Fruit Team 2010 Apple Maturity Report Northwest Region Reports  

E-Print Network (OSTI)

1 MSU Fruit Team 2010 Apple Maturity Report Northwest Region Reports During the harvest season, apples from different regions are collected for maturity testing. The data is then compiled by MSU Extension educators into recommendations for harvest and storage of the most commonly grown apple varieties

217

Original article Characterisation of apple orchard management systems  

E-Print Network (OSTI)

Original article Characterisation of apple orchard management systems in a French Mediterranean) Abstract ­ The objective of our study was to characterise cropping systems in apple arboriculture in the less sensitive areas. apple orchard / on-farm survey / cultivation operation / management indicator

Paris-Sud XI, Université de

218

Original article Nutrient leaching from soil amended with apple waste  

E-Print Network (OSTI)

Original article Nutrient leaching from soil amended with apple waste Anne-Marie de COCKBORNE December 2000) Abstract ­ Among the possibilities for disposing of overproduction of apple, land application is flexible and inexpensive. Six soil columns receiving 0, 200 or 500 Mg of apple wasteha­1 were

Paris-Sud XI, Université de

219

Micropropagation Rooting and weaning of apple rootstock YP  

E-Print Network (OSTI)

Micropropagation Rooting and weaning of apple rootstock YP M Uosukainen Agricultural Research-23 May 1992, Dijon, France) Summary Rooting and weaning of the Finnish apple rootstock YP were arbusculaires INTRODUCTION Research on micropropagation of apple trees started > 20 yr ago (Elliot, 1972; Walkey

Paris-Sud XI, Université de

220

Appling County Pellets | Open Energy Information  

Open Energy Info (EERE)

Appling County Pellets Appling County Pellets Jump to: navigation, search Name Appling County Pellets Place Graham, Georgia Zip 31513 Sector Biomass Product Producer of wood pellets and other biomass products located in Georgia. Coordinates 47.055765°, -122.294774° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.055765,"lon":-122.294774,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network (OSTI)

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

222

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

223

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

224

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

225

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

226

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

227

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

228

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

229

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

230

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

231

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

232

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

233

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

234

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

235

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

236

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

237

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

238

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

239

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

240

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

242

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

243

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

244

The standard computer models for 2014 are the Dell 9020 desktop, Dell e6440 laptop, Apple 21.5" iMac desktop and Apple 13" Mac Book Pro laptop or Apple 13" Mac Book Pro with Retina  

E-Print Network (OSTI)

The standard computer models for 2014 are the Dell 9020 desktop, Dell e6440 laptop, Apple 21.5" iMac desktop and Apple 13" Mac Book Pro laptop or Apple 13" Mac Book Pro with Retina Display (see important distinctions below). Keep in mind that Dell and Apple are continuously modifying their lines, so although

Aalberts, Daniel P.

245

Light brown apple moths arrival in California worries commodity groups  

E-Print Network (OSTI)

control of light brown apple moth, Epi- phyas postvittana (2007a. Light brown apple moth host list. www.cdfa.ca.gov/p. CDFA. 2007b. Light brown apple moth project: Advisories.

Varela, Lucia G.; Johnson, Marshall W; Strand, Larry; Wilen, Cheryl A; Pickel, Carolyn

2008-01-01T23:59:59.000Z

246

Why the Apple Doesnt Fall Far: Understanding Intergenerational Transmission of Human Capital  

E-Print Network (OSTI)

Kjell G. Salvanes. 2003. Why the Apple Doesnt Fall Far:Why the Apple Doesn't Fall Far: UnderstandingPaper Series Why the Apple Doesnt Fall Far: Understanding

Black, Sandra; Devereux, Paul; Salvanes, Kjell

2004-01-01T23:59:59.000Z

247

New Zealand lessons may aid efforts to control light brown apple moth in California  

E-Print Network (OSTI)

1975. Integrated control of apple pests in New Zealand. 1.of the light brown apple moth Epiphyas postvittana (Walker),68592. Dumbleton L J. 1932. The apple leaf-roller (Tortrix

Varela, Lucia G.; Walker, James T.S.; Lo, Peter L; Rogers, David J

2010-01-01T23:59:59.000Z

248

Impact of Foliar Fertilizer Containing Iodine on Golden Delicious Apple Trees  

E-Print Network (OSTI)

on marketable Golden Delicious/M.9 apple production. At thecontaining fertilizer on apple fruits firmness and theirold Golden Delicious/M.9 apple trees Trees were spaced at

Szwonek, Eugeniusz

2009-01-01T23:59:59.000Z

249

The Atom and the Apple, Princeton University Press, "The Atom and the Apple is a delightful ramble through many areas of science as well as  

E-Print Network (OSTI)

The Atom and the Apple, Princeton University Press, Reviews: "The Atom and the Apple and stimulating, and it frequently challenges political correctness. . . . The Atom and the Apple provides." --Publishers Weekly (Starred Review) #12;Science Teacher Association recommends : The Atom and the Apple

Balibar, Sébastien

250

Apple Burrknot Borers in New York Revisited Pest status and chemical control of borers infesting apple burrknots in New York State  

E-Print Network (OSTI)

Apple Burrknot Borers in New York ­ Revisited Pest status and chemical control of borers infesting apple burrknots in New York State DAVID P. KAIN, RICHARD W. STRAUB AND ARTHUR M. AGNELLO Department damage to dwarf apple trees caused by American plum borer, a survey was conducted in the major apple

Agnello, Arthur M.

251

Access Business Systems | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

(desktop, laptop, mobile) Using any operating system (such as Windows, Mac, Linux, Apple IOS, Android) Through most browsers (Internet Explorer, Firefox, Safari; Chrome is not...

252

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

253

Revised: MASTERS_APPL_ENROLL_TO_PHD-06/04/2014-KCNee FOR ENROLLED STUDENTS ONLY  

E-Print Network (OSTI)

Revised: MASTERS_APPL_ENROLL_TO_PHD-06/04/2014-KCNee FOR ENROLLED STUDENTS ONLY APPLICATION STAFF _____POST MASTERS PLAN APPL #_____________________ _______________ _____RESIDENCY UPDATED

Maryland, Baltimore County, University of

254

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

255

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

256

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

257

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

258

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

259

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

260

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

262

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

263

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network (OSTI)

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

264

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network (OSTI)

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

265

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

266

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

267

Autonomous Fruit Picking Machine: A Robotic Apple Harvester  

E-Print Network (OSTI)

Autonomous Fruit Picking Machine: A Robotic Apple Harvester Johan Baeten1 , Kevin Donn´e2 , Sven the construction and functionality of an Au- tonomous Fruit Picking Machine (AFPM) for robotic apple harvesting with a camera mounted inside. The proposed concepts guarantee adequate control of the autonomous fruit

Paris-Sud XI, Université de

268

Handleiding eduroam op Apple iOS6  

E-Print Network (OSTI)

Handleiding eduroam op Apple iOS6 Version: 1.0 eduroam Date: 24-04-2013 #12;2 Inleiding Deze handleiding beschrijft hoe u met uw Apple iPad of iPhone met iOS6 een verbinding met eduroam kan opzetten

Galis, Frietson

269

Who Captures Value in a Global Innovation System? The case of Apple's iPod  

E-Print Network (OSTI)

Portelligent Inc. (2006). Apple iPod Video, 30GB MultimediaSystem? The case of Apple's iPod Greg Linden, Kenneth L.to look at one member of Apples iPod family, part of a

Linden, Greg; Kraemer, Kenneth L; Dedrick, Jason

2007-01-01T23:59:59.000Z

270

Evaluation of Pest Management Tactics for Organic Apple Production A. Agnello, H. Reissig, and D. Combs  

E-Print Network (OSTI)

Evaluation of Pest Management Tactics for Organic Apple Production A. Agnello, H. Reissig, and D number of both native and introduced insect and mite species attack apples grown in commercial apple orchards. Control of this pest complex is particularly challenging, because unlike the more arid apple

Agnello, Arthur M.

271

7.5 Declaration in Apple vs. Microsoft/HewlettPackard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett­Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Golbeck, Jennifer

272

Apple Defect Detection and Quality Classification with MLP-Neural Networks  

E-Print Network (OSTI)

Apple Defect Detection and Quality Classification with MLP-Neural Networks Devrim UNAY, Bernard' apples is shown. Color, texture and wavelet features are extracted from the apple images. Principal-classifications. The European Union defines three quality classes ("extra", "I", and "II") for the fresh apples

Dupont, Stéphane

273

7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Shneiderman, Ben

274

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

275

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

276

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

277

Predicted 2014 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

Predicted 2014 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator Amy Irish. This moderate to heavy crop will mature close predicted dates. Blocks with light croploads will mature 3 or 4

278

Property:Incentive/ApplDsc | Open Energy Information  

Open Energy Info (EERE)

ApplDsc ApplDsc Jump to: navigation, search Property Name Incentive/ApplDsc Property Type String Description Applicable Sector. Pages using the property "Incentive/ApplDsc" Showing 25 pages using this property. (previous 25) (next 25) 2 2003 Climate Change Fuel Cell Buy-Down Program (Federal) + Commercial +, Nonprofit +, Schools +, ... 3 30% Business Tax Credit for Solar (Vermont) + Commercial +, Industrial + 4 401 Certification (Vermont) + Utility +, Industrial + A AEP (Central and North) - CitySmart Program (Texas) + Commercial +, Industrial +, Institutional +, ... AEP (Central and North) - Residential Energy Efficiency Programs (Texas) + Construction +, Installer/Contractor +, Multi-Family Residential + AEP (Central and SWEPCO) - Coolsaver A/C Tune Up (Texas) + Commercial +, Installer/Contractor +, Residential +

279

Specific heat of apple at different moisture contents and temperatures  

E-Print Network (OSTI)

This work discusses results of experimental investigations of the specific heat, $C$, of apple in a wide interval of moisture contents ($W=0-0.9$) and temperatures ($T = 283-363$ K). The obtained data reveal the important role of the bound water in determination of $C(W,T)$ behaviour. The additive model for description of $C(W)$ dependence in the moisture range of $0.1apple was considered as a mixture of water and hydrated apple material (water plasticised apple) with specific heat $C_h$. The difference between $C_h$ and specific heat of dry apple, $\\Delta Cb=C_h-C_d$, was proposed as a measure of the excess contribution of bound water to the specific heat. The estimated amounts of bound water $W_b$ were comparable with the monolayer moisture content in apple. The analytical equation was proposed for approximation of $C(W,T)$ dependencies in the studied intervals of moisture content and temperature.

Viacheslav Mykhailyk; Nikolai Lebovka

2013-05-11T23:59:59.000Z

280

Dietary supplementation with apple juice concentrate alleviates the compensatory increase in glutathione synthase transcription and activity that  

E-Print Network (OSTI)

Dietary supplementation with apple juice concentrate alleviates the compensatory increase that apple juice concentrate (AJC) prevents the increase in oxidative damage to brain tissue and decline

Graves, Michael V.

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users 0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information August 21, 2012 - 7:00am Addthis PROBLEM: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Apple Remote Desktop after 3.5.1 and prior to 3.6.1 ABSTRACT: A remote user can monitor potentially sensitive information. reference LINKS: Apple.com Apple Article: HT5433 SecurityTracker Alert ID: 1027420 CVE-2012-0681 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apple Remote Desktop. When a user connects to a third-party VNC server with the 'Encrypt all network data' setting enabled, network data is not encrypted. A remote user monitoring the

282

E-Print Network 3.0 - apple juice turbidity Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

70 1 Slice Cornbread 165 12 oz Apple Juice 167 THURSDAY: Total Calorie Count 1446... Ranch Dressing 70 1 Apple 81 1 Chocolate Chip Cookie 200 12 oz Diet Soda 0 MONDAY: Total...

283

E-Print Network 3.0 - apple juice clarification Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

70 1 Slice Cornbread 165 12 oz Apple Juice 167 THURSDAY: Total Calorie Count 1446... Ranch Dressing 70 1 Apple 81 1 Chocolate Chip Cookie 200 12 oz Diet Soda 0 MONDAY: Total...

284

Pure appl. geophys. 157 (2000) 11351143 00334553/00/08113519 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 1135­1143 0033­4553/00/081135­19 $ 1.50+0.20/0 Tsunamis Generated, Petropavlovsk-Kamchatsky 683006, Russia. #12;Alexander Belousov et al.1136 Pure appl. geophys., expand

Belousov, Alexander

285

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

286

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

287

Pure appl. geophys. 157 (2000) 21492164 00334553/00/12214916 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 2149­2164 0033­4553/00/122149­16 $ 1.50+0.20/0 The Edges of Large. Shaw2150 Pure appl. geophys., died out produce large stress concentrations, which then tend

Shaw, Bruce E.

288

Pure appl. geophys. 154 (1999) 405407 00334553/99/04040503 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 154 (1999) 405­407 0033­4553/99/040405­03 $ 1.50+0.20/0 Introduction of the asthenosphere? #12;Introduction406 Pure appl. geophys., What can we learn from current GPS measurements

Dmowska, Renata

289

Pure appl. geophys. 151 (1998) 443462 00334553/98/04044320 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 151 (1998) 443­462 0033­4553/98/040443­20 $ 1.50+0.20/0 Anisotropy appl. geophys., degassing primitive mantle (HEARN et al., 1990); and 5) a parabolic-shaped region

Humphreys, Eugene

290

Connecting to Poly-WiFi (on Apple Mac) February 2010 Page 1 of 5  

E-Print Network (OSTI)

Connecting to Poly-WiFi (on Apple Mac) February 2010 Page 1 of 5 Connecting to Poly-WiFi (on Apple to Poly-WiFi (on Apple Mac) February 2010 Page 2 of 5 2) Before you can access the Network setting screen-WiFi (on Apple Mac) February 2010 Page 3 of 5 4) From the network name dropdown, select "Poly-WiFi". 5

Aronov, Boris

291

Apples and Other Fruits of the Rose Family  

NLE Websites -- All DOE Office Websites (Extended Search)

Apples and Other Fruits of the Rose Family Apples and Other Fruits of the Rose Family Nature Bulletin No. 277-A October 7, 1967 Forest Preserve District of Cook County Richard B. Ogilvie, President Roland F. Eisenbeis, Supt. of Conservation APPLES AND OTHER FRUITS OF THE ROSE FAMILY Bread, meat and potatoes, with vegetables and green salads, may satisfy the inner man and keep us healthy but much of the fun of eating is provided by the rose family. The rose, itself, is the flower of chivalry and love but its relative, the apple, king of the fruits, has been cultivated since prehistoric times. The members of the Rose Family give us more pleasure than we get from any other group of plants. Apples, quinces, pears, peaches, plums, apricots, cherries, blackberries, raspberries and strawberries -- whether wild or cultivated -- are all relatives of the roses. Their fruits, raw or cooked, give us desserts, pleasant drinks, and many a between-meal delicacy. Typically, they have showy flowers with five equal petals arranged around a central cup bearing one or more fruit-forming pistils and a large number of pollen-bearing stamens. Their leaves are placed alternately on the twigs or stalks -- some of them simple leaves; some of them compound leaves divided into three, five or more leaflets like the rose itself. Some are trees, some are shrubs, and some are vining herbs.

292

Optimization of a Fixed Spraying System for Commercial High-Density Apple Plantings Final Report 2007  

E-Print Network (OSTI)

Optimization of a Fixed Spraying System for Commercial High-Density Apple Plantings Final Report and fruit coverage issues are a research priority in tree fruits and apples in particular. Preliminary Work. Preliminary trials were conducted in two blocks each of Red Delicious and Empire apples on M.9 dwarfing stock

Agnello, Arthur M.

293

http://agbioresearch.msu.edu/centers/nwmihort/ MSU Fruit Team Apple Maturity Report 2014  

E-Print Network (OSTI)

http://agbioresearch.msu.edu/centers/nwmihort/ MSU Fruit Team Apple Maturity Report 2014 Northwest Gingergold harvest continues, and many growers are waiting on McIntosh harvest to begin. Apples are coloring nicely with the cool temperatures. Cool temperatures have hit the northwest region, and apple maturity

294

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 3  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 3 September 18, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the third week of 2013 apple maturity testing at NWMHRC. General Comments - The NWMHRC will be testing apples for maturity for 2013

295

THRESHOLDING-BASED SEGMENTATION AND APPLE GRADING BY MACHINE Devrim Unay, and Bernard Gosselin  

E-Print Network (OSTI)

THRESHOLDING-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION Devrim Unay, and Bernard.tcts.fpms.ac.be ABSTRACT In this paper, a computer vision based system is introduced to automatically grade apple fruits outperformed others with 89 % recognition. 1. INTRODUCTION Computer vision based quality sorting of apple

Dupont, Stéphane

296

APPL: A Probability Programming Language Maj. Andrew G. GLEN, Diane L. EVANS, and Lawrence M. LEEMIS  

E-Print Network (OSTI)

APPL: A Probability Programming Language Maj. Andrew G. GLEN, Diane L. EVANS, and Lawrence M having arbitrary distributions. This arti- cle presents a prototype probability package named APPL (A probability software package, referred to as "A Prob- ability Programming Language" (APPL), that fills

Leemis, Larry

297

MSU Fruit Team Apple Maturity Report 2014 Northwest Region, Report Number 4: October 1, 2014  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2014 Northwest Region, Report Number 4: October 1, 2014 Emily Pochubay and Nikki Rothwell, Extension Fruit Educators Apples are maturing slowly, growers are spot picking-pruned orchards has excellent color. Size in most varieties is also very good; some Honeycrisp apples that had

298

Multiple locus genealogies and phenotypic characters reappraise the causal agents of apple ring rot in China  

E-Print Network (OSTI)

Multiple locus genealogies and phenotypic characters reappraise the causal agents of apple ring rot & Guangyu Sun Received: 6 March 2014 /Accepted: 2 September 2014 # School of Science 2014 Abstract Apple ring rot inflicts severe economic losses in the main apple producing areas of East Asia. The causal

Biggs, Alan R.

299

Apple detection in natural tree canopies from multimodal images J. P. Wachs1,2  

E-Print Network (OSTI)

1 Apple detection in natural tree canopies from multimodal images J. P. Wachs1,2 , H. I. Stern2 , T apples within a tree canopy using infra-red and color images in order to achieve automated harvesting. Infra-red provides clues regarding the physical structure and location of the apples based

Wachs, Juan

300

Apple Tree, NH Big Tree for May By Anne Krantz, NH Big Tree Team,  

E-Print Network (OSTI)

Apple Tree, NH Big Tree for May By Anne Krantz, NH Big Tree Team, UNH Cooperative Extension The explosion of apple blossoms in May transforms the most gnarled old tree into a delicate cloud of beauty (1817-1862) in his essay "The Wild Apple Tree," described the blossoms perfectly: `The flowers

New Hampshire, University of

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Comparing Apples and Oranges Through Partial Orders: An Empirical Peter Kingston and Magnus Egerstedt  

E-Print Network (OSTI)

Comparing Apples and Oranges Through Partial Orders: An Empirical Approach Peter Kingston the comparison of apples and oranges is presented to highlight the operation of the proposed approach. I. INTRODUCTION As the saying goes, one can not compare apples and oranges. But why not? It is clear that some

Egerstedt, Magnus

302

ARTIFICIAL NEURAL NETWORK-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION  

E-Print Network (OSTI)

ARTIFICIAL NEURAL NETWORK-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION Devrim Unay In this paper, a computer vision based system is introduced to automatically sort apple fruits. An artificial. INTRODUCTION Computer vision based quality sorting of apple fruits is nec- essary for increasing the speed

Dupont, Stéphane

303

Simulation of Apple Tree Development Using Mixed Statistical and Biomechanical Models  

E-Print Network (OSTI)

Simulation of Apple Tree Development Using Mixed Statistical and Biomechanical Models Colin Smith1 that characterises the architecture of an apple tree over time. As indicated previously [9, 3, 4], the simulation dynamics in a developmental context, we have created an L-system simulation of a developing apple tree

Paris-Sud XI, Université de

304

Li2O Particulate Flow Concept, APPLE APEX Interim Report November, 1999  

E-Print Network (OSTI)

Li2O Particulate Flow Concept, APPLE APEX Interim Report November, 1999 9-1 CHAPTER 9: Li2O PARTICULATE FLOW CONCEPT ­ APPLE DESIGN Contributors Lead Author: Dai Kai Sze Dai Kai Sze, Zhanhe Wang (ANL Particulate Flow Concept, APPLE APEX Interim Report November, 1999 9-2 9. LI2O PARTICULATE FLOW CONCEPT

California at Los Angeles, University of

305

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 6: October 9, 2013  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 6: October 9, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the sixth week of 2013 apple maturity testing at NWMHRC. Results will be sent via fax and email to past apple maturity list subscribers. Results

306

WHOLE-FARM APPLE ARTHROPOD MANAGEMENT USING REDUCED-RISK TACTICS AND IPM SAMPLING AND MONITORING  

E-Print Network (OSTI)

WHOLE-FARM APPLE ARTHROPOD MANAGEMENT USING REDUCED-RISK TACTICS AND IPM SAMPLING AND MONITORING management programs in apples, using provisional action thresholds for specific major pests based on previous-farm approaches for managing the arthropod pests of apple orchards that rely on RR and OP-replacement insecticides

Agnello, Arthur M.

307

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 1  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 1 September 4, 2013 General Comments - The NWMHRC will be testing apples for maturity for 2013, and results will be sent via fax and email to past apple maturity list subscribers. Results will also be available at: http

308

Steve Jobs' creations simplified life, Apple enthusiasts say in mourning his death  

E-Print Network (OSTI)

Steve Jobs' creations simplified life, Apple enthusiasts say in mourning his death By ADAM PLAYFORD as soon as they got confirmation." Word of the Apple co-founder's death of pancreatic cancer hit hard live without a computer," said Joerg von Veltar, the founder of the Palm Beach Phoenix Apple User Group

Belogay, Eugene A.

309

Title: Use of Physical Barriers to Prevent Borer Infestation of Apple Burrknots Project Leaders  

E-Print Network (OSTI)

Title: Use of Physical Barriers to Prevent Borer Infestation of Apple Burrknots Project Leaders of burrknot tissue on apple dwarfing rootstocks is an increasing problem throughout the northeast. One into the winter. We also discuss economic considerations. Background and Justification: Apple growers

Agnello, Arthur M.

310

Syracuse University Apple Festival The Department of Recreation Services will conduct the Syracuse  

E-Print Network (OSTI)

Syracuse University Apple Festival The Department of Recreation Services will conduct the Syracuse University Apple Festival on Friday, September 6 from 11:00am- 2:00pm on the Quad. The event will include can reserve a table by completing the Apple Festival Table Registration below. This is a great

Raina, Ramesh

311

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 7: October 16, 2013  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 7: October 16, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the seventh week of 2013 apple maturity testing at NWMHRC. Results will be sent via fax and email to past apple maturity list subscribers. Results

312

THE APPLE GAME AND THE PRESSING-DOWN LEMMA Brian White  

E-Print Network (OSTI)

THE APPLE GAME AND THE PRESSING-DOWN LEMMA Brian White Math 161 Lecture Notes (Winter 2005) Recall, but for every apple game is played in a series of stages, one for each element of 1. At stage 0, you are given a countable collection of apples. At each stage n 1 with n > 0: (1) If you have

White, Brian

313

Integrating Markov Chain Models and L-systems to Simulate the Architectural Development of Apple Trees  

E-Print Network (OSTI)

Integrating Markov Chain Models and L-systems to Simulate the Architectural Development of Apple the architectural development of apple trees is presented. The approach is based on using an L-systems framework. Results show that these models are able to represent the branching zones observed in apple trees at node

Paris-Sud XI, Université de

314

Low and High-Level Visual Feature Based Apple Detection from Multi-modal Images  

E-Print Network (OSTI)

1 Low and High-Level Visual Feature Based Apple Detection from Multi-modal Images J. P. Wachs1 , H discusses the development of a machine vision system, capable of recognizing occluded green apples within a tree canopy. This involves the detection of "green" apples within scenes of "green leaves", shadow

Wachs, Juan

315

Borer problems and their control in dwarf apple trees David Kain, Entomology, NYSAES, Geneva, NY  

E-Print Network (OSTI)

Borer problems and their control in dwarf apple trees David Kain, Entomology, NYSAES, Geneva, NY in western New York, were invading burrknots on dwarf apple trees. About the same time, Dick Straub seemed to be becoming more common in dwarf apple plantings, as well. Based on Deb's alert, we decided

Agnello, Arthur M.

316

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

317

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

318

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

319

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

320

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

322

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

323

AMR Power Private Ltd APPL | Open Energy Information  

Open Energy Info (EERE)

AMR Power Private Ltd APPL AMR Power Private Ltd APPL Jump to: navigation, search Name AMR Power Private Ltd. (APPL) Place Hyderabad, Andhra Pradesh, India Zip 560 034 Sector Hydro Product Hyderabad-based small hydro project developer. Coordinates 17.6726°, 77.5971° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":17.6726,"lon":77.5971,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

324

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain

325

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

326

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

327

The inheritance of fruit colour in apple (Malus pumila Mill.)  

E-Print Network (OSTI)

The inheritance of fruit colour in apple (Malus pumila Mill.) Allan G. WHITE Yves LESPINASSE that red fruit colour was determined by two dominant complementary genes. Blush and red colour did key words : Skin colour, hybridization. R?SUM? Hérédité de la couleur du fruit chez le pommier (Malus

Paris-Sud XI, Université de

328

APPLIED COGNITIVE PSYCHOLOGY Appl. Cognit. Psychol. 20: 487503 (2006)  

E-Print Network (OSTI)

APPLIED COGNITIVE PSYCHOLOGY Appl. Cognit. Psychol. 20: 487­503 (2006) Published online 12 April # 2006 John Wiley & Sons, Ltd. The question of how cognitive abilities predict task performance a cluster of cognitive functions underlying a factor that they labelled complex visuo-spatial organization

Montello, Daniel R.

329

Appl. Math. Lett., (2012) DSM for general nonlinear equations  

E-Print Network (OSTI)

Appl. Math. Lett., (2012) 1 #12;DSM for general nonlinear equations A.G. Ramm Mathematics(y) = 0, F (y) = 0, then equation F(u) = 0 can be solved by a DSM (Dynamical Systems Method) and the rate of convergence of the DSM is given provided that a source-type assumption holds. A discrete version of the DSM

330

Predicted 2010 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

Predicted 2010 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator Amy Irish-Brown, District ICM Educator Clarksville Horticultural Experimentation Station This season started out early the state has a light crop. The post- bloom cold temperatures will delay maturity and light croploads

331

2012 PREDICTED APPLE HARVEST DATES Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

2012 PREDICTED APPLE HARVEST DATES Phillip Schwallier, District Horticulture Educator Amy Irish-Brown, District ICM Educator Clarksville Horticultural Experimentation Station We have the least confidence in our are above normal. Light crops will mature a few days earlier. Other varieties are less prone to hot

332

Limits to the potential distribution of light brown apple moth in ArizonaCalifornia based on climate suitability and host plant availability  

E-Print Network (OSTI)

503531 Dumbleton LJ (1932) The apple leaf roller (TortrixJW (1937) The light-brown apple moth (Tortrix post- vittana,distribution of light brown apple moth in ArizonaCalifornia

Gutierrez, Andrew Paul; Mills, Nicholas J.; Ponti, Luigi

2010-01-01T23:59:59.000Z

333

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

334

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

335

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

336

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

337

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

338

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wednesday, June 20, 2012 8:12 AM Wednesday, June 20, 2012 8:12 AM To: Exparte Communications Subject: Energy Conservation Standards for Battery Chargers and External Power Supplies; Proposed Rule Making - Ex Parte Communication Apple Inc. met with DOE to discuss the notice of proposed rule making the Department sent out regarding battery chargers and external power supplies. Below is a list of topics that Apple discussed with DOE. - Discussion regarding Battery Charger product Class 8 and that it does not scale with battery capacity. Class 8 is for DC-DC battery chargers. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark to be placed on the retail

339

Apple Valley, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Apple Valley, California: Energy Resources Apple Valley, California: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 34.5008311°, -117.1858759° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":34.5008311,"lon":-117.1858759,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

340

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple iOS Multiple Vulnerabilities 0: Apple iOS Multiple Vulnerabilities V-080: Apple iOS Multiple Vulnerabilities January 30, 2013 - 12:56am Addthis PROBLEM: Apple iOS Multiple Vulnerabilities PLATFORM: Apple iOS 6.x for iPhone 3GS and later Apple iOS for iPad 6.x Apple iOS for iPod touch 6.x ABSTRACT: Two security issues and multiple vulnerabilities have been reported in Apple iOS REFERENCE LINKS: Article: HT5642 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update Secunia Advisory SA52002 CVE-2011-3058 CVE-2012-2619 CVE-2012-2824 CVE-2012-2857 CVE-2012-2889 CVE-2012-3606 CVE-2012-3607 CVE-2012-3621 CVE-2012-3632 CVE-2012-3687 CVE-2012-3701 CVE-2013-0948 CVE-2013-0949 CVE-2013-0950 CVE-2013-0951 CVE-2013-0952 CVE-2013-0953 CVE-2013-0954 CVE-2013-0955 CVE-2013-0956 CVE-2013-0958 CVE-2013-0959 CVE-2013-0962 CVE-2013-0963 CVE-2013-0964

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy Savers (EERE)

Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or...

342

E-Print Network 3.0 - apple orchard systems Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy 52 Abstract Amendment of orchard soil with low-glucosinolate Brassica napus (rape) seed meal Summary: established in mature apple orchards and infect trees...

343

E-Print Network 3.0 - apple blossom amaryllidaceae Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Toppings Assorted Dressings Entre Grilled Apple Barbequed Chicken Swiss... Blossom Dressing Starch Oven Roasted Quartered Red Skin Potatoes Desserts Cookies, Brownies, Bars...

344

E-Print Network 3.0 - apple leafroller bonagota Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary: , such as: Apple Aphid Cotton Aphid Green Peach Aphid Melon Aphid Pea Aphid Potato Aphid Rose Aphid... Leafminers, such as: Citrus Leafminer Serpentine Leafminer...

345

E-Print Network 3.0 - apple filter cake Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Cake Apple Turnovers Strawberry Rhubarb Pie Chocolate Cream... Vegetarian Crab Cakes Potato Wedges Linguine Brown Rice Pilaf Steamed Italian Green Beans Steamed Fresh... Peach...

346

E-Print Network 3.0 - apple aphid dysaphis Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Sample search results for: apple aphid dysaphis Page: << < 1 2 3 4 5 > >> 1 Community ecology Ants defend aphids against Summary: conditions, ants remove cadavers of the rosy...

347

E-Print Network 3.0 - appl phys lett Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

, left-handed metamaterial. Appl. Phys. Lett. 78, 489 (2001). 102 R. A. Shelby, D. R. Smith, and S... -refractive-index transmission-line media. ... Source: Groningen,...

348

Theor Appl Genet (2004) 108:274279 DOI 10.1007/s00122-003-1435-5  

E-Print Network (OSTI)

Theor Appl Genet (2004) 108:274­279 DOI 10.1007/s00122-003-1435-5 E. Huaracha · M. Xu · S. S. Korban Narrowing down the region of the Vf locus for scab resistance in apple using AFLP-derived SCARs disease apple scab in apple, to a genetic distance of 0.4 cM is presented. Using 11 AFLP-derived SCARs

Korban, Schuyler S.

349

Four species of Zygophiala (Schizothyriaceae, Capnodiales) are associated with the sooty blotch and flyspeck complex on apple  

E-Print Network (OSTI)

and flyspeck complex on apple Jean Carlson Batzer Maria Mercedes Diaz Arias Thomas C. Harrington Mark L: Sooty blotch and flyspeck (SBFS) is a complex of fungi that cause late-season blemishes of apple anamorph Zygophiala jamaicensis), caused flyspeck on apple. In the present study we compared morphology

Harrington, Thomas C.

350

Masting and trophic cascades: interplay between rowan trees, apple fruit moth, and their parasitoid in southern Norway  

E-Print Network (OSTI)

Masting and trophic cascades: interplay between rowan trees, apple fruit moth, and their parasitoid. 2004. Masting and trophic cascades: interplay between rowan trees, apple fruit moth of the dominant seed predator and its parasitoid. The apple fruit moth, Argyresthia conjugella Zeller, is a pre

351

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up  

E-Print Network (OSTI)

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up Apple Mail to check email from the University of Aarhus In the Mail menu, select Indstillinger... #12;Page 2 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 Click the + button

352

A New Canker Disease of Apple, Pear, and Plum Rootstocks Caused by Diaporthe ambigua in South Africa  

E-Print Network (OSTI)

A New Canker Disease of Apple, Pear, and Plum Rootstocks Caused by Diaporthe ambigua in South., Wingfield. B. D.. Wingfield. M. 1., and Calitz. F. J. 1996. A new canker disease of apple. pear, and plum was found to be the c:J.useof a newly recognized disease of apple. pear, and plum rootstocks in South Africa

353

Investigating the Influence of Geometrical Traits on Light Interception Efficiency of Apple Trees: a Modelling Study with MAppleT  

E-Print Network (OSTI)

Investigating the Influence of Geometrical Traits on Light Interception Efficiency of Apple Trees-structural plant model that has been built for simulating architectural development of apple trees. It has depends on geometrical traits. The purpose of this research is to investigate the influence of apple trees

Paris-Sud XI, Université de

354

Technology for Education Need a Computer? Take advantage of University educational discounts on a Dell or Apple computers, printers, and  

E-Print Network (OSTI)

on a Dell or Apple computers, printers, and accessories. Visit: http://uts.sc.edu/computerpurchase/ PC Windows or Apple? Check with your college or major for any specific computer and operating system Distribution Software for Home. And while there, you can also purchase Microsoft Office for your Apple or PC

Almor, Amit

355

Termini e condizioni 1. L'offerta di finanziamento consumer per i clienti Apple Online Store promossa e gestita  

E-Print Network (OSTI)

Termini e condizioni 1. L'offerta di finanziamento consumer per i clienti Apple Online Store è promossa e gestita congiuntamente da Apple Sales International, Hollyhill Industrial Estate, Cork, Irlanda ("Apple") e Agos Ducato Spa, via Bernina 7 20158 Milano ("Agos Ducato"). 2. L'offerta di finanziamento

356

2010 USDA Research Forum on Invasive Species GTR-NRS-P-75 87 ECONOMIC ANALYSIS OF LIGHT BROWN APPLE MOTH  

E-Print Network (OSTI)

2010 USDA Research Forum on Invasive Species GTR-NRS-P-75 87 ECONOMIC ANALYSIS OF LIGHT BROWN APPLE. Our analyses indicated that LBAM could cause substantial economic losses to U.S. apple, grape, orange an economic analysis of the light brown apple moth (LBAM), (Epiphyas postvittana (Walker)), whose presence

357

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

358

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

359

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

360

Pure appl. geophys. 155 (1999) 207232 00334553/99/04020726 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 155 (1999) 207­232 0033­4553/99/040207­26 $ 1.50+0.20/0 Rethinking Earthquake@ldeo.columbia.edu #12;Lynn R. Sykes et al.208 Pure appl. geophys., ment and funding of the National Earthquake Hazards

Shaw, Bruce E.

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Pure appl. geophys. 157 (2000) 16011620 00334553/00/10160120 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 1601­1620 0033­4553/00/101601­20 $ 1.50+0.20/0 Seismic Amplitude Pratt1602 Pure appl. geophys., wavenumbers. We will see that the main difficulty in inverting a deep

Pratt, R. Gerhard

362

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

363

510 Plant Disease / Vol. 97 No. 4 Etiology of Moldy Core, Core Browning, and Core Rot of Fuji Apple in China  

E-Print Network (OSTI)

510 Plant Disease / Vol. 97 No. 4 Etiology of Moldy Core, Core Browning, and Core Rot of Fuji Apple, and core rot of Fuji apple in China. Plant Dis. 97:510-516. `Fuji' apple fruit were collected in Shaanxi to species. Pathogenicity was determined by cutting apple fruit into halves and daubing spore suspensions

Biggs, Alan R.

364

Miyake-Apple posterior video analysis/photographic technique  

Science Journals Connector (OSTI)

The Miyake-Apple technique for posterior photography and video analysis of postmortem eyes and its variations provide a unique view of the anterior segment structures and surgical manipulations that are not readily seen during surgical procedures or by clinical inspection. It is particularly useful in studying and teaching anterior segment surgery, especially cataract and intraocular lens (IOL) surgery. We summarize the peer-reviewed literature on the use of this technique (1) in experimental studies with fresh human or animal eyes to analyze new \\{IOLs\\} and surgical techniques, (2) in formalin-fixed human pseudophakic autopsy eyes to study IOL-related complications, and (3) for teaching and training purposes.

Frederico A.S. Pereira; Liliana Werner; E. John Milverton; Minas T. Coroneo

2009-01-01T23:59:59.000Z

365

ZCS Network Edition 6.0 January 2010 1 Zimbra Connector for Apple iSync (For Mac OS 10.5 +)  

E-Print Network (OSTI)

ZCS Network Edition 6.0 January 2010 1 Zimbra Connector for Apple iSync (For Mac OS 10.5 +) Use the Zimbra Connector for Apple® iSync with Mac running 10.5 or later to sync your Apple Address Book to your Connector for Apple iSync to sync your Calendar and your Contacts. See the Zimbra Connector for Apple i

366

SUMMARY PAPER SAFARI LODGES AND RURAL INCOMES  

E-Print Network (OSTI)

14 October 2004 1. INTRODUCTION In recent years, southern Africa's ecotourism industry has come Spatial Distribution of Major Ecotourism Clusters #12;Ecotourism's contribution to sustainable development development in the remote rural areas where ecotourism destinations are located. In this way, the potential

367

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

368

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network (OSTI)

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

369

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cdric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Herv Darbon

2001-10-02T23:59:59.000Z

370

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

371

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

372

Appl. Phys. B 34, 167-170(1984) Applied ,..o,,,-PhysicsB ~Chemisby  

E-Print Network (OSTI)

Appl. Phys. B 34, 167-170(1984) Applied ,..o,,,- physics PhysicsB ~Chemisby 9 Springer-Verlag1984. Rychov, and A. B. Feodorov Physics Department, Moscow State University, SU-117234 Moscow, USSR Received8

Zadkov, Victor

373

Detection of streptomycin resistance in Erwinia amylovora strains isolated from apple orchards in Chihuahua, Mexico  

Science Journals Connector (OSTI)

Fire blight, one of the most severe diseases of apple and pear, is caused by the bacterium Erwinia amylovora. One control method is the use of antibiotics like streptomycin; however, streptomycin is the only anti...

Adrian Ponce de Len Door; Alejandro Romo Chacn

2013-10-01T23:59:59.000Z

374

E-Print Network 3.0 - apple integrated pest Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

results for: apple integrated pest Page: << < 1 2 3 4 5 > >> 1 The Foundation for The Gator Nation An Equal Opportunity Institution Summary: the risk of pests and unnecessary...

375

DOI: 10.1007/s00339-006-3706-x Appl. Phys. A 85, 233240 (2006)  

E-Print Network (OSTI)

DOI: 10.1007/s00339-006-3706-x Appl. Phys. A 85, 233­240 (2006) Materials Science & Processing chemical vapor deposition [45], hydrothermal synthesis [46], and solvothermal and subsequent anneal- ing

Reed, Mark

376

E-Print Network 3.0 - apple cv bravo Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Search Sample search results for: apple cv bravo Page: << < 1 2 3 4 5 > >> 1 POTATO (Solanum tuberosum) cv. Goldrush W. R. Stevenson and R. V. James Early Blight;...

377

Reflections on Cambridge: Reflections on Isaac Newton, discovery and Cambridge - with apple tree  

E-Print Network (OSTI)

Reflections about the life and effects of Isaac Newton in Cambridge, filmed outside Trinity College, with the descendant of his apple tree behind (and the rooms where he lived and worked). Filmed by Xu Bei in 2009....

Macfarlane, Alan

378

Tackling Care Transitions: Mom and Apple Pie vs. the Devil in the Details  

Science Journals Connector (OSTI)

Continuity of care is a fundamental tenet of high quality of care and has been likened to motherhood and apple pie1. Unfortunately, patients feel that continuity and care transitions are major problems with the...

Vineet M. Arora MD; MAPP

2009-08-01T23:59:59.000Z

379

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tuesday, July 16, 2013 4:35 PM Tuesday, July 16, 2013 4:35 PM To: Exparte Communications Subject: Request for Information on Evaluating New Products for the Battery Chargers and External Power Supply Rulemaking - Ex Parte Communication Below are a list of topics that Apple Inc. discussed with DOE. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark, including using software or package as an alternate to marking the product surface. - Discussion of replacement parts and refurbished products produced prior to the DOE effective date. - Discussion of DOE proposed EPS Level VI efficiency criteria as compared to that of Level V and how the implementation date

380

ENERGY COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE  

Office of Legacy Management (LM)

COMMISSION COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE Pursuant to the rcgu!ations in Title 10, Code of Federal Regulations, Chapter 1, Part 40, application is hereby made for a license to receive, possess, use, transfer, deliver or import into the United Stat-, source material for the activity or activities described. 1. (check ooa) 2. NAME OF APPLICANT W. R. GRACE 6 Co. 0 (a) New Iicense 0 (b) Amendment to License No.- Davison Chemical Division STA-422 3. Q (c) Renewal of Licensr No. 0 (d) Previous License No. Pompton Plains, N. J. 4. ST,.TE THE AOORESS(ES) AT WHICH SOURCE MATERIAL WILL BE POSSESSED OR USED 868 Black Oak Ridge Road, Wayne, fi. J. a*ocY s up/'l File IF 5. BUSINESS OR OCCUPATION I 6. (a) IF APPLICANT IS AN INDIVIDUAL. STATE CITIZENSHIP

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Fermion Generations from "Apple-Shaped" Extra Dimensions  

E-Print Network (OSTI)

We examine the behavior of fermions in the presence of an internal compact 2-manifold which in one of the spherical angles exhibits a conical character with an obtuse angle. The extra manifold can be pictured as an apple-like surface i.e. a sphere with an extra "wedge" insert. Such a surface has conical singularities at north and south poles. It is shown that for this setup one can obtain, in four dimensions, three trapped massless fermion modes which differ from each other by having different values of angular momentum with respect to the internal 2-manifold. The extra angular momentum acts as the family label and these three massless modes are interpreted as the three generations of fundamental fermions.

Merab Gogberashvili; Pavle Midodashvili; Douglas Singleton

2007-08-13T23:59:59.000Z

382

Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 1 of 4  

E-Print Network (OSTI)

Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 1 of 4 Connecting to Poly-WiFi (on Apple iPhone) 1) Open "Settings". 2) Select "Wi-Fi". Information Systems Department #12;Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 2 of 4 3) If your Wi-Fi is currently off, turn On the Wi

Aronov, Boris

383

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

384

Macronized Vowels on a Mac (OS X 10.6 & 10.7) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.6 & 10.7) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click on Language

Keegan, Te Taka

385

Macronized Vowels on a Mac (OS X 10.3, 4 & 5) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.3, 4 & 5) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click

Keegan, Te Taka

386

Macronized Vowels on a Mac (OS X 10.1 & 10.2) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.1 & 10.2) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click

Keegan, Te Taka

387

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

388

Biotechnol. Appl. Biochem. (2005) 42, 119131 (Printed in Great Britain) doi:10.1042/BA20040207 119 Clonal evolution of stem and differentiated cells can be  

E-Print Network (OSTI)

Biotechnol. Appl. Biochem. (2005) 42, 119­131 (Printed in Great Britain) doi:10.1042/BA20040207 119

Zandstra, Peter W.

389

Mac mini: How to Reset the PMU http://docs.info.apple.com/article.html?artnum=300574 1 of 2 7/23/2007 2:06 PM  

E-Print Network (OSTI)

Mac mini: How to Reset the PMU http://docs.info.apple.com/article.html?artnum=300574 1 of 2 7 the PMU on a Mac mini and it still isn't displaying video or turning on, contact Apple technical support (1-800-APL-CARE in the U.S.) or take your computer to your local Apple Retail Store or Apple

California at Santa Barbara, University of

390

ZCS Network Edition 6.0 December 2009 1 Zimbra Connector for Apple iSync (For Mac OS 10.4.x)  

E-Print Network (OSTI)

ZCS Network Edition 6.0 December 2009 1 Zimbra Connector for Apple iSync (For Mac OS 10.4.x) When the Zimbra Connector for Apple® iSync is installed, you can use Apple Address Book, iCal, and Microsoft on OS X 10.5 or later is handled with CalDAV. See Zimbra Connector for Apple iSync (For Max OS 10

391

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

392

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

393

New insights for estimating the genetic value of F1 apple progenies for irregular bearing1 during first years of tree production2  

E-Print Network (OSTI)

1 New insights for estimating the genetic value of F1 apple progenies for irregular bearing1 during title: Early quantification of alternation in flowering for F1 apple progenies18 Submitted: 02 agronomic issues in1 fruit-tree species, particularly in apple, the selection of regular cultivars

Paris-Sud XI, Université de

394

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs, Agriculture Canada Research Station, Vineland Station, Ontario LOR 2EO. Plant  

E-Print Network (OSTI)

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs for publication 19 July 1985. European canker of apple (Malus domestics Borkh. 'MacIntosh') caused by Nectria includes the apple-growing region of central Ontario. Reference: Booth, C. Commonw. Mycol. Inst. Pap. 73

Biggs, Alan R.

395

Application for CALS-CCE 2013 Summer Internship Title of project: Plum Curculio Management in Organic Apple Production: Develop Management Strategies  

E-Print Network (OSTI)

in Organic Apple Production: Develop Management Strategies using Bio-control Nematodes Worksite location (CCE outcomes (no more than 5-10 sentences): The Hudson River Valley organic apple production has been management of plum curculio would aid organic apple production in this region of NY. The development

Keinan, Alon

396

Johnson-Laird, ). So, for example, to satisfy the concept (`to be an apple. . .'\\), a thing must exhibit roundness, edibility, redness, fruitiness, and so on. Such theories  

E-Print Network (OSTI)

#12;? Johnson-Laird, ). So, for example, to satisfy the concept (`to be an apple. . .'\\), a thing of concepts. For instance, apples resemble re engines by sharing the characteristic of redness, they resemble lost much of its popularity, largely because apples, although most o en red, are not necessarily so

Bucci, David J.

397

APPLE: Malus domestica Borkhauser D. P. Kain and A. Agnello Dogwood borer (DWB); Synanthedon scitula (Harris) N.Y.S. Agric. Expt. Station  

E-Print Network (OSTI)

APPLE: Malus domestica Borkhauser D. P. Kain and A. Agnello Dogwood borer (DWB); Synanthedon@nysaes.cornell .edu APPLE, EVALUATION OF VARIOUS TRUNK SPRAYS TO CONTROL BORERS INFESTING BURRKNOTS, 2006 the untreated check. (Table 1) Table 1. Efficacy of insecticides against dogwood borer infesting apple, 2006

Agnello, Arthur M.

398

Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00036777 F ADITI GUPTA F GEN N  

E-Print Network (OSTI)

Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00036777 F ADITI GUPTA F 00036674 F SRISHTI VIVEK SHARMA F GEN N Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH) Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00032299 F SANDEEP KUMAR

Ribeiro, Vinay

399

Nitrogen recycling in the apple (Malus domestica Borkh.) Department of Horticulture, University of Illinois, Urbana, II 6i801,1, U.,c).A.  

E-Print Network (OSTI)

Nitrogen recycling in the apple (Malus domestica Borkh.) J.S. Titus Department of Horticulture of an apple tree in which we have been engaged for the last several years. In looking into some early literature, the recognition that the roots of the apple (Malus domestica Borkh.) could reduce nitrogen

Paris-Sud XI, Université de

400

Pure appl. geophys. 149 (1997) 1-2 0033 4553/97/010001-0251.50+ 0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 149 (1997) 1-2 0033 4553/97/010001-0251.50+ 0.20/0 9 Birkh~user Verlag, Basel regarding the strategy of prediction and particular proposals for #12;2 Introduction Pure appl. geophys

Dmowska, Renata

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:15pm 3:15pm Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

402

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:03am 7:03am Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

403

Appl. Phys. A 68, 379385 (1999) / DOI 10.1007/s003399900012 Applied Physics A  

E-Print Network (OSTI)

cuticle is comparable to polymers exhibiting relatively low thermal conductivities, and, therefore, should.e. with pulse lengths shorter than the thermal conduction in the substrate. Chitin, the main component of insectAppl. Phys. A 68, 379­385 (1999) / DOI 10.1007/s003399900012 Applied Physics A Materials Science

Krahe, Rüdiger

404

Eur. Phys. J. Appl. Phys. 56, 24004 (2011) DOI: 10.1051/epjap/2011110194  

E-Print Network (OSTI)

Eur. Phys. J. Appl. Phys. 56, 24004 (2011) DOI: 10.1051/epjap/2011110194 THE EUROPEAN PHYSICAL JOURNAL APPLIED PHYSICS Regular Article Influence of nitrogen impurities on the formation of active´isica, IST, Universidade T´ecnica de Lisboa, Portugal 3 Research Institute for Solid State Physics and Optics

Guerra, Vasco

405

Tank-Mix Options for Control of Tropical Soda Apple and Dogfennel1  

E-Print Network (OSTI)

SS-AGR-300 Tank-Mix Options for Control of Tropical Soda Apple and Dogfennel1 B. A. Sellers and J throughout Florida, GrazonNext HL tank-mixed with another herbicide will be required to effectively control both species. Many combinations were tested to determine what herbi- cides could be tank

Watson, Craig A.

406

DOI: 10.1007/s00339-003-2397-9 Appl. Phys. A 78, 553556 (2004)  

E-Print Network (OSTI)

DOI: 10.1007/s00339-003-2397-9 Appl. Phys. A 78, 553­556 (2004) Rapidcommunication Materials) were developed [1], active research had been performed to improve the device per- formance [2­6]. For fabricating effi- cient devices, it is necessary to en- hance charge injection efficiency at both OLED cathode

Gong, Jian Ru

407

Radon Series Comp. Appl. Math 8, 129 c de Gruyter 2009 Optimal consumption and investment with  

E-Print Network (OSTI)

Radon Series Comp. Appl. Math 8, 1�29 c de Gruyter 2009 Optimal consumption and investment investment/con- sumption problem for continuous time market models. By applying results from sto- chastic, together with margin tradings on certain financial products, the exposure to losses of investments

Paris-Sud XI, Université de

408

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2009; 17:1133  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2009; 17 Research History of Accelerated and Qualification Testing of Terrestrial Photovoltaic Modules: A Literature-plate terrestrial photovoltaic (PV) modules. An important facet of this subject is the standard module test

409

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press)  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press and Separation of Cd and Te from Cadmium Telluride Photovoltaic Manufacturing Scrap V. M. Fthenakis*,y and W. Wang Brookhaven National Laboratory, Department of Environmental Sciences, Photovoltaic Environmental

410

New data on the effect of solar radiation and ?-farnesene on development of apple superficial scald during storage  

Science Journals Connector (OSTI)

The previously unknown selective effect of solar radiation on the development of apple superficial scald is established. Superficial scald doesnt occur on the sun-exposed side of certain green fruits after st...

S. A. Rodikov

2008-06-01T23:59:59.000Z

411

Appl Microbiol Biotechnol (2003) 62:291296 DOI 10.1007/s00253-003-1297-4  

E-Print Network (OSTI)

Appl Microbiol Biotechnol (2003) 62:291­296 DOI 10.1007/s00253-003-1297-4 O R I G I N A L P A P E R

Daugulis, Andrew J.

412

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2011 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service July 22, 2011 T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

413

Appl. Math. Lett., 25, (2012), 2009-2014. DSM for general nonlinear equations  

E-Print Network (OSTI)

Appl. Math. Lett., 25, (2012), 2009-2014. 1 #12;DSM for general nonlinear equations A.G. Ramm-unique, such that F(y) = 0, F (y) = 0, then equation F(u) = 0 can be solved by a DSM (Dynamical Systems Method) and the rate of convergence of the DSM is given provided that a source-type assumption holds. A discrete

414

Shot Apple 2, a test of the TEAPOT series, 5 May 1955. Technical report  

SciTech Connect

This report describes the activities of more than 2,000 DOD personnel, both military and civilian, in Shot APPLE 2, the thirteenth nuclear test in the TEAPOT atmospheric nuclear weapons testing series. The test was conducted on 5 May 1955 and involved participants from Exercise Desert Rock VI, AFSWP, AFSWC, AEC, Test Groups, and the Air Weather Service. The largest activity was the test of an armored task force, Task Force RAZOR, which involved approximately 1,000 troops.

Ponton, J.; Wilkinson, M.; Rohrer, S.

1981-11-25T23:59:59.000Z

415

CONNNECT TO WiFi USING PROXY SETTINGS (MAC) This guide explains how to set up a modern Apple Mac (running OSX 10.3 or higher) to connect to the internet,  

E-Print Network (OSTI)

CONNNECT TO WiFi USING PROXY SETTINGS (MAC) This guide explains how to set up a modern Apple Mac Apple on the left of the menu bar. 2. Click on `System Preferences'. 3. Click on `Network'. 4. A window

Mottram, Nigel

416

Intel-based iMac, Intel-based Mac mini: How to reset the System Mana... http://docs.info.apple.com/article.html?artnum=303446 1 of 1 7/23/2007 2:16 PM  

E-Print Network (OSTI)

Intel-based iMac, Intel-based Mac mini: How to reset the System Mana... http://docs.info.apple.com/article.html?artnum=303446 1 of 1 7/23/2007 2:16 PM Visit the Apple Store online (1-800-MY-APPLE), visit a retail location on an iMac (Early 2006), iMac (Mid 2006), iMac (Late 2006), or Mac mini (Early 2006): From the Apple menu

California at Santa Barbara, University of

417

Apple pith moth Blastodacna atra Prepared by T. Noma, M. Colunga-Garcia, M. Brewer, J. Landis, and A. Gooch as a part of Michigan State University IPM Program and  

E-Print Network (OSTI)

Apple pith moth Blastodacna atra Prepared by T. Noma, M. Colunga-Garcia, M. Brewer, J. Landis of Agriculture. Michigan State University's invasive species factsheets The apple pith moth is an occasional pest of apple orchards and fruit tree nurseries in Eurasia. Larvae feed inside the twigs and heavy infestations

418

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

419

Pure Appl. Chem., Vol. 82, No. 12, pp. 22472279, 2010. doi:10.1351/PAC-CON-10-09-04  

E-Print Network (OSTI)

2247 Pure Appl. Chem., Vol. 82, No. 12, pp. 2247­2279, 2010. doi:10.1351/PAC-CON-10-09-04 © 2010 to the trans form once the UV source is removed. Although this thermal re-isomerization is slow, *Pure Appl

Martin, Jan M.L.

420

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

Panic in Surat Then came Ebola Change in awareness Ready tonew diseases (e.g. Ebola and Marburg) have appeared. Thissomething far more serious. Ebola first appeared in 1976 in

WHO

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

in saving lives, poor sanitation, unclean water (Photo2.9)and food due to poor hygiene and sanitation. administered by

WHO

2012-01-01T23:59:59.000Z

422

Characterization of the Support and Drive System of the PETRA III APPLE Undulator  

SciTech Connect

Helmholtzzentrum Berlin has built an APPLE II undulator for the storage ring PETRA III. The device has a total length of 5m and a minimum gap of 11mm. The high magnetic forces in particular in the inclined mode have been analyzed by means of finite element methods (FEM). Specific mechanic components such as flexible joints have been optimized to cope with the gap- and shift-dependent 3D-forces and a sophisticated control and drive system has been implemented. After completion of the device, detailed laser interferometer measurements for all operation modes have been performed. The data are compared to the FEM simulations.

Bahrdt, J.; Baecker, H.-J.; Frentrup, W.; Gaupp, A.; Gottschlich, S.; Kuhn, C.; Scheer, M.; Schulz, B. [Helmholtzzentrum Berlin fuer Materialien und Energie, Glienicker Strasse 100, D-14109 Berlin (Germany); Gast, M. [Hochschule fuer Wirtschaft und Recht Berlin, Badensche Str. 50-51, D-10825 Berlin (Germany); Englisch, U.; Schoeps, A.; Tischer, M. [Deutsches Elektronen-Synchrotron DESY, Notkestr. 85, D-22607 Hamburg (Germany)

2010-06-23T23:59:59.000Z

423

Microsoft Word - SAFARI 2000_special_ed_refs_20040804.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Journal of Arid Environments Journal of Arid Environments Volume 54, Issue 2, Pages 257-482 (June 2003) A collection of 15 papers related to the ecology of the Kalahari Transect. Otlogetswe Totolo and Raban Chanda, Environmental change and sustainability issues in the Kalahari region, Journal of Arid Environments, Volume 54, Issue 2, June 2003, Pages 257-259. M. B. K. Darkoh, Regional perspectives on agriculture and biodiversity in the drylands of Africa, Journal of Arid Environments, Volume 54, Issue 2, June 2003, Pages 261-279. K. K. Caylor, H. H. Shugart, P. R. Dowty and T. M. Smith, Tree spacing along the Kalahari transect in southern Africa, Journal of Arid Environments, Volume 54, Issue 2, June 2003, Pages 281-296. Susan Ringrose, Wilma Matheson, Piotr Wolski and Philippa Huntsman-Mapila, Vegetation

424

SEARCHING FOR VIDEOS ON APPLE IPAD AND IPHONE Colum Foley, Jinlin Guo, David Scott, Paul Ferguson, Cathal Gurrin  

E-Print Network (OSTI)

the performance of novice versus expert users. Index Terms-- Video search, iPad, iPhone 1. INTRODUCTION Content system with the iPad app. On the iPad, using simple touch commands users can enter search queriesSEARCHING FOR VIDEOS ON APPLE IPAD AND IPHONE Colum Foley, Jinlin Guo, David Scott, Paul Ferguson

Lee, Hyowon

425

Appl Phys B (2012) 107:921934 DOI 10.1007/s00340-011-4837-0  

E-Print Network (OSTI)

Appl Phys B (2012) 107:921­934 DOI 10.1007/s00340-011-4837-0 On the application of radio frequency in terms of the physi- cal parameters of the resonator and the properties of the ion trap. We also compare · L.R. Simkins · S. Weidt · W.K. Hensinger ( ) Department of Physics and Astronomy, University

Hensinger, Winfried

426

ANL/APS/LS-313 Short-Period APPLE II Undulator for Generating 12-15 keV  

E-Print Network (OSTI)

Radiation Center, Higashi-Hiroshima, 739-0046, Japan Rev. 3, November 25, 2009: Edited by C. Eyberger a zero-emittance electron beam, all radiation on-axis above the first harmonic will be zero). However APPLE II design. In this note, we present magnet design calculations and radiation calculations

Kemner, Ken

427

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2004; 12:93111 (DOI: 10.1002/pip.527)  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2004; 12(In,Ga)Se2; thin-films; photovoltaics; solar energy INTRODUCTION P olycrystalline thin-film solar cells the complete solar spectrum for photovoltaic power conversion. There are several chalcopyr

Romeo, Alessandro

428

Isolation and identification of the pollen-expressed polymorphic F-box genes linked to the S-locus in apple (Malusנdomestica)  

Science Journals Connector (OSTI)

Using degenerate primers designed based on the conserved regions of the reported SLF/SFB genes, more than a dozen of different cDNA clones were isolated from pollen of three different apple S-genotypes by reverse...

Jianhong Cheng; Zhenhai Han; Xuefeng Xu; Tianzhong Li

2006-12-01T23:59:59.000Z

429

Kiss Apple  

E-Print Network (OSTI)

Broadcast Transcript: Spicy kimchee and garlicky fish. Standard fare in Korea. Good for the health, sure, but for the breath? Not so much. So in an attempt to promote healthy eating along with kissably fresh breath, Korean ...

Hacker, Randi; Boyd, David

2011-08-24T23:59:59.000Z

430

Multimed Tools Appl (2009) 41:305331 DOI 10.1007/s11042-008-0230-3  

E-Print Network (OSTI)

Multimed Tools Appl (2009) 41:305­331 DOI 10.1007/s11042-008-0230-3 Hack-proof synchronization-reckoning" are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair of a dead-reckoning protocol that is invulnerable to speed-hacks. Existing games based on dead-reckoning can

Lui, John C.S.

431

Soil microarthropod community structure and dynamics in organic and conventionally managed apple orchards in Western Colorado, USA  

Science Journals Connector (OSTI)

We studied the influences of organic and conventional management practices on microarthropod diversity, densities, and dynamics in apple orchards on the Western Slope of Colorado. The organic orchards differed from the conventional orchards in that they used natural fertilizers (versus synthetic) and did not use insecticides and/or herbicides. Based on findings from annual agroecosystems, we hypothesized that the conventionally managed (CM) apple orchards would support a lower diversity and density of soil microarthropods than the organically managed (OM) apple orchards. We located nine sites, three OM orchards, three CM orchards, and three native sites. From each site, microarthropods were extracted from soil samples taken from June to September of 1997 and April to September of 1998. The richness and diversity of functional groups and families did not differ among the OM orchards, CM orchards and/or native sites. We did find significantly greater (P?0.05) densities of soil microarthropods early in growing season, June 1997 and April 1998, in the OM orchards in comparison to the CM orchards and native sites. Furthermore, the densities of predatory mites were significantly greater in the OM orchards in comparison to both the CM orchards and native sites on selective dates throughout the period of study. Organic management practices have increased the densities of microarthropods above those found in CM orchards and native sites. These results may be due to the interaction between a greater accumulation of plant litter and organic matter in the OM orchards and the heavy pesticide use in the CM orchards.

Jennifer L Doles; Rick J Zimmerman; John C Moore

2001-01-01T23:59:59.000Z

432

You can use a mobile device to access your Exchange account. On this page you will find the settings ActiveSync/Exchange to set up your Apple mobile devices.  

E-Print Network (OSTI)

Overview: You can use a mobile device to access your Exchange account. On this page you will find the settings ActiveSync/Exchange to set up your Apple mobile devices. If you set up an Exchange and task data! Use these settings to access your Exchange e-mail on an Apple mobile device: Username

Qiu, Weigang

433

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

434

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

435

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were...

436

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

437

Cored Apple Bipolarity : A Global Instability to Convection in Radial Accretion?  

E-Print Network (OSTI)

We propose that the prevalence of bipolarity in Young Stellar Objects is due to the fine tuning that is required for spherical accretion of an ambient medium onto a central node.It is shown that there are two steady modes that are more likely than radial accretion, each of which is associated with a hyperbolic central point in the meridional stream lines, and consequently with either an equatorial inflow and an axial ejection or vice versa. In each case the stream lines pass through a thick accretion torus, which is better thought of as a standing pressure wave rather than as a relatively inert Keplerian structure.We base our arguments on a simple analytic example,which is topologi cally generic,wherein each bipolarmode is created by the rebound of accreting matter under the action of the thermal,magnetic,turbulent and centrifugal pressures created in the flow. In both bipolar modes the presence of non-zero angular momentum implies axial regions wherein the pressure is first reduced below the value at infinity and then becomes negative, where the solution fails because rotating material can not enter this region without suction.The model thus has empty stems where the activity of the central source must dominate.So the basic engine of the bipolar flow discussed here is simply the rebound of freely falling material from a thick pressure disc into an axial low pressure region.The low mass,high velocity outflow must be produced in this region by an additional mechanism. This is reminiscent of the cored apple structure observed recently in the very young bipolar source VLA 1623.

R. N. Henriksen; D. Valls-Gabaud

1993-08-19T23:59:59.000Z

438

Work with Apple's Rhapsody Operating System which Allows Simultaneous UNIX Program Development, UNIX Program Execution, and PC Application Execution  

E-Print Network (OSTI)

Over the past decade, UNIX workstations have provided a very powerful program development environment. However, workstations are more expensive than PCs and Macintoshes and require a system manager for day-to-day tasks such as disk backup, adding users, and setting up print queues. Native commercial software for system maintenance and "PC applications" has been lacking under UNIX. Apple's new Rhapsody operating system puts the current MacOS on a NeXT UNIX foundation and adds an enhanced NeXTSTEP object oriented development environment called Yellow Box. Rhapsody simultaneously runs UNIX and commercial Macintosh applications such as word processing or spreadsheets. Thus a UNIX detector Monte Carlo can run for days in the background at the same time as a commercial word processing program. And commercial programs such as Dantz Retrospect are being made available to make disk backup easy under Rhapsody. Apple has announced that in 1999 they intend to be running Rhapsody, or MacOS X as it will be called in the commercial release, on all their newer computers. MacOS X may be of interest to those who have trouble hiring expert UNIX system managers; and to those who would prefer to have a single computer and operating system on their desktop that serves both the needs of UNIX program development and running commercial applications, simultaneously. We present our experiences running UNIX programs and Macintosh applications under the Rhapsody DR2 Developer Release.

Don Summers; Chris Riley; Lucien Cremaldi; David Sanders

2004-12-06T23:59:59.000Z

439

1. Holloszy, J. O. & Coyle, E. F. J. Appl. Physiol. 56, 831838 (1984). 2. Gaunt, A. S., Hikida, R. S., Jehl, J. & Fembert, L. Auk 107,  

E-Print Network (OSTI)

. S., Jehl, J. & Fembert, L. Auk 107, 649­659 (1990). 3. Marsh, R. L. Physiol. Zool. 57, 105­117 (19841. Holloszy, J. O. & Coyle, E. F. J. Appl. Physiol. 56, 831­838 (1984). 2. Gaunt, A. S., Hikida, R). 4. Austin, J. E. & Fredrickson, L. H. Auk 104, 694­699 (1987). 5. Driedzic, W. R., Crowe, H. L

Zettl, Alex

440

A Simple Algorithm for Closed-Loop Control of Stepping Motors IEE Proc. -Electr. Power Appl., (1995) Vol 142, No 1, pp 5-13.  

E-Print Network (OSTI)

A Simple Algorithm for Closed-Loop Control of Stepping Motors IEE Proc. - Electr. Power Appl of Reading Whiteknights PO Box 225 Reading RG6 2AY ABSTRACT Stepping motors are normally operated without feedback. A simple control algorithm is developed which allows a stepping motor to operate effectively

Grimbleby, James

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Analyzing the time-course variation of apple and pear tree dates of flowering1 stages in the global warming context2  

E-Print Network (OSTI)

in the global warming context2 3 Yann Guédon (1) and Jean Michel Legave (2)* 4 5 (1) CIRAD, UMR DAP and INRIA the relationship between flowering advances in fruit trees and19 global warming. After an exploratory analysis;2 to consider the flowering advances in apple and pear trees as impacts of global warming. The26 suddenness

Paris-Sud XI, Université de

442

A G Ramm, Implicit Function Theorem via the DSM, Nonlinear Analysis: Theory, Methods and Appl., 72, N3-4, (2010), 1916-1921.  

E-Print Network (OSTI)

A G Ramm, Implicit Function Theorem via the DSM, Nonlinear Analysis: Theory, Methods and Appl., 72, N3-4, (2010), 1916-1921. 1 #12;Implicit Function Theorem via the DSM A G Ramm Department of the Dynamical Systems Method (DSM). It allows one to solve a class of nonlinear operator equa- tions in the case

443

Journ. Appl. Math and Comp. (JAMC), 38, N1-2, (2012), 523-533. On the DSM Newton-type method  

E-Print Network (OSTI)

Journ. Appl. Math and Comp. (JAMC), 38, N1-2, (2012), 523-533. 1 #12;On the DSM Newton-type method of a Dynamical Systems Method (DSM), based on the continuous analog of the Newton method, is proved without any.30.Hq; 02.30.Tb Keywords: Inverse function theorem, Newton's method, DSM (Dynamical sys- tems method

444

J. Appl. Phys. 116, 023107 (2014); http://dx.doi.org/10.1063/1.4887805 Inhibition of light emission in a 2.5D photonic structure  

E-Print Network (OSTI)

for a collection of emitters and (ii) hazardous with a single emitter whose location is not easily controlledJ. Appl. Phys. 116, 023107 (2014); http://dx.doi.org/10.1063/1.4887805 1 Inhibition of light in a broad spectral range, whatever the in-plane orientation and location of the emitting dipole. We analysed

Paris-Sud XI, Université de

445

Symplectic Integrator Mercury: Bug Report  

E-Print Network (OSTI)

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

446

The Harlequin Cabbage-bug.  

E-Print Network (OSTI)

SUBSTATIONS P. L. DOWNS, President, Temple .................................................................................. Term expires 1919 CHARLES ROGAN, Vzce Preszdent, Austin ...................................................................... Term.... V. M., .Veterinarian SUBSTATION NO. 1: Beeville, Bee Connty DIVISION OF CHEMISTRY E. E. BINFORD, B. S., Superintendent G. S. FRAPS,.~~. D., Chemist in Charge; SUBSTATION NO. 2: Troup, Smith State Chemlst R H RIDGELL B. S Assistant Chemist W. S...

Paddock, F.B. (Floyd B.)

1915-01-01T23:59:59.000Z

447

OpenEI Community - bug  

Open Energy Info (EERE)

Ghost" entries http:en.openei.orgcommunitydiscussionghost-entries

There is an issue that Illinois State University has come across. From Nick B:

448

Prognostication of energy consumption and greenhouse gas (GHG) emissions analysis of apple production in West Azarbayjan of Iran using Artificial Neural Network  

Science Journals Connector (OSTI)

Abstract The present study addresses the amount of inputoutput energy utilized in apple production in West Azarbayjan province of Iran. The environmental indices of greenhouse emissions during apple production were determined as another end of this investigation. Finally, the potential of a supervised Artificial Neural Network (ANN) approach was assessed to prognosticate the energy consumption and environmental indices of apple production in the studying location. The associated data for the production of apple were collected randomly from 100 orchardists by using a face to face questionnaire method. Energy inputs included human labor, machinery, diesel fuel, seeds, herbicide, pesticide, chemical fertilizers, manure, irrigation water and electricity. The total input and output energies of 77,064.24MJha?1 and 802,695MJha?1 were obtained for apple production in the study region where the value of total GHG emission was estimated at 1195.79kgCO2eqha?1. The results revealed that the total consumed energy input could be classified as direct energy (65.97%), and indirect energy (33.76%) or renewable energy (45.37%) and nonrenewable energy (46.97%). The modeling implementations indicated that the lowest RMSE and MAPE of 0.11 and 0.68 were obtained at 16 neurons. At this number of neurons, the best predicting model was achieved. The R2 values of 0.9879 and 0.9827 were obtained for energy input and environmental indices prediction, respectively. The promising ability of the developed ANN in this study indicates that ANN is powerful and robust tool to be served as a functional and dynamic field of studying interest in the realm of energy consumption modeling.

Hamid Taghavifar; Aref Mardani

2014-01-01T23:59:59.000Z

449

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 29, 2011 July 29, 2011 T-679: VMware Security Advisory - VMSA-2011-0010 The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 20, 2011 T-672: Oracle Critical Patch Update Advisory - July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends

450

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 36 (2003) R151R165 PII: S0022-3727(03)26928-X  

E-Print Network (OSTI)

accelerators and x-ray sources. At the next physical regime that will be encountered at even higher intensitiesINSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 36 (2003) R151­R165 PII: S0022-3727(03)26928-X TOPICAL REVIEW Relativistic laser­plasma interactions Donald

Umstadter, Donald

451

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl. Opt. 7 (2005) S241S243 doi:10.1088/1464-4258/7/2/032  

E-Print Network (OSTI)

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl of an optical nonlinearity in a nanoparticle film V A Fedotov, K F MacDonald and N I Zheludev School of Physics for publication 5 August 2004 Published 20 January 2005 Online at stacks.iop.org/JOptA/7/S241 Abstract Optical

Zheludev, Nikolay

452

Sustainable Energy Concepts: A Sustainable energy concept for Safari Resort Beekse Bergen:.  

E-Print Network (OSTI)

??Research to sustainable energy concepts with a holiday resort as case study. Near the safaripark a new holiday resort will be built. The missing natrual (more)

Vons, G.J.

2011-01-01T23:59:59.000Z

453

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...in the accommodation sector, the key to reducing...consisted of a hemispherical construction that insects could climb...233, 234). The heating of whole rooms comes...insecticides to open spaces via aerosols), space sprays, and incendiary...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

454

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...the treatment of field infestations...95) and cedar oil. The modes of...Best Yet cedar oil can kill all bed...the control of field infestations...complexes, as the gas cannot be tightly...Insecticides The cost to develop and...insects during spray operations. In laboratory...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

455

DOODLE-BUGS AND LAW-MAKERS  

Science Journals Connector (OSTI)

...through adolescence. A research group has been assembled. The fund...This committee is conducting a group of studies, of bio-logical...turned south and east via the Klamath lakes to north-western Nevada...some day a wandering ant will fall into the pit and thus keep alive...

J. F. McClendon

1932-07-22T23:59:59.000Z

456

'Bugs' used to treat FGD wastewater  

SciTech Connect

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

457

noBugs - project tracking system.  

E-Print Network (OSTI)

??Testing has become a major part of any project in IT industry. Testing is done at every phase of SDLC because the cost and risk (more)

Kankanawadi, Jyoti Manjunath

2011-01-01T23:59:59.000Z

458

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...of Prurigo of Hebra in Egypt. J. Egypt. Soc. Parasitol. 15...saw a bedbug. New York Daily News. http://articles...Bedbugs not back by popular demand. Dimens. Crit. Care...at Seaport. New York Daily News. http://articles...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

459

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl. Opt. 3 (2001) S103S120 PII: S1464-4258(01)27690-9  

E-Print Network (OSTI)

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl. Opt. 3 (2001) S103­S120 PII: S1464-4258(01)27690-9 Photonic bandgap materials: towards an all-optical September 2001 Published 26 October 2001 Online at stacks.iop.org/JOptA/3/S103 Abstract We describe all-optical

John, Sajeev

460

Bug Bytes,Summer 2008 1 W elcome to Bug Bytes, our newly  

E-Print Network (OSTI)

was named the best in the country by the Chronicle of Higher Education, considered the top news and job for that perfect entomological t-shirts, books, insect art prints, insect candy, and posters of California drag- insect. You can see what's available at www. bohartmuseum.com. Purchases at the Education Programs

Ishida, Yuko

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

What is a bed bug? Bed bugs are small, oval, reddish brown, non-  

E-Print Network (OSTI)

zippers. Thus, experts recommend using hard luggage that closes tight. ·Protectyourclothes. Seal your clothes inside air-tight bags. ·Protectyourluggage. Never set your luggage on the bed or on a couch. Put. ·Treatyourluggagebeforeyoustoreit. After you have unpacked, vacuum your luggage thoroughly. Also, if it is hot outside, you can seal

Almor, Amit

462

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 16340 of 28,905 results. 31 - 16340 of 28,905 results. Article Four Days Left to Buy Energy-Efficient Products for a 2009 Tax Credit! You may want to see if there are any deals out there for energy-efficient purchases-but time is running out if you want to get a tax credit when you file your 2009 taxes in April. http://energy.gov/energysaver/articles/four-days-left-buy-energy-efficient-products-2009-tax-credit Article U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. http://energy.gov/cio/articles/u-165-apple-ios-bugs-let-remote-users-execute-arbitrary-code-and-spoof-address-bar-urls

463

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

a. Appliances by Climate Zone, a. Appliances by Climate Zone, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Climate Zone 1 RSE Row Factors Fewer than 2,000 CDD and -- 2,000 CDD or More and Fewer than 4,000 HDD More than 7,000 HDD 5,500 to 7,000 HDD 4,000 to 5,499 HDD Fewer than 4,000 HDD 0.4 1.9 1.1 1.1 1.2 1.1 Total .................................................. 107.0 9.2 28.6 24.0 21.0 24.1 7.8 Kitchen Appliances Cooking Appliances Oven .............................................. 101.7 9.1 27.9 23.1 19.4 22.2 7.8 1 ................................................... 95.2 8.7 26.0 21.6 17.7 21.2 7.9 2 or More ..................................... 6.5 0.4 1.9 1.5 1.7 1.0 14.7 Most Used Oven ........................... 101.7 9.1 27.9 23.1 19.4 22.2

464

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

9a. Appliances by Northeast Census Region, 9a. Appliances by Northeast Census Region, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total U.S. Northeast Census Region RSE Row Factors Total Census Division Middle Atlantic New England 0.5 1.0 1.3 1.6 Total .............................................................. 107.0 20.3 14.8 5.4 NE Kitchen Appliances Cooking Appliances Oven ......................................................... 101.7 19.6 14.5 5.2 1.1 1 .............................................................. 95.2 18.2 13.3 4.9 1.1 2 or More ................................................. 6.5 1.4 1.1 0.3 11.7 Most Used Oven ...................................... 101.7 19.6 14.5 5.2 1.1 Electric .....................................................

465

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

4a. Appliances by Type of Housing Unit, 4a. Appliances by Type of Housing Unit, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Type of Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Home Two to Four Units Five or More Units 0.4 0.5 1.7 1.6 1.9 Total ............................................... 107.0 73.7 9.5 17.0 6.8 4.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 69.1 9.4 16.7 6.6 4.3 1 ................................................ 95.2 63.7 8.9 16.2 6.3 4.3 2 or More .................................. 6.5 5.4 0.4 0.4 0.2 15.9 Most Used Oven ........................ 101.7 69.1 9.4 16.7 6.6 4.3 Electric ...................................... 63.0 43.3 5.2 10.9 3.6

466

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

3a. Appliances by Household Income, 3a. Appliances by Household Income, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total 2001 Household Income Below Poverty Line Eli- gible for Fed- eral Assist- ance 1 RSE Row Factors Less than $14,999 $15,000 to $29,999 $30,000 to $49,999 $50,000 or More 0.5 1.4 1.1 1.0 0.8 1.6 1.0 Total ............................................... 107.0 18.7 22.9 27.1 38.3 15.0 33.8 3.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 18.0 22.0 26.1 35.6 14.4 32.6 3.2 1 ................................................ 95.2 17.3 21.1 24.8 32.0 13.8 31.1 3.4 2 or More .................................. 6.5 0.8 0.9 1.3 3.6 0.6 1.5 13.1 Most Used Oven ........................ 101.7 18.0 22.0 26.1 35.6 14.4 32.6 3.2

467

appl_household2001.pdf  

Gasoline and Diesel Fuel Update (EIA)

Q Q 31.0 2 or More ... Q Q Q Q Q NF Other Appliances Automobile BlockEngine Battery Heater ... 0.5 0.3 Q 0.1 Q 37.2...

468

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

5a. Appliances by Type of Owner-Occupied Housing Unit, 5a. Appliances by Type of Owner-Occupied Housing Unit, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Owner- Occupied Units Type of Owner-Occupied Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Home Two to Four Units Five or More Units 0.3 0.4 2.1 3.1 1.3 Total ............................................... 72.7 63.2 2.1 1.8 5.7 6.7 Kitchen Appliances Cooking Appliances Oven ........................................... 68.3 59.1 2.0 1.7 5.4 7.0 1 ................................................ 62.9 54.1 2.0 1.6 5.2 7.1 2 or More .................................. 5.4 5.0 Q Q 0.2 22.1 Most Used Oven ........................ 68.3 59.1 2.0 1.7 5.4 7.0 Electric ......................................

469

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

2a. Appliances by West Census Region, 2a. Appliances by West Census Region, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total U.S. West Census Region RSE Row Factors Total Census Division Mountain Pacific 0.5 1.0 1.7 1.2 Total .............................................................. 107.0 23.3 6.7 16.6 NE Kitchen Appliances Cooking Appliances Oven ......................................................... 101.7 22.1 6.6 15.5 1.1 1 .............................................................. 95.2 20.9 6.4 14.5 1.1 2 or More ................................................. 6.5 1.2 0.2 1.0 14.6 Most Used Oven ...................................... 101.7 22.1 6.6 15.5 1.1 Electric .....................................................

470

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

2a. Appliances by Year of Construction, 2a. Appliances by Year of Construction, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Year of Construction RSE Row Factors 1990 to 2001 1 1980 to 1989 1970 to 1979 1960 to 1969 1950 to 1959 1949 or Before 0.4 1.5 1.2 1.1 1.2 1.1 0.9 Total ............................................... 107.0 15.5 18.2 18.8 13.8 14.2 26.6 4.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 14.3 17.2 17.8 12.9 13.7 25.9 4.2 1 ................................................ 95.2 13.1 16.3 16.6 12.1 12.7 24.3 4.4 2 or More .................................. 6.5 1.2 0.9 1.1 0.7 1.0 1.6 14.8 Most Used Oven ........................ 101.7 14.3 17.2 17.8 12.9 13.7 25.9 4.2 Electric ......................................

471

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. November 2, 2011 U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. November 1, 2011 U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data A remote user can obtain configuration information. October 31, 2011 U-023: Debian update for phpldapadmin All versions of phpldapadmin - all released versions as of today are vulnerable to a remote code execution bug. October 28, 2011 U-022: Apple QuickTime Multiple Vulnerabilities

472

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands A vulnerability was reported in Cisco Prime Data Center Network Manager. October 31, 2012

473

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

474

PRODUCTION ANALYSIS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr.

2003-12-01T23:59:59.000Z

475

The baron of bugs: Researcher keeps waterborne pathogens at bay  

E-Print Network (OSTI)

of organisms in the environment, except instead of working with soil now I was working with water,? he said. ?Since it was a drinking water company, the focus was detecting pathogens in source water used for drinking water production, as well as finished... drinking water itself.? Though he believed great advancements in basic and applied waterborne pathogen research were being made, he foresaw limited research opportunities at the water company. At this time, Di Giovanni said, the water indus- try...

Swyden, Courtney

2010-01-01T23:59:59.000Z

476

Phoenix: Detecting and Recovering from Permanent Processor Design Bugs  

E-Print Network (OSTI)

approaches are ineffective Micro-code patching Compiler workarounds OS hacks Firmware #12;http Condition L1, ALU, Memory, etc. Hang, data corruption IO failure, wrong data A (BCD) Signal Snoop L1 hit IO

Torrellas, Josep

477

UMass builds bugs to eat MTBE ByAuriaCimino  

E-Print Network (OSTI)

a toxic gasoline component might be just what the doctor ordered for Maine's con- taminated groundwater with methyl tertiary butyl ether (MTBE), which is found in gasoline. Once the first field trial is complete out of the reformulated gasoline pro- gram (RFG) .The gasoline, which con- tains 11 percent MTBE

Lovley, Derek

478

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

target system. A remote user can obtain potentially sensitive information. Solution: A patch matrix is available in the vendor's advisory. Addthis Related Articles V-076: Cisco...

479

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

480

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

Note: This page contains sample records for the topic "apple safari bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Assassin bug uses aggressive mimicry to lure spider prey  

Science Journals Connector (OSTI)

...vibrometer (Polytec PDV100, Germany). The AES (Audio Engineering Society) output of the laser vibrometer was converted to EBU (CO3, Midiman, M-Audio, USA) and synchronized to the audio track of the video recording. Vibrations...

2011-01-01T23:59:59.000Z

482

Content first in markup demo  

NLE Websites -- All DOE Office Websites (Extended Search)

9/2/11 9/2/11 Frequently Asked Questions (FAQ) eBuy Questions Apple Safari issues Approvals Customer identification Getting information Invoices Logins Packing lists Project IDs Purchase order numbers Remote Access Restricted items Returns Where do I get information about eBuy? A: The best place for eBuy information is on the Procurement Web site. Read the contents of this document and its various links like eBuy Help and Merchant information to get an idea of what eBuy is about. How are eBuy requisitions approved? A: eBuy requisition authorization uses eProcurement's basic approval engine with some rule changes. In general, requisitions $350 or less will self-approve when submitted and do not require an approver.In the following cases, however, the eBuy user needs to enter an Authorized Signer (from

483

Y-12 Careers  

NLE Websites -- All DOE Office Websites (Extended Search)

Careers Careers Viewing job vacancies on our website - FAQs Popup Blocker Some screens are opened and displayed in new windows. If you have suppressed the display of additional windows with a pop-up blocker, you must deactivate or turn off pop-up blockers when using this system. PDF You will need a PDF reader. We recommend Adobe Reader (http://www.adobe.com). Browser The following browsers are recommended by SAP for use with the SAP E- Recruiting system. The recommended browser for this system is Internet Explorer: * Microsoft Internet Explorer Version 6.0 or higher (recommended) * Apple Safari Version 4.0 or higher * Firefox Version 3.6 or higher If you use any other version or different browser and are not able to access the system or have problems on any of the screens, please switch to any of

484

Post-Closure Land Jurisdiction Transfer to the US Fish and Wildlife Service at Rocky Flats: Surviving the Safari Through Old Records and Other Lessons Learned  

SciTech Connect

The U.S. Department of Energy's (DOE's) Rocky Flats Site (Rocky Flats), located near Denver, Colorado, was listed on the Comprehensive Environmental Response, Compensation, and Liability Act National Priorities List (NPL) in 1989. Subsequent cleanup and closure activities were completed in October 2005 and the final remedy was selected in September 2006. The remedy is 'no further action' for the generally un-impacted Peripheral Operable Unit (OU), formerly known as the Buffer Zone, and institutional and physical controls with continued monitoring for the Central OU, formerly the industrialized area. The Peripheral OU has been deleted from the NPL and jurisdiction over the majority of land in that OU (3,953 acres) was transferred to the U.S. Fish and Wildlife Service (USFWS) on July 12, 2007, to establish the Rocky Flats National Wildlife Refuge. The remaining approximately 929 acres in the Peripheral OU were retained by DOE's Office of Legacy Management where outstanding mineral leases and mining operations exist. As mineral rights are purchased or mining operations and mineral leases are completed and fully reclaimed, jurisdiction of portions of the 929 acres will also be transferred to USFWS for inclusion into the refuge. During the almost 2 years since cleanup and closure work was completed at Rocky Flats, DOE and USFWS have worked the specific legal parameters, timing, and constraints of the 3,953-acre transfer. Many lessons have been learned, based on these early experiences. (authors)

Schiesswohl, S. [U.S. Department of Energy, Office of Legacy Management, Westminster, CO (United States); Hanson, M. [S.M. Stoller Corporation, Westminster, CO (United States)

2008-07-01T23:59:59.000Z

485

THE PHYSIOLOGY OF ETHYLENE FORMATION IN APPLES  

Science Journals Connector (OSTI)

...were covered with water, the desiccator...stoppered under water. Respiration rates...purification by condensation and redistillation...temperature- controlled water baths. Figure 2...observed a similar recovery of ethylene production...sections kept under atmospheric conditions for 4...

Stanley P. Burg; Kenneth V. Thimann

1959-01-01T23:59:59.000Z

486

Low energy electron irradiation of an apple  

E-Print Network (OSTI)

The viability of pathogenic organisms on the surface of fresh fruits and vegetables can be significantly reduced by low energy electron beam irradiation. The most difficult technical challenge for surface irradiation of fruits and vegetable...

Brescia, Giovanni Batista

2002-01-01T23:59:59.000Z

487

A is for apple, Alar, and ... alarmist?  

Science Journals Connector (OSTI)

...into the history books. Toxicolo-gists have continued to battle over the basic toxicology on Alar, and in recent weeks the...toxicology review based on pathol-ogy of animals sacrificed midway through the test. EPA's conclusion: UDMH was clearly carcinogenic...

E Marshall

1991-10-04T23:59:59.000Z

488

METEOROLOGICAL APPLICATIONS Meteorol. Appl. 14: 195203 (2007)  

E-Print Network (OSTI)

into rainfall intensity R is non-trivial and depends heavily on the actual drop size distribution (DSD and Palmer (1948) is almost 60 years old. Uijlenhoet and Stricker (1999) have inves- tigated the inconsistency of the Z-R relations in great detail and have developed a consistent rainfall parame- terization

Stoffelen, Ad

489

METEOROLOGICAL APPLICATIONS Meteorol. Appl. 15: 5164 (2008)  

E-Print Network (OSTI)

metrics they often score quite poorly because of the difficulty of predicting an exact match 2007 1. Introduction Mesoscale numerical weather prediction (NWP) mod- els have the potential than at low resolution. Even when the forecast captures the large-scale weather well, the small

Ebert, Beth

490

Einstein's Apple and Relativity's Gravitational Field  

E-Print Network (OSTI)

The foundations of Einstein's first (1907) principle of equivalence are explored and their consequences are stated in terms of invariance under generalized Lorentz transformations, first explored by Hessenberg.

Engelbert L. Schucking

2009-03-31T23:59:59.000Z

491

Einstein's Apple: His First Principle of Equivalence  

E-Print Network (OSTI)

After a historical discussion of Einstein's 1907 principle of equivalence, a homogeneous gravitational field in Minkowski spacetime is constructed. It is pointed out that the reference frames in gravitational theory can be understood as spaces with a flat connection and torsion defined through teleparallelism. This kind of torsion was introduced by Einstein in 1928. The concept of torsion is discussed through simple examples and some historical observations.

Engelbert L. Schucking; Eugene J. Surowitz

2012-08-09T23:59:59.000Z

492

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. June 24, 2011 T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. June 23, 2011 T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. June 22, 2011 T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute

493

U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireshark Bug Database - Bug 7666 SecurityTracker Alert ID: 1027464 Bugtraq ID: 55284 Red Hat Bugzilla - Bug 849926 CVE-2012-3548 IMPACT ASSESSMENT: Medium Discussion: An...

494

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-081: Wireshark Multiple Vulnerabilities Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 18, 2013 V-072: Red Hat update for java-1.7.0-openjdk Red Hat has issued an update for java-1.7.0-openjdk. January 15, 2013 V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

495

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2012 10, 2012 U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. May 9, 2012 U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. May 8, 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may

496

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24, 2012 24, 2012 U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions A vulnerability was reported in Apache CXF September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes. September 19, 2012 U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site

497

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18, 2013 18, 2013 V-137: Apple Mac OS X update for Java Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch Update affect multiple products April 16, 2013 V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. April 15, 2013 V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. April 14, 2013 V-133: Microsoft pulls Patch Tuesday security fix Microsoft has recommended that an update released in the latest Patch Tuesday be removed, after users reported incidents of the "blue screen of

498

Schedule.PDF  

NLE Websites -- All DOE Office Websites (Extended Search)

SAFARI 2000 SAFARI 2000 Synthesis Workshop Hosted by Department of Environmental Sciences Charlottesville, VA October 7 - October 11, 2002 SAFARI 2000 Synthesis Workshop: University of Virginia, October 7-11, 2000 Monday October 7, 2001 Opening Session of the SAFARI 2000 Synthesis Workshop Relevance of SAFARI 2000 Science to National and International Program Goals 08:15 - 08:45 Morning Registration and Coffee, Foyer of Clark Hall 08:50 - 09:00 Administrative Housekeeping 09:00 - 09:10 Official Welcome to the University of Virginia/Opening of the Synthesis Workshop Prof. Gene Block, Provost, University of Virginia 09:10 - 09:30 SAFARI 2000 - Past, Present, Future Asst. Prof. Robert J. Swap, University of Virginia 09:30 - 09:50 Relevance of SAFARI 2000 to the NASA ESE

499

X-ray science taps bug biology to design better materials and reduce  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. "(Caddisfly silk) is really not much stronger than super glue, but try to put super glue in your bathtub without it ever getting a chance to dry," says Jeff Yarger, professor of chemistry, biochemistry and physics at Arizona State University. Courtesy: Bennett Addison. Click to enlarge.

500

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs, setting attributes on...