Powered by Deep Web Technologies
Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

2

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

3

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

4

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

5

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

6

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

7

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

8

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

9

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

10

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

11

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

12

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

13

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

14

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

15

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

16

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

17

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

18

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

19

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

20

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

22

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

23

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

24

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

25

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

26

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

27

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

28

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

29

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

30

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

31

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

32

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

33

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

34

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

35

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

36

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

37

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

38

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

39

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

40

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

42

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

43

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

44

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

NLE Websites -- All DOE Office Websites (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

45

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

46

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

47

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

48

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

49

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

50

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

51

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

52

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

53

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

54

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System Multiple Vulnerabilities U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

55

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: High Discussion: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. The code...

56

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

57

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

58

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

59

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

60

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

62

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

63

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

64

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

65

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

66

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

67

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

68

Quantum polar codes for arbitrary channels  

E-Print Network (OSTI)

We construct a new entanglement-assisted quantum polar coding scheme which achieves the symmetric coherent information rate by synthesizing "amplitude" and "phase" channels from a given, arbitrary quantum channel. We first demonstrate the coding scheme for arbitrary quantum channels with qubit inputs, and we show that quantum data can be reliably decoded by O(N) rounds of coherent quantum successive cancellation, followed by N controlled-NOT gates (where N is the number of channel uses). We also find that the entanglement consumption rate of the code vanishes for degradable quantum channels. Finally, we extend the coding scheme to channels with multiple qubit inputs. This gives a near-explicit method for realizing one of the most striking phenomena in quantum information theory: the superactivation effect, whereby two quantum channels which individually have zero quantum capacity can have a non-zero quantum capacity when used together.

Wilde, Mark M

2012-01-01T23:59:59.000Z

69

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

70

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

71

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

72

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

73

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

74

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

75

U-095: HP Data Protector Media Operations Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 -...

76

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

77

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

78

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

79

T-643: HP OpenView Storage Data Protector Unspecified Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

643: HP OpenView Storage Data Protector Unspecified Code 643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability June 9, 2011 - 3:45pm Addthis PROBLEM: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability PLATFORM: Versions 6.0, 6.10, and 6.11 running on HP-UX, Solaris, Linux and Windows. ABSTRACT: A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia Advisory SA44884 CVE-2011-1864 SecurityTracker Alert ID: 1025620 HP Document ID: c02712867 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

80

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

82

U-099: MySQL Unspecified Code Execution Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: MySQL Unspecified Code Execution Vulnerability 099: MySQL Unspecified Code Execution Vulnerability U-099: MySQL Unspecified Code Execution Vulnerability February 9, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: MySQL 5.x ABSTRACT: Successful exploitation allows execution of arbitrary code. Reference LINKS: Secunia Advisory SA47894 No CVE references currently available. IMPACT ASSESSMENT: Medium Discussion: The vulnerability is reported in version 5.5.20. Other versions may also be affected. The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb on Debian 6.0. Impact: System access from local network Solution: An effective workaround cannot currently be provided due to limited vulnerability details.

83

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apache OFBiz Cross-Site Scripting and Code Execution 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected. references LINKS: Vendor Advisory Secunia Advisory 48800 CVE-2012-1621 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code

84

T-574: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

85

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code 48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability April 16, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in ActiveScriptRuby, which can be exploited by malicious people to potentially compromise a user's system. PLATFORM: Version(s): 1.2.2.0 and prior ABSTRACT: The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands. reference LINKS: Secunia Advisory 48811 CVE-2012-1241 IMPACT ASSESSMENT: High Discussion: ActiveScriptRuby is a software to implement Ruby into a Windows environment. ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on the web browser that can execute ActiveX

86

Optimized code restructuring of OS/2 executables  

Science Conference Proceedings (OSTI)

This paper describes the design and algorithms of FDPR/2 (Feedback Directed Program Restructuring of OS/2 executables), a general-purpose tool that can be used to instrument, profile, and restructure/optimize OS/2 executables for the tel x86 architecture. ...

Jyh-Herng Chow; Yong-fong Lee; Kalyan Muthukumar; Vivek Sarkar; Mauricio Serrano; Iris Garcia; John Hsu; Shauchi Ong; Honesty Young

1995-11-01T23:59:59.000Z

87

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

88

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

89

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

90

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

91

System for loading executable code into volatile memory in a downhole tool  

DOE Patents (OSTI)

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

92

BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations  

E-Print Network (OSTI)

In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusio...

Murphy, Jeremiah W

2008-01-01T23:59:59.000Z

93

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

94

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

95

BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations  

E-Print Network (OSTI)

In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusion of additional physics packages, the ability to use a general equation of state, and most importantly, the ability to solve self-gravitating hydrodynamic flows on time-dependent, arbitrary grids. In what follows, we describe in detail the numerical techniques employed and, with a large suite of tests, demonstrate that BETHE-hydro finds accurate solutions with 2$^{nd}$-order convergence.

Jeremiah W. Murphy; Adam Burrows

2008-05-21T23:59:59.000Z

96

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

97

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE))

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

98

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

99

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

100

U-095: HP Data Protector Media Operations Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP Data Protector Media Operations Lets Remote Users Execute 5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 - 1:33am Addthis PROBLEM: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code PLATFORM: Windows (2003, XP, 2008), HP Data Protector Media Operations version 6.11 and earlier ABSTRACT: Remote execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026626 HP Support Center Document ID: c03179046 CVE-2011-4791 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Data Protector Media Operations. A remote user can execute arbitrary code on the target system. Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Impact:

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

102

SIPC Advisory -Vulnerability in Windows Graphics Rendering Engine Could Allow Remote Code Execution -RISK: HIGH  

E-Print Network (OSTI)

SIPC Advisory - Vulnerability in Windows Graphics Rendering Engine Could Allow Remote Code/4/2011 SUBJECT: Vulnerability in Windows Graphics Rendering Engine Could Allow Remote Code Execution OVERVIEW: A new vulnerability has been discovered in Microsoft Windows Graphics Rendering Engine, which could

Holliday, Vance T.

103

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

input elements may be autocompleted even if the site specifies that autocomplete be disabled CVE-2012-0680. A remote user can create specially crafted HTML that, when loaded by...

104

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will...

105

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

106

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

107

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

108

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

109

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution  

Energy.gov (U.S. Department of Energy (DOE))

Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

110

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

111

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

112

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

113

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

114

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

115

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

116

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted by the target...

117

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

118

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

119

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

120

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

122

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

123

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

124

U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users 1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code January 13, 2012 - 9:15am Addthis PROBLEM: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code PLATFORM: McAfee ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026513 Zero Day Initiative ZDI-12-012 McAfee Threat Intelligence IMPACT ASSESSMENT: High Discussion: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee Security-as-a-Service. User interaction is required to exploit this vulnerability in that the target must visit a

125

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Drupal Drag & Drop Gallery Module Arbitrary File Upload 9: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability June 26, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in the Drag & Drop Gallery module for Drupal, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: Drupal Drag & Drop Gallery Module 6.x ABSTRACT: The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension. Reference Links: Original Advisory Secunia ID 49698 No Current CVE Reference IMPACT ASSESSMENT:

126

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

127

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

128

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

129

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code Injection Vulnerability. PLATFORM: IM Manager versions prior to 8.4.18 are affected. ABSTRACT: Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. referecnce LINKS: Symantec Security Advisory SYM11-012 Symantec Security Updates Bugtraq ID: 49742 IMPACT ASSESSMENT: High Discussion: Symantec was notified of Cross-Site Scripting and Code injection/execution issues present in the Symantec IM Manager management console. The management console fails to properly filter/validate external inputs. Successful exploitation of SQL Injection or Remote Code execution might

130

T-557: Microsoft Office Excel Office Art Object Parsing Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code 7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability February 15, 2011 - 7:00am Addthis PROBLEM: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. reference LINKS: ZDI-11-041 ZDI Public Disclosure: Microsoft CVE-2011-0979 IMPACT ASSESSMENT: High Discussion: The flaw occurs when parsing a document with a malformed Excel document.

131

Linear obfuscation to combat symbolic execution  

Science Conference Proceedings (OSTI)

Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious code and analyzing the trigger condition. ... Keywords: malware analysis, software obfuscation, symbolic execution

Zhi Wang; Jiang Ming; Chunfu Jia; Debin Gao

2011-09-01T23:59:59.000Z

132

Harmonizing Above Code Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Harmonizing "Above Code" Harmonizing "Above Code" Codes Doug Lewin Executive Director, SPEER 6 Regional Energy Efficiency Organizations SPEER Members Texas grid facing an energy crisis * No new generation coming online * Old, inefficient coal-fired plants going offline * ERCOT CEO Trip Doggett said "We are very concerned about the significant drop in the reserve margin...we will be very tight on capacity next summer and have a repeat of this year's emergency procedures and conservation appeals." Higher codes needed to relieve pressure Building Codes are forcing change * 2012 IECC 30% higher than 2006 IECC * IRC, the "weaker code," will mirror IECC in 2012 * City governments advancing local codes with

133

Executive Director  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Director Executive Director Rich Marquez, Executive Director, leads institutional initiatives and provides oversight for the Laboratory's organizations for Ethics and Audits, Prime Contract, Chief Financial Officer, Chief Information Officer, Ombuds, and Communications and Government Affairs. Contact Operator Los Alamos National Laboratory (505) 667-5061 Marquez has received a number of significant awards and recognitions, including the Presidential Rank Award for Meritorious Service. Rich Marquez Executive Director Rich Marquez, Executive Director Richard A. (Rich) Marquez currently serves Los Alamos National Laboratory as executive director reporting to the Laboratory director. Marquez leads institutional initiatives and provides oversight for several Laboratory organizations, including

134

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Subversion Hook Scripts Arbitrary Command Injection 0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am Addthis PROBLEM: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability PLATFORM: Apache Subversion 1.x ABSTRACT: A vulnerability has been reported in Apache Subversion. REFERENCE LINKS: Apache Original Advisory Secunia Advisory SA53727 CVE-2013-2088 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an input validation error in the svn-keyword-check.pl hook script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that contrib scripts are used on the

135

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

136

Executive Resources  

Energy.gov (U.S. Department of Energy (DOE))

The Executive Resources Division provides integrated executive policy and operational personnel support services in a centralized location to the Senior Executive Service (SES), Senior-Level (SL), Scientific and Professional (ST), Excepted Service and political appointees. Additional SES information can be found on the SES website which is located on the Office of Personnel Management’s (OPM) website.

137

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

138

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

139

Certifying execution time  

Science Conference Proceedings (OSTI)

In this paper we present the framework Abstraction-Carrying CodE Platform for Timing validation (ACCEPT), designed for timing analysis of embedded real-time systems using the worst-case execution time (WCET) as the safety parameter. In the context ...

Vítor Rodrigues; João Pedro Pedroso; Mário Florido; Simão Melo de Sousa

2011-05-01T23:59:59.000Z

140

EXECUTIVE OVERVIEW  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

at the Waste Management Conference ("Visible, Endurable, Enforceable Institutional Controls: Weldon Spring Site-A 10-Year Journey"). EXECUTIVE OVERVIEW U.S. Department of Energy...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an authentication flaw and gain access to the target user's account CVE-2011-3416. A remote user can exploit a flaw in the handling of cached content when Forms Authentication...

142

IMPACTS OF THE 2009 IECC FOR RESIDENTIAL BUILDINGS AT STATE LEVELBUILDING ENERGY CODES PROGRAM IMPACTS OF THE 2009 IECC FOR RESIDENTIAL BUILDINGS AT STATE LEVEL Executive Summary  

E-Print Network (OSTI)

The Building Energy Codes Program (BECP) recently conducted a nationwide residential energy code analysis for the U.S. Department of Energy (DOE). The analysis compares the requirements of the 2009 International Energy Conservation Code ® (IECC) with the residential code—or typical construction practice in the absence of a code—in most states as of June 2009. The results, which include estimated typical energy savings of updating each state’s code to the 2009 IECC, are provided in this report in chapters specific to each state. An overview of the 2009 IECC and its major chapters, as well as a brief comparison to previous versions, is provided as introductory information. The IECC is then briefly compared to the International Residential Code, which contains a chapter with energy efficiency requirements that are very similar to the IECC. Several states have either not adopted a mandatory energy code or developed their own codes which have minimal or no connection to the IECC. The latter—including California, Florida, Oregon, and Washington— were not included in this analysis as the codes in these states would be difficult to appropriately compare to the 2009 IECC and most of these states have energy offices that have already assessed the IECC on their own. Chapter 2 is dedicated to outlining some of the major code differences in the 2009 IECC that are not contained in any previous version of the code, and to which much of the energy savings of the 2009 IECC compared to previous versions is attributable. These energy saving differences are described in further detail in the report,

unknown authors

2009-01-01T23:59:59.000Z

143

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

144

A scalable, fast and multichannel arbitrary waveform generator  

E-Print Network (OSTI)

This article reports on development of a multichannel arbitrary waveform generator (MAWG), which simultaneously generates arbitrary voltage waveforms on 24 independent channels with a dynamic update rate of up to 25 Msps. A real-time execution of a single waveform and/or sequence of multiple waveforms in succession, with a user programmable arbitrary sequence order is provided under the control of a stand-alone sequencer circuit implemented using an FPGA. The device is operated using an internal clock and can be synced to other devices by means of the TTL pulses. The device can be used for output voltages in the range of up to +-9 V with a drift rate below +-10 uV/min and a maximum deviation less than +- 300 uVpp over a period of two hours.

Baig, Muhammad Tanveer; Wiese, Andreas; Heidbrink, Stefan; Ziolkowski, Michael; Wunderlich, Christof

2013-01-01T23:59:59.000Z

145

A scalable, fast and multichannel arbitrary waveform generator  

E-Print Network (OSTI)

This article reports on development of a multichannel arbitrary waveform generator (MAWG), which simultaneously generates arbitrary voltage waveforms on 24 independent channels with a dynamic update rate of up to 25 Msps. A real-time execution of a single waveform and/or sequence of multiple waveforms in succession, with a user programmable arbitrary sequence order is provided under the control of a stand-alone sequencer circuit implemented using an FPGA. The device is operated using an internal clock and can be synced to other devices by means of the TTL pulses. The device can be used for output voltages in the range of up to +-9 V with a drift rate below +-10 uV/min and a maximum deviation less than +-300 uVpp over a period of two hours.

Muhammad Tanveer Baig; Michael Johanning; Andreas Wiese; Stefan Heidbrink; Michael Ziolkowski; Christof Wunderlich

2013-07-22T23:59:59.000Z

146

Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary Executive Summary Highway-based excise taxes are paid by highway users, and the tax revenues are distributed to States for supporting highways, safety, and transit programs. The processes for collecting these taxes and redistributing them to the States are very complex. The U.S. Treasury collects most of the taxes from a relatively small number of large corporations located in only a few States. The Internal Revenue Service (IRS) does not have an accurate picture of where the motor fuel is eventually consumed. Because the actual State-by-State contributions are not available, detailed analyses are required to estimate a State's on-highway motor fuel use. The attribution process uses State-reported data and nationally applied statistical models to determine how much fuel is used on highways in each State and the proportion of each State's usage in comparison to the total motor fuel usage for all States.

147

EXECUTIVE SUMMARY  

National Nuclear Security Administration (NNSA)

FUSION ENERGY SCIENCE ADVISORY COMMITTEE FUSION ENERGY SCIENCE ADVISORY COMMITTEE Panel on High Energy Density Laboratory Plasmas ADVANCING THE SCIENCE OF HIGH ENERGY DENSITY LABORATORY PLASMAS January 2009 UNITED STATES DEPARTMENT OF ENERGY 1 TABLE OF CONTENTS EXECUTIVE SUMMARY.......................................................................................... 5 1 HIGH ENERGY DENSITY LABORATORY PLASMA SCIENCE .................................... 15 2 THE CHARGE TO FESAC ...................................................................................... 19 3 THE PANEL PROCESS ............................................................................................ 20 4 STEWARDSHIP OF THE JOINT PROGRAM ............................................................... 23

148

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

149

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

150

Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program Lawrence Berkeley National Laboratory LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) This page intentionally left blank. LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) i Contents Executive Summary .............................................................................................. v 1. Introduction................................................................................................... 1 1.1 Work Activities .............................................................................................. 1

151

EXECUTIVE SUMMARY  

NLE Websites -- All DOE Office Websites (Extended Search)

EXECUTIVE SUMMARY This document contains an assessment of the first project to be completed under the U.S. Department of Energy Clean Coal Technology Program. The project was selected under Round I and is known officially as "The Demonstration of an Advanced Cyclone Coal Combustor, with Internal Sulfur, Nitrogen, and Ash Control for the Conversion of a 23 MMBtu/hour Oil-Fired Boiler to Pulverized Coal." The project was carried out by the Coal Tech Corporation over the period March 1987 February 1991 at the site of the Keeler/Dorr-Oliver Boiler Company in Williamsport, Pennsylvania. The project was a three-year demonstration scale test of a 30 MMBtu/hr air-cooled ceramic slagging cyclone combustor retrofitted to a horizontal 23-MMBtu/hr oil or natural gas-fired Keeler/Dorr-Oliver DS-9

152

Unifying Execution of Imperative and Declarative Code  

E-Print Network (OSTI)

We present a unified environment for running declarative specifications in the context of an imperative object-Oriented programming language. Specifications are Alloy-like, written in first-order relational logic with ...

Milicevic, Aleksandar

153

From Formal Methods to Executable Code  

E-Print Network (OSTI)

The objective of this work is the derivation of software that is verifiably correct. Our approach is to abstract system specifications and model these in a formal framework called Timed Input/Output Automata, which provides ...

Musial, Peter M.

2012-08-27T23:59:59.000Z

154

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Reader and Acrobat Affected software versions: - Adobe Reader X (10.0) and for Windows and Macintosh - Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and...

155

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

156

Staged symbolic execution  

Science Conference Proceedings (OSTI)

Recent advances in constraint solving technology and raw computation power have led to a substantial increase in the effectiveness of techniques based on symbolic execution for systematic bug finding. However, scaling symbolic execution remains a challenging ...

Junaid Haroon Siddiqui; Sarfraz Khurshid

2012-03-01T23:59:59.000Z

157

Specification-enhanced execution  

E-Print Network (OSTI)

Our goal is to provide a framework that allows the programmer to easily shift responsibility for certain aspects of the program execution to the runtime system. We present specification- enhanced execution, a programming ...

Yang, Jean, S.M. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

158

Quantum stabilizer codes and beyond  

E-Print Network (OSTI)

The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. Despite the large body of literature in quantum coding theory, many important questions, especially those centering on the issue of "good codes" are unresolved. In this dissertation the dominant underlying theme is that of constructing good quantum codes. It approaches this problem from three rather different but not exclusive strategies. Broadly, its contribution to the theory of quantum error correction is threefold. Firstly, it extends the framework of an important class of quantum codes - nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. In particular it provides many explicit constructions of stabilizer codes, most notably it simplifies the criteria by which quantum BCH codes can be constructed from classical codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. Prior to our work however, systematic methods to construct these codes were few and it was not clear how to fairly compare them with other classes of quantum codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work established a close link between subsystem codes and classical codes and it became clear that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels. This approach is based on a Calderbank- Shor-Steane construction that combines BCH and finite geometry LDPC codes.

Sarvepalli, Pradeep Kiran

2008-08-01T23:59:59.000Z

159

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

- 1171 1970 USERS EXECUTIVE COMMITTEE ELECTION C. Baltay, Columbia 870 - 572 E. C. Fowler, Purdue (Chairman 1270-572) 870 - 572 G. Masek, UCSD 870 - 572 L. Pondrom,...

160

EXECUTIVE ORDER 13111  

NLE Websites -- All DOE Office Websites (Extended Search)

PM EXECUTIVE ORDER 13111 January 12, 1999 - - - - - - - USING TECHNOLOGY TO IMPROVE TRAINING OPPORTUNITIES FOR FEDERAL GOVERNMENT EMPLOYEES Advances in technology and increased...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Quantization Noise Shaping on Arbitrary Frame Expansions  

E-Print Network (OSTI)

Quantization noise shaping is commonly used in oversampled A/D and D/A converters with uniform sampling. This paper considers quantization noise shaping for arbitrary finite frame expansions based on generalizing the view ...

Boufounos, Petros T.

162

Worldline Green Functions for Arbitrary Feynman Diagrams  

E-Print Network (OSTI)

We propose a general method to obtain the scalar worldline Green function on an arbitrary 1D topological space, with which the first-quantized method of evaluating 1-loop Feynman diagrams can be generalized to calculate arbitrary ones. The electric analog of the worldline Green function problem is found and a compact expression for the worldline Green function is given, which has similar structure to the 2D bosonic Green function of the closed bosonic string.

Peng Dai; Warren Siegel

2006-08-09T23:59:59.000Z

163

Relevant Executive Orders and Policies  

NLE Websites -- All DOE Office Websites (Extended Search)

please click here. Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic Performance (2009) In October 2009, President Obama issued Executive...

164

1. executive committee bylaws  

Science Conference Proceedings (OSTI)

teer requests uthorized. and execute nonvoting, all ng). Technical Div ng and organ recommenda ficant action in ors. m time-to-tim ing non-inclu nd the procedu.

165

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 29, 2007 INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" i Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

166

Budget Formulation & Execution  

Energy.gov (U.S. Department of Energy (DOE))

The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as...

167

Arbitrary body segmentation in static images  

Science Conference Proceedings (OSTI)

In this paper, a novel method for segmenting arbitrary human body in static images is proposed. With the body probability map obtained by the pictorial structure model, we develop a superpixel based EM-like algorithm to refine the map, which can then ... Keywords: l1 based graph cuts, Pictorial structure, Superpixel based EM algorithm

Shifeng Li; Huchuan Lu; Lei Zhang

2012-09-01T23:59:59.000Z

168

Bell-type inequalities for arbitrary observables  

E-Print Network (OSTI)

We derive a Bell-type inequality for observables with arbitrary spectra. For the case of continuous variable systems we propose a possible experimental violation of this inequality, by using squeezed light and homodyne detection together with methods of quantum-state reconstruction. It is shown that the violation is also possible for realistic detection efficiencies.

E. Shchukin W. Vogel

2009-02-23T23:59:59.000Z

169

Executive Order 13423 Implementing Instructions  

Energy.gov (U.S. Department of Energy (DOE))

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423“Strengthening Federal Environmental, Energy, and Transportation Management”

170

Detection of malicious computer executables  

SciTech Connect

A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

2009-04-14T23:59:59.000Z

171

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

validate remote certificates and may ignore that a system root certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On...

172

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

schemes CVE-2011-2798. A remote user can trigger a use-after-free in HTML range handling CVE-2011-2799. A remote user can obtain the client-side redirect target...

173

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

hidden, auto-filled forms on the target user's browser CVE-2011-0217. With a certain Java configuration, a remote user can create a specially crafted web site that, when loaded...

174

Project Execution Plan RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Execution Plan (PEP) Review Module Project Execution Plan (PEP) Review Module March 2010 CD-0 O 0 OFFICE OF P C CD-1 F ENVIRO Standard R Project E Rev Critical Decis CD-2 M ONMENTAL Review Plan Execution view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) n Plan e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008,

175

Integrating Program Component Executables  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrating Integrating Program Component Executables on Distributed Memory Architectures via MPH Chris Ding and Yun He Computational Research Division, Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720, USA chqding@lbl.gov, yhe@lbl.gov Abstract A growing trend in developing large and complex ap- plications on today's Teraflop computers is to integrate stand-alone and/or semi-independent program components into a comprehensive simulation package. One example is the climate system model which consists of atmosphere, ocean, land-surface and sea-ice. Each component is semi- independent and has been developed at different institu- tions. We study how this multi-component multi-executable application can run effectively on distributed memory archi- tectures. We identify five effective execution modes and de- velop the MPH library to support

176

Compiling Codes on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Compiling Codes Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention is that programs are compiled on the login nodes and executed on the compute nodes. Because the compute nodes and login nodes have different operating systems, binaries created for compute nodes may not run on the login node. The wrappers mentioned above guarantee that

177

Optimal superdense coding over memory channels  

SciTech Connect

We study the superdense coding capacity in the presence of quantum channels with correlated noise. We investigate both the cases of unitary and nonunitary encoding. Pauli channels for arbitrary dimensions are treated explicitly. The superdense coding capacity for some special channels and resource states is derived for unitary encoding. We also provide an example of a memory channel where nonunitary encoding leads to an improvement in the superdense coding capacity.

Shadman, Z.; Kampermann, H.; Bruss, D.; Macchiavello, C. [Institute fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, DE-40225 Duesseldorf (Germany); Dipartimento di Fisica ''A. Volta'' and INFM-Unita di Pavia, Via Bassi 6, IT-27100 Pavia (Italy)

2011-10-15T23:59:59.000Z

178

Data processing with microcode designed with source coding  

DOE Patents (OSTI)

Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

McCoy, James A; Morrison, Steven E

2013-05-07T23:59:59.000Z

179

On the Suitable Domain for SVM Training in Image Coding  

Science Conference Proceedings (OSTI)

Conventional SVM-based image coding methods are founded on independently restricting the distortion in every image coefficient at some particular image representation. Geometrically, this implies allowing arbitrary signal distortions in an n-dimensional ...

Gustavo Camps-Valls; Juan Gutiérrez; Gabriel Gómez-Pérez; Jesús Malo

2008-06-01T23:59:59.000Z

180

Fluctuating surface currents: An algorithm for efficient prediction of Casimir interactions among arbitrary materials in arbitrary geometries  

E-Print Network (OSTI)

This paper presents a method for the efficient numerical computation of Casimir interactions between objects of arbitrary geometries, composed of materials with arbitrary frequency-dependent electrical properties. Our ...

Reid, M. T. Homer

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Executive Secretariat | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom of Information Act Financial Assistance Information...

182

Remote procedure execution software for distributed systems  

SciTech Connect

Remote Procedure Execution facilitates the construction of distributed software systems, spanning computers of various types. Programmers who use the RPX package specify subroutine calls which are to be executed on a remote computer. RPX is used to generate code for dummy routines which transmit input parameters and receive output parameters, as well as a main program which receives procedure call requests, calls the requested procedure, and returns the result. The package automatically performs datatype conversions and uses an appropriate connection oriented protocol. Supported operating systems/processors are VMS(VAX), UNIX(MIPS R2000, R3000) and Software Components Group's pSOS (680x0). Connection oriented protocols are supported over Ethernet (TCP/IP) and RS232 (a package of our own design). 2 refs., 2 figs.

Petravick, D.L.; Berman, E.F.; Sergey, G.P.

1989-05-01T23:59:59.000Z

183

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Flaws Let Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code U-126: Cisco...

184

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November...

185

V-109: Google Chrome WebKit Type Confusion Error Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code...

186

Adding control to arbitrary unknown quantum operations  

E-Print Network (OSTI)

While quantum computers promise significant advantages, the complexity of quantum algorithms remains a major technological obstacle. We have developed and demonstrated an architecture-independent technique that simplifies adding control qubits to arbitrary quantum operations-a requirement in many quantum algorithms, simulations and metrology. The technique is independent of how the operation is done, does not require knowledge of what the operation is, and largely separates the problems of how to implement a quantum operation in the laboratory and how to add a control. We demonstrate an entanglement-based version in a photonic system, realizing a range of different two-qubit gates with high fidelity.

Xiao-Qi Zhou; Timothy C. Ralph; Pruet Kalasuwan; Mian Zhang; Alberto Peruzzo; Benjamin P. Lanyon; Jeremy L. O'Brien

2010-06-14T23:59:59.000Z

187

Towards Memory-Load Balanced Fast Fourier Transformations in Fine-Grain Execution Models  

Science Conference Proceedings (OSTI)

The code let model is a fine-grain dataflow-inspired program execution model that balances the parallelism and overhead of the runtime system. It plays an important role in terms of performance, scalability, and energy efficiency in exascale studies ... Keywords: FFT, fine-grain, execution model, memory bandwidth

Chen Chen, Yao Wu, Stephane Zuckerman, Guang R. Gao

2013-05-01T23:59:59.000Z

188

Executive information system  

DOE Green Energy (OSTI)

The Executive Information System (EIS) is a computer-based information handling system. The system has been designed and implemented for Energy Conversion and Utilization Technologies to allow program managers easy access and tracking of certain types of reporting at various levels of management interaction, to simplify the handling of program-related data, and to streamline the preparation of reporting documents and responses to requests for information from the program. The EIS is especially useful in assisting DOE program managers in the routine dissemination of reports and information. The characteristics of each component of the EIS are discussed. A user's guide to the EIS is included in this report.

Vitullo, M.; Winter, C.; Johnson, D.R.

1984-07-01T23:59:59.000Z

189

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31087, R 408.31088, R 408.31089, and R 408.31090 of the Michigan Administrative Code are amended and R 408.31087a is added to the code as follows: PART 10a MICHIGAN UNIFORM ENERGY CODE R 408.31087 Applicable code. Rule 1087. Rules governing the energy efficiency for the design and construction of buildings and structures, not including residential buildings, shall be those contained in the international energy conservation code, 2009 edition, section 501.1 and the ASHRAE

190

T-559: Stack-based buffer overflow in oninit in IBM Informix...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

execute arbitrary code on vulnerable installations of IBM Informix Database Server. SQL query execution privileges are required to exploit this vulnerability. The specific flaw...

191

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute...

192

Office of the Executive Secretariat  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Secretariat, MA-70 Executive Secretariat, MA-70 Acting Director Carol A. Matthews Special Projects Security Policy and Analysis Group Programmatic Expertise High-level Review and Analysis Correspondence Management Group Correspondence Control & Assignment Correspondence Support FOIA Management Special Projects Receiving and Delivery Administration and Executive Commitments Group eDOCS Executive Commitments Information Management Budget Personnel Administration Office of History and Heritage Resources Institutional Memory History Activities Historic Preservation Litigation Research Customer Research Archives Administration May 2013 Deputy Director Carol A. Matthews Federal Advisory Committee Management

193

Source codes as random number generators  

E-Print Network (OSTI)

Abstract—A random number generator generates fair coin flips by processing deterministically an arbitrary source of nonideal randomness. An optimal random number generator generates asymptotically fair coin flips from a stationary ergodic source at a rate of bits per source symbol equal to the entropy rate of the source. Since optimal noiseless data compression codes produce incompressible outputs, it is natural to investigate their capabilities as optimal random number generators. In this paper we show under general conditions that optimal variable-length source codes asymptotically achieve optimal variable-length random bit generation in a rather strong sense. In particular, we show in what sense the Lempel–Ziv algorithm can be considered an optimal universal random bit generator from arbitrary stationary ergodic random sources with unknown distributions. Index Terms — Data compression, entropy, Lempel–Ziv algorithm, random number generation, universal source coding.

Karthik Visweswariah; Student Member; Sanjeev R. Kulkarni; Senior Member; Sergio Verdú

1998-01-01T23:59:59.000Z

194

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

2012-2013 UEC and GSA Members at October meeting 2012-2013 UEC and GSA Members at October meeting Current Members of the Fermilab Users Executive Committee 2012-2013 Name and Organization Term Email Nikos Varelas, Chair University of Illinois at Chicago 9/11 - 8/13 varelas AT uic.edu Mary Anne Cummings Muons, Inc. 9/12 - 8/14 macc AT fnal.gov Craig Group University of Virginia 9/12 - 8/14 group AT fnal.gov Sergo Jindariani Fermilab 9/11 - 8/13 sergo AT fnal.gov Daniel Kaplan Illinois Institute of Technology 9/11 - 8/13 kaplan AT iit.edu Ryan Patterson California Institute of Technology 9/11 - 8/13 rbpatter AT caltech.edu Greg Pawloski University of Minnesota 9/11 - 8/13 pawloski AT umn.edu Breese Quinn University of Mississippi 9/12 - 8/14 quinn AT phy.olemiss.edu Lee Roberts Boston University 9/12 - 8/14 roberts AT bu.edu Mandy Rominsky

195

Fire Executive Council  

E-Print Network (OSTI)

Dear Reader, The Quadrennial Fire Review (QFR) is a strategic assessment process that is conducted every four years to evaluate current mission strategies and capabilities against best estimates of the future environment for fire management. This integrated review is a joint effort of the five federal natural resource management agencies and their state, local, and tribal partners that constitute the wildland fire community. The objective is to create an integrated strategic vision document for fire management. The 2009 QFR presents incoming federal policy leadership and the agency senior executives with the driving forces for change, suggested mission strategies, and analyses of workforce and operational capabilities. The document provides a solid foundation for policy discussions within the federal agencies and, importantly, among the federal agencies and state, local, tribal, and other partners. While the QFR is not a formal policy or decision document, it sets the stage for a “strategic conversation ” about future direction and change in fire management. Our thanks goes to the QFR Integration Panel members who led the two-year analysis and review process and who prepared the final report, along with those members of the wildland fire community who submitted information, commentary, and suggestions during the process. We look forward to joining our wildland fire colleagues in using the QFR to chart and implement a national approach to wildland fire management.

Jeff Jahnke; Abigail Kimbell; U. S. Fish; Wildlife Service; James Caswell; Mary A. Bomar; Jerry Gidner

2008-01-01T23:59:59.000Z

196

A compiler framework for the reduction of worst-case execution times  

Science Conference Proceedings (OSTI)

The current practice to design software for real-time systems is tedious. There is almost no tool support that assists the designer in automatically deriving safe bounds of the worst-case execution time (WCET) of a system during code ... Keywords: Code generation, Compiler, Optimization, Real-time, WCET

Heiko Falk; Paul Lokuciejewski

2010-10-01T23:59:59.000Z

197

Going Beyond Code | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Going Beyond Code Beyond the energy codes are stretch, green, or sustainable codes and associated labeling programs. Codes are written to lend themselves to mandatory enforcement...

198

Permanent Rules and Executive Orders effective as of 07-22-2010  

NLE Websites -- All DOE Office Websites (Extended Search)

Rules and Executive Orders effective as of 07-22-2010 Rules and Executive Orders effective as of 07-22-2010 Title 748 - Uniform Building Code Commission Chapter 1 Administrative Operations Chapter 3 General Provisions Chapter 5 Fees and Collection of Fees Chapter 7 Commission Committees Chapter 10 Code Adoption Procedures Chapter 15 Code Adopted by State Agencies and Political Subdivisions Permanent Rules and Executive Orders effective as of 07-22-2010 Title 748 - Uniform Building Code Commission Chapter 1 - Administrative Operations 748:1-1-1. Organization The employees of the Commission shall be organized and divided into such divisions or units, as the Commission deems desirable for efficiency. Such organization and division may be revised by the Commission as it finds necessary or expedient. Copies of the organizational chart are available upon

199

Federal Energy Management Program: Executive Order 13514  

NLE Websites -- All DOE Office Websites (Extended Search)

514 to someone by E-mail Share Federal Energy Management Program: Executive Order 13514 on Facebook Tweet about Federal Energy Management Program: Executive Order 13514 on Twitter...

200

Federal Energy Management Program: Executive Order 13221  

NLE Websites -- All DOE Office Websites (Extended Search)

Fleet Reporting Executive Order 13221 Executive Order (E.O.) 13221, Energy Efficient Standby Power Devices, calls for Federal agencies to purchase products that use minimal...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Caltech campus executive LDRD.  

Science Conference Proceedings (OSTI)

The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in thesetask switches' the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

Shepodd, Timothy J.; Knudsen, Tamara

2013-01-01T23:59:59.000Z

202

Caltech campus executive LDRD.  

SciTech Connect

The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in thesetask switches' the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

Shepodd, Timothy J.; Knudsen, Tamara

2013-01-01T23:59:59.000Z

203

Regulatory constraints on executive compensation  

E-Print Network (OSTI)

This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

Joskow, Paul L.

1993-01-01T23:59:59.000Z

204

Federal Energy Management Program: Executive Order 13423  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Order Executive Order 13423 to someone by E-mail Share Federal Energy Management Program: Executive Order 13423 on Facebook Tweet about Federal Energy Management Program: Executive Order 13423 on Twitter Bookmark Federal Energy Management Program: Executive Order 13423 on Google Bookmark Federal Energy Management Program: Executive Order 13423 on Delicious Rank Federal Energy Management Program: Executive Order 13423 on Digg Find More places to share Federal Energy Management Program: Executive Order 13423 on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act Executive Order 13423 Energy Policy Act of 2005 Executive Order 13221 Energy Policy Act of 1992 Notices & Rules

205

Arbitrary Convex and Concave Rectilinear Module Packing Using TCG  

Science Conference Proceedings (OSTI)

In this paper, we deal with arbitrary convex and concave rectilinearmodule packing using the Transitive Closure Graph (TCG) representation.The geometric meanings of modules are transparent to TCG and itsinduced operations, which makes TCG an ideal representation ...

J. Lin; H. Chen; Y. Chang

2002-03-01T23:59:59.000Z

206

Department Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Department Codes Department Codes Code Organization BO Bioscience Department BU Business Development & Analysis Office DI Business Operations NC Center for Functional Nanomaterials CO Chemistry Department AD Collider Accelerator Department PA Community, Education, Government and Public Affairs CC Computational Science Center PM Condensed Matter Physics and Materials Science Department CI Counterintelligence AE Department of Energy DC Directorate - Basic Energy Sciences DK Directorate - CEGPA DE Directorate - Deputy Director for Operations DO Directorate - Director's Office DH Directorate - Environment, Safety and Health DF Directorate - Facilities and Operations DA Directorate - Global and Regional Solutions DB Directorate - Nuclear and Particle Physics DL Directorate - Photon Sciences

207

FY2008 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

8 Executive Committee 8 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Joy Andrews California State University East Bay, Chemistry, 25800 Carlos Bee Blvd., Hayward, CA 94542 Professor in the Department of Chemistry and Biochemistry at California State University, East Bay, where she has taught since 1996. Her B.A. degree is in biochemistry from Barnard College, and Ph.D. in Biophysical Chemistry from UC Berkeley. Her research is on the detection, speciation and remediation of heavy metal contamination at various environmental sites, using atomic absorption spectroscopy, ion chromatography, and x-ray absorption spectroscopy. She is also conducting continuous monitoring of water quality parameters in SF Bay, funded by CICORE/NOAA. She was Chair, Executive Committee, Stanford Synchrotron Radiation Laboratory User's Organization Oct 2005-Oct 2006; and Chair, Synchrotron and Neutron User's Group Advocacy Committee since October 2005.

208

EIA - AEO2010 - Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Executive Summary Executive Summary Annual Energy Outlook 2010 with Projections to 2035 Executive Summary In 2009, U.S. energy markets continued to show the impacts of the economic downturn that began in late 2007. After falling by 1 percent in 2008, total electricity generation dropped by another 3 percent in 2009. Although other factors, including weather, contributed to the decrease, it was the first time in the 60-year data series maintained by the EIA that electricity use fell in two consecutive years. Over the next few years, the key factors influencing U.S. energy markets will be the pace of the economic recovery, any lasting impacts on capital-intensive energy projects from the turmoil in financial markets, and the potential enactment of legislation related to energy and the environment.

209

GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries  

SciTech Connect

GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

Shalf, John; Goodale, Tom

2004-02-01T23:59:59.000Z

210

Business Development Executive (BDE) Program  

SciTech Connect

The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

Rice, E.J. "Woody"; Frederick, W. James

2005-12-05T23:59:59.000Z

211

From an executive network to executive control: A computational model of the n-back task  

Science Conference Proceedings (OSTI)

A paradigmatic test of executive control, the n-back task, is known to recruit a widely distributed parietal, frontal, and striatal "executive network," and is thought to require an equally wide array of executive functions. The mapping of functions ...

Christopher H. Chatham; Seth A. Herd; Angela M. Brant; Thomas E. Hazy; Akira Miyake; Randy O'Reilly; Naomi P. Friedman

2011-11-01T23:59:59.000Z

212

MACCS2: An improved code for assessing nuclear accident consequences  

Science Conference Proceedings (OSTI)

The MACCS computer code was developed to predict probabilistic assessments of the consequences from severe accidents at nuclear power plants.For DOE applications and sensitivity studies of emergency response actions at nuclear power plants, MACCS2 represents a significant improvement in modeling flexibility over MACCS 1.5. This increased flexibility is obtained with an approximate doubling of the code`s run time and memory requirements. The software can be adapted to most computers. An executable is included in the code package for 386/486 IBM-compatible personal computers with 8 megabytes of random access memory (RAM). MACCS2 is being benchmarked against the RSAC-5 code developed by INEL. A new set of code documentation is being prepared that describes the use of the code, the models implemented, and the code benchmarking. Current plans are to have the code package (including source code) available to the public at the end of fiscal year 1994.

Chanin, D.I.; Banjac, V.; Miller, L.A. [Sandia National Lab., Albuquerque, NM (United States)

1994-12-31T23:59:59.000Z

213

Recent Enhancements to the MARS15 Code  

E-Print Network (OSTI)

The MARS code is under continuous development and has recently undergone substantial improvements that further increase its reliability and predictive power in numerous shielding, accelerator, detector and space applications. The major developments and new features of the MARS15 (2004) version described in this paper concern an extended list of elementary particles and arbitrary heavy ions and their interaction cross-sections, inclusive and exclusive nuclear event generators, module for modelling particle electromagnetic interactions, enhanced geometry and histograming options, improved MAD-MARS Beam Line Builder, enhanced Graphical-User Interface, and an MPI-based parallelization of the code.

N. V. Mokhov; K. K. Gudima; C. C. James; M. A. Kostin; S. G. Mashnik; E. Ng; J. -F. Ostiguy; I. L. Rakhno; A. J. Sierk; S. I. Striganov

2004-04-29T23:59:59.000Z

214

Data-oriented transaction execution  

Science Conference Proceedings (OSTI)

While hardware technology has undergone major advancements over the past decade, transaction processing systems have remained largely unchanged. The number of cores on a chip grows exponentially, following Moore's Law, allowing for an ever-increasing ... Keywords: DORA, data-oriented transaction execution, latch contention, lock manager, multicore transaction processing

Ippokratis Pandis; Ryan Johnson; Nikos Hardavellas; Anastasia Ailamaki

2010-09-01T23:59:59.000Z

215

WASC PREPARATORY REVIEW EXECUTIVE SUMMARY  

E-Print Network (OSTI)

in its culture of diversity, creativity and discovery. In the final essay, we indicate how sharedWASC PREPARATORY REVIEW EXECUTIVE SUMMARY Fiat Lux University of California motto he four essays, administrators, and alumni to determine the topics to be covered in the essays and to review the many drafts

California at Santa Cruz, University of

216

Other Executive Positions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Executive Positions | National Nuclear Security Administration Executive Positions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Other Executive Positions Home > Federal Employment > Our Jobs > Executive Positions > Other Executive Positions Other Executive Positions NNSA seeks highly qualified senior professionals to apply their knowledge,

217

Teleportation of arbitrary $n$-qudit state with multipartite entanglement  

E-Print Network (OSTI)

We propose a protocol ${\\cal D}_n$ for faithfully teleporting an arbitrary $n$-qudit state with the tensor product state (TPS) of $n$ generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocol ${\\cal D}'_n$ and ${\\cal D}''_n$ for faithfully teleporting an arbitrary $n$-qudit state with two classes of $2n$-qudit GESs as the quantum channel, where the GESs are a kind of genuine entangled states we construct and can not be reducible to the TPS of $n$ GBSs.

Zhan-jun Zhang

2006-11-30T23:59:59.000Z

218

Directional lapped transforms for image coding  

E-Print Network (OSTI)

Abstract—In this paper, we present the design of directional lapped transforms for image coding. A lapped transform, which can be implemented by a prefilter followed by a discrete cosine transform (DCT), can be factorized into elementary operators. The corresponding directional lapped transform is generated by applying each elementary operator along a given direction. The proposed directional lapped transforms are not only nonredundant and perfectly reconstructed, but they can also provide a basis along an arbitrary direction. These properties, along with the advantages of lapped transforms, make the proposed transforms appealing for image coding. A block-based directional transform scheme is also presented and integrated into HD Phtoto, one of the state-of-the-art image coding systems, to verify the effectiveness of the proposed transforms. Index Terms—Directional transform, image coding, lapped transform.

Jizheng Xu; Feng Wu; Senior Member; Jie Liang; Wenjun Zhang

2008-01-01T23:59:59.000Z

219

Dictionary Approximation For Matching Pursuit Video Coding  

E-Print Network (OSTI)

Previously, we demonstrated an efficient video codec based on overcomplete signal decomposition using matching pursuits. Dictionary design is an important issue for this system, and others have shown alternate dictionaries which lead to either coding efficiency improvements or reduced encoder complexity. In this work, we introduce for the first time a design methodology which incorporates both coding efficiency and complexity in a systematic way. The key to our new method is an algorithm which takes an arbitrary 2-D dictionary and generates approximations of the dictionary which have fast 2-stage implementations. By varying the quality of the approximation, we can explore a systematic tradeoff between the coding efficiency and complexity of the matching pursuit video encoder. As a practical result, we show cases where complexity is reduced by a factor of 500 to 1000 in exchange for small coding efficiency losses of around 0.1 dB PSNR. 1. INTRODUCTION Most video codecs in use today ar...

Ralph Neff; Avideh Zakhor

2000-01-01T23:59:59.000Z

220

Traveling wave current drive theory for an arbitrary m-polar configuration  

Science Conference Proceedings (OSTI)

An extension of the formalism employed to describe current drive in magnetized plasmas by means of traveling magnetic fields (or double-helix configuration) is presented. In all previous theoretical studies, only driving fields with dipolar topology have been employed and the figure of merit of the current drive mechanism has never been analyzed in terms of the dissipation in the power feeding circuit. In this paper, we show how to express the model equations in terms of the current amplitude in the coils, for an arbitrary number of equally spaced coils wound around the plasma column. We present a brief review of the existing theory and a theoretical formulation, valid for an arbitrary m-polar helical symmetry, which removes the above mentioned complications and limitations. In the limit of straight coils, our magnetic field expression agrees exactly with well-established results of the literature for rotating magnetic field current drive. Finally, we present initial numerical results from a recently developed code which consistently compares the steady driven nonlinear Hall currents and steady fields, corresponding to different configurations in terms of the Ohmic dissipation in the helical coils and discuss future perspectives.

Duarte, V. N. [Instituto de Fisica, Universidade de Sao Paulo, 05508-090 Sao Paulo-SP (Brazil); Clemente, R. A. [Instituto de Fisica Gleb Wataghin, Universidade Estadual de Campinas, 13083-859 Campinas-SP (Brazil); Farengo, R. [Centro Atomico Bariloche and Instituto Balseiro, S. C. de Bariloche (8400), RN (Argentina)

2013-03-15T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Implementing for Implementing Executive Order 13423  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTING EXECUTIVE IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" March 29, 2007 0 Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

222

Northwest Energy Efficiency Taskforce Executive Committee  

E-Print Network (OSTI)

#12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

223

HiggsBounds: Confronting Arbitrary Higgs Sectors with Exclusion Bounds from LEP and the Tevatron  

E-Print Network (OSTI)

HiggsBounds is a computer code that tests theoretical predictions of models with arbitrary Higgs sectors against the exclusion bounds obtained from the Higgs searches at LEP and the Tevatron. The included experimental information comprises exclusion bounds at 95% C.L. on topological cross sections. In order to determine which search topology has the highest exclusion power, the program also includes, for each topology, information from the experiments on the expected exclusion bound, which would have been observed in case of a pure background distribution. Using the predictions of the desired model provided by the user as input, HiggsBounds determines the most sensitive channel and tests whether the considered parameter point is excluded at the 95% C.L. HiggsBounds is available as a Fortran 77 and Fortran 90 code. The code can be invoked as a command line version, a subroutine version and an online version. Examples of exclusion bounds obtained with HiggsBounds are discussed for the Standard Model, for a model with a fourth generation of quarks and leptons and for the Minimal Supersymmetric Standard Model with and without CP-violation. The experimental information on the exclusion bounds currently implemented in HiggsBounds will be updated as new results from the Higgs searches become available.

Philip Bechtle; Oliver Brein; Sven Heinemeyer; Georg Weiglein; Karina E. Williams

2008-11-25T23:59:59.000Z

224

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Residential  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31059, R 408.31060, R 408.31061, R 408.31062, R 408.31063, R 408.31064, R 408.31065, R 408.31066, R 408.31069, and R 408.31070, of the Michigan Administrative Code are amended, and R 408.31060a, R 408.31060b, R 408.31060c, R 408.31060d, R 408.31060e, and R 408.31063a are added to the Code as follows: PART 10 MICHIGAN UNIFORM ENERGY CODE R 408.31059 Applicable code. Rule 1059. The provisions of the international energy conservation code, 2009 edition, except for sections 102.1.1, 107.2 to 107.5, 301.2, 301.3, 402.3.2, 501.1, to 506.6.2 and Tables

225

3D hybrid simulation code using curvilinear coordinates  

Science Conference Proceedings (OSTI)

A new simulation code using the hybrid approximation for modeling extraterrestrial plasma processes is described, which can be used in an arbitrary three-dimensional, ordered, hexahedral grid. Maxwell's equations are transformed using common tensor analysis ... Keywords: 3D, curvilinear, hybrid, plasma, simulation

T. Bagdonat; U. Motschmann

2002-12-01T23:59:59.000Z

226

PIA - Savannah River Operations Office Executive Commitment Action...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive...

227

Executive Order 13423- Strengthening Federal Environmental, Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

228

Boeing Company Executive Joins NIST Advisory Committee  

Science Conference Proceedings (OSTI)

... to serving on Boeing's Executive Council, Tracy oversees the development and implementation of its enterprise technology investment strategy and ...

2013-01-09T23:59:59.000Z

229

Archimedes: A system that plans and executes mechanical assemblies  

Science Conference Proceedings (OSTI)

Archimedes is a prototype mechanical assembly system which generates and executes robot assembly programs from a CAD model input. The system addresses the unrealized potential for flexibility in robotic mechanical assembly applications by automating the programming task. Input is a solid model of the finished assembly. Parts relationships and geometric constraints are deduced from the solid model. A rule-based planner generates a generic'' assembly plan that satisfies the geometric constraints, as well as other constraints embodied in the rules. A retargetable plan compiler converts the generic plan into code specific to an application environment. Execution of the compiled plan in a workcell containing an Adept Two robot, a vision system, and other parts handling equipment will be shown on videotape.

Strip, D.

1990-01-01T23:59:59.000Z

230

Entanglement Cost for Sequences of Arbitrary Quantum States  

E-Print Network (OSTI)

The entanglement cost of arbitrary sequences of bipartite states is shown to be expressible as the minimization of a conditional spectral entropy rate over sequences of separable extensions of the states in the sequence. The expression is shown to reduce to the regularized entanglement of formation when the n-th state in the sequence consists of n copies of a single bipartite state.

Garry Bowen; Nilanjana Datta

2007-04-16T23:59:59.000Z

231

A preconditioned method for rotating flows at arbitrary mach number  

Science Conference Proceedings (OSTI)

An improved preconditioning is proposed for viscous flow computations in rotating and nonrotating frames at arbitrary Mach numbers. The key to the current method is the use of both free stream Mach number and rotating Mach number to construct a preconditioning ...

Chunhua Sheng

2011-01-01T23:59:59.000Z

232

Quantum Mechanics of Successive Measurements with Arbitrary Meter Coupling  

E-Print Network (OSTI)

We study successive measurements of two observables using von Neumann's measurement model. The two-pointer correlation for arbitrary coupling strength allows retrieving the initial system state. We recover Luders rule, the Wigner formula and the Kirkwood-Dirac distribution in the appropriate limits of the coupling strength.

Lars M. Johansen; Pier A. Mello

2009-01-21T23:59:59.000Z

233

Arbitrary blade section design based on viscous considerations. Background information  

SciTech Connect

Background information is presented on an arbitrary blade section design method which is outlined in a joint paper. This information concerns the assumptions, the development, and the predictive capabilities of the viscous flow calculation tool used in the design procedure. General properties of laminar and turbulent, unseparated or separated compressible shear layers, necessary for the blade optimization procedure, are discussed.

Bouras, B.; Karagiannis, F.; Leoutsakos, G.; Giannakoglou, K.C.; Papailiou, K.D. [National Technical Univ. of Athens (Greece). Thermal Turbomachinery Lab.

1996-06-01T23:59:59.000Z

234

ADEQUACY REPORT Â… EXECUTIVE SUMMARY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08 08 ADEQUACY REPORT - EXECUTIVE SUMMARY The electricity industry has gone through major changes in structure, shape, and form over the last decade. All signs indicate that business is far from "as usual". It is prudent at this time to ask if the present approaches can ensure reliable and cost effective supply of electricity over the next two decades and if not, then what is needed to achieve that. This was the prime reason for the formation of the Electricity Advisory Committee (EAC) for which this report was done. The answer to that key question is "no, unless....". A concise set of recommendations is included in this executive summary but more detailed lists are listed in the report. Today, the warning signs are here. Fuel transportation, particularly by rail, is congested,

235

EMSL User Executive Committe Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

236

Budget Formulation & Execution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Budget Formulation & Execution Budget Formulation & Execution Budget Formulation & Execution The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as the external liaison for the Department of Energy on matters related to its budget. Functions: Coordinate and manage the Department's budget formulation, presentation, and execution processes. Provide central administration of Departmental appropriations, allotments, and financial controls. Formulate procedures for budgetary allocations and controls, reprogrammings, deferrals, and other financial actions. Develop budget tables, histories, statistics, and other data required for budget planning and control.

237

The Infrastructure of a Global Field of Arbitrary Unit Rank  

E-Print Network (OSTI)

In the past, the infrastructure of a number or (global) function field has been used for computation of units. In the case of a one-dimensional infrastructure, i.e. in the case of unit rank one, one has a binary operation which is similar to multiplication, called a giant step, which was introduced by D. Shanks. In this paper, we show a general way to interpret infrastructure in the case of arbitrary unit rank, which gives a giant step. Moreover, we relate the infrastructure and the giant step to the arithmetic in the divisor class group. Finally, we give explicit algorithms in the function field case for computing, and show how the baby step-giant step method for unit computation generalizes to the case of arbitrary unit rank.

Fontein, Felix

2008-01-01T23:59:59.000Z

238

Security of quantum key distribution with arbitrary individual imperfections  

E-Print Network (OSTI)

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

Øystein Marøy; Lars Lydersen; Johannes Skaar

2009-03-20T23:59:59.000Z

239

Green Building Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Green Building Codes Green Building Codes Green building codes go beyond minimum code requirements, raising the bar for energy efficiency. They can serve as a proving ground for future standards, and incorporate elements beyond the scope of the model energy codes, such as water and resource efficiency. As regional and national green building codes and programs become more available, they provide jurisdictions with another tool for guiding construction and development in an overall less impactful, more sustainable manner. ICC ASHRAE Beyond Codes International Green Construction Code (IgCC) The International Code Council's (ICC's) International Green Construction code (IgCC) is an overlay code, meaning it is written in a manner to be used with all the other ICC codes. The IgCC contains provisions for site

240

SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution  

Science Conference Proceedings (OSTI)

In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS.

Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

1999-01-04T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

The involvement of the primate frontal cortex-basal ganglia system in arbitrary visuomotor association learning  

E-Print Network (OSTI)

It is the goal of this thesis to examine the frontal cortex-basal ganglia system during arbitrary visuomotor association learning, the forming of arbitrary links between visual stimuli and motor responses (e.g. red means ...

Machon, Michelle S

2009-01-01T23:59:59.000Z

242

Residential Code Development | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Residential Code Development Subscribe to updates To receive news and updates about code development activities subscribe to the BECP Mailing List. The model residential building...

243

Residential Code Methodology | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Site Map...

244

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple...

245

Validation of IVA Computer Code for Flow Boiling Stability Analysis  

SciTech Connect

IVA is a computer code for modeling of transient multiphase, multi-component, non-equilibrium flows in arbitrary geometry including flow boiling in 3D nuclear reactors. This work presents part of the verification procedure of the code. We analyze the stability of flow boiling in natural circulation loop. Experimental results collected on the AREVA/FANP KATHY loop regarding frequencies, mass flows and decay ratio of the oscillations are used for comparison. The comparison demonstrates the capability of the code to successfully simulate such class of processes. (author)

Ivanov Kolev, Nikolay [Framatome-ANP, PO Box 3220, D-91058, Erlangen (Germany)

2006-07-01T23:59:59.000Z

246

U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

36: Microsoft JScript and VBScript Engine Integer Overflow Lets 36: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code August 15, 2012 - 7:00am Addthis PROBLEM: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 5.8 ABSTRACT: Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target REFERENCE LINKS: technet.microsoft.com/en-us/security/bulletin/ms12-056 http://www.securitytracker.com/id/1027392 CVE-2012-2523 Impact assessment: Medium Discussion: Vulnerability was reported in Microsoft JScript and VBScript. A remote user can cause arbitrary code to be executed on the target user's system. A

247

FY2005 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

5 Executive Committee 5 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Structural Molecular Biology corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

248

FY2006 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

6 Executive Committee 6 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

249

Automatic generation of executable communication specifications from parallel applications  

Science Conference Proceedings (OSTI)

Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

2011-01-19T23:59:59.000Z

250

Budget Formulation and Execution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Formulation and Execution Formulation and Execution Budget Formulation and Execution The Office of Budget works on the Office of Energy Efficiency and Renewable Energy (EERE) corporate budget formulation and defense, annual performance plan facilitation, quarterly program performance reporting, accountability submissions, the Program Assessment Rating Tool (PART), and related President's Management Agenda (PMA) topics. The Office produces budget funding action documents, procurement and loan guarantee procedures, annual operating plans, fund transfers to laboratories, and contractor budget data analysis. The Office leads the budgeting process through two primary functions-formulation and execution: Budget Formulation The Office of Budget facilitates corporate budget formulation through

251

Behavior-based remote executing agents  

E-Print Network (OSTI)

remote execution semantics, and intermediary commu- nication handling)remote, more advantageous, location. ReAgents simplify the use of mobile agent technology by transparently handling

Hung, Eugene

2006-01-01T23:59:59.000Z

252

Executive Order 13514: Implementation Status Update  

NLE Websites -- All DOE Office Websites (Extended Search)

Larry Stirling Office of Environmental Policy & Assistance (HS-22) Environmental Sustainability Network February 18, 2010 Executive Order 13514 (October 5, 2009) "To establish an...

253

NREL: Energy Executive Leadership Academy - Leadership Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Leadership Program NREL's Executive Energy Leadership Program is an in-depth training program conducted over five three-day sessions from May through September. The classroom...

254

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training Form is used to evaluate formal training courses in the...

255

Federal Energy Management Program: Executive Order 13221  

NLE Websites -- All DOE Office Websites (Extended Search)

221 Executive Order (E.O.) 13221, Energy Efficient Standby Power Devices, calls for Federal agencies to purchase products that use minimal standby power when possible. It was...

256

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assignment Evaluation Form allows ESE candidates to evaluate assignments in terms of the executive core qualities the assignment was intended to meet, how well it met...

257

2009 Wind Technologies Market Report: Executive Summary  

SciTech Connect

This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

Wiser, R.; Bolinger, M.

2010-08-01T23:59:59.000Z

258

ORNL Neutron Sciences Directorate Executive Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Neutron Sciences Directorate Executive Office Kelly Beierschmitt ORNL Associate Laboratory Director for Neutron Sciences Kelly Beierschmitt. The Neutron Sciences Directorate (NScD)...

259

Project review for the acquisition executive  

Science Conference Proceedings (OSTI)

A set of view graphs for briefing the acquisition executive for the Uranium Mill Tailings Remedial Action (UMTRA) Project are presented.

NONE

1986-10-01T23:59:59.000Z

260

DOE Code:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

we1rbox installatiOn we1rbox installatiOn ____:....;...=.~;;....:..;=-+- DOE Code: - - !- Project Lead: Wes R1esland NEPA COMPLIANCE SURVEY J 3-24-10 1 Date: Project Information 1. Project Overview What are tne enwonmental mpacts? Contractor~~ _ _ _ _ ] 11 The purpose of this project is to prepare a pad for a 90 ton crane to get 1nto positiOn and ng up so we can 1 set our new weir box into position We will widen the existing road around 20 feet at the north end and taper our fill to about5 feet at the south end for a total of about 200 feeL and budd a near level pad for them tong up the crane on We will use the d1rt from the hill irnrnedJateiy north of the work to oe done 2. 3 4 What*s the legal location? What IS the durabon of the prOJed?

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Mixed-mode Bytecode Execution  

Science Conference Proceedings (OSTI)

Modern high-performance virtual machines use dynamic compilation. There is a tension between compilation speed and code quality. We argue that a highly-optimizing compiler is best deployed with both a fast, less-optimizing compiler and an interpreter. ...

Ole Agesen; David Detlefs

2000-06-01T23:59:59.000Z

262

Reducing Energy Demand in Buildings Through State Energy Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Assistance Project Codes Assistance Project Maureen Guttman, AIA Executive Director, BCAP Alliance to Save Energy 202-530-2211 mguttman@ase.org Tuesday, April 2, 2013 - Thursday, April 4, 2013 Reducing Energy Demand in Buildings Through State Energy Codes - Providing Technical Support and Assistance to States - 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Buildings = largest sector of energy consumption in America * Energy codes are a ready-made regulatory mechanism * States need support for implementation Impact of Project:

263

Reducing Energy Demand in Buildings Through State Energy Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes Assistance Project Codes Assistance Project Maureen Guttman, AIA Executive Director, BCAP Alliance to Save Energy 202-530-2211 mguttman@ase.org Tuesday, April 2, 2013 - Thursday, April 4, 2013 Reducing Energy Demand in Buildings Through State Energy Codes - Providing Technical Support and Assistance to States - 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Buildings = largest sector of energy consumption in America * Energy codes are a ready-made regulatory mechanism * States need support for implementation Impact of Project:

264

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

265

1.0EXECUTIVE SUMMARY  

NLE Websites -- All DOE Office Websites (Extended Search)

ARC-TR-03-0002 ARC-TR-03-0002 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines Final Report for the Period July 2001 - October 2002 December 2002 Sophie J. Bullard, Bernard S. Covino, Jr., James H. Russell, Gordon R. Holcomb, Stephen D. Cramer, and Margaret Ziomek-Moroz Albany Research Center U.S. Department of Energy Albany, OR PREPARED FOR THE UNITED STATES DEPARTMENT OF ENERGY, NATIONAL ENERGY TECHNOLOGY LABORATORY. Work Performed Under Work Package Number FE-01-06 This page left intentionally blank. 2 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines TABLE OF CONTENTS 1.0 EXECUTIVE SUMMARY

266

Carlsbad Area Office Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

June 1998 June 1998 Carlsbad Area Office Executive Summary The mission of the Carlsbad Area Office (CAO) is to protect human health and the environment by opening and operating the Waste Isolation Pilot Plant (WIPP) for safe disposal of transuranic (TRU) waste and by establishing an effective system for management of TRU waste from generation to disposal. It includes personnel assigned to CAO, WIPP site operations, transportation, and other activities associated with the National TRU Program (NTP). The CAO develops and directs implementation of the TRU waste program, and assesses compliance with the program guidance, as well as the commonality of activities and assumptions among all TRU waste sites. A cornerstone of the Department of Energy's (DOE) national cleanup strategy, WIPP is

267

EXECUTIVE OFFICE OF THE PRESIDENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EXECUTIVE OFFICE OF THE PRESIDENT COUNCIL ON ENVIRONMENTAL QUALITY 722 JACKSON PLACE, N. W. WASHINGTON, D. C. April 30, 1981 MEMORANDUM FOR GENERAL COUNSELS, NEPA LIAISONS AND PARTICIPANTS IN SCOPING SUBJECT: Scoping Guidance As part of its continuing oversight of the implementation of the NEPA regulations, the Council on Environmental Quality has been investigating agency experience with scoping. This is the process by which the scope of the issues and alternatives to be examined in an EIS is determined. In a project led by Barbara Bramble of the General Counsel's staff the Council asked federal agencies to report their scoping experiences; Council staff held meetings and workshops in all regions of the country to discuss scoping practice; and a contract study was performed for the Council to investigate what techniques work best for

268

Advanced Fuels Campaign Execution Plan  

SciTech Connect

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the “Grand Challenge” for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2010-10-01T23:59:59.000Z

269

Advanced Fuels Campaign Execution Plan  

SciTech Connect

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

270

Advanced Fuels Campaign Execution Plan  

SciTech Connect

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

271

Arbitrary surface flank milling of fan, compressor, and impeller blades  

SciTech Connect

It is generally conceived that a blade surface is flank millable if it can be closely approximated by a ruled surface; otherwise the slow machining process of point milling has to be employed. However, the authors have now demonstrated that the ruled surface criterion for flank milling is neither necessary nor sufficient. Furthermore, many complex arbitrary surfaces typical of the blades in fans, axial compressors, and centrifugal impellers in aviation gas turbines are actually closely flank millable and can be rendered exactly flank millable with one or more passes per surface often without sacrificing, indeed usually with gain, in performance.

Wu, C.Y. [Pratt and Whitney Canada Incorporated, Longueuil, Quebec, (Canada). Design Engineering

1995-07-01T23:59:59.000Z

272

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

released software updates. http:energy.govcioarticlest-635-cisco-anyconnect-secure-mobility-client-lets-remote-users-execute-arbitrary-code Download CX-007686: Categorical...

273

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates. http:energy.govcio...

274

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

275

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-let-remote-users-deny-service-and-potentially-execute-arbitrary-code Article Arkansas Natural Gas Company Hosts Tour With U.S. Deputy Secretary of Energy Poneman Poneman...

276

T-557: Microsoft Office Excel Office Art Object Parsing Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office...

277

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability Microsoft Office Visio contains a vulnerability that could allow an unauthenticated,...

278

T-618: Debian update for exim4: Mail Transport Agent | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

mail transport agent in Debian, uses DKIM data obtain from DNS directly in a format string, potentially allowing malicious mail senders to execute arbitrary code. reference...

279

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

280

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

articlesu-086linux-kernel-procmem-privilege-escalation-vulnerability Article T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

managementoffice-managementemployee-servicesdocument-imaging Article T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code A...

282

Higher-order symbolic execution via contracts  

Science Conference Proceedings (OSTI)

We present a new approach to automated reasoning about higher-order programs by extending symbolic execution to use behavioral contracts as symbolic values, thus enabling symbolic approximation of higher-order behavior. Our approach is based on the idea ... Keywords: higher-order contracts, reduction semantics, symbolic execution

Sam Tobin-Hochstadt; David Van Horn

2012-11-01T23:59:59.000Z

283

Microsoft PowerPoint - Executive Order13423rbl  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13423 Executive Order 13423 Executive Order 13423 Strengthening Federal Strengthening Federal Environmental, Energy and Environmental, Energy and Transportation Management Transportation Management 2 2 Executive Order 13423 Replaces the Executive Order 13423 Replaces the Greening the Government Series of Greening the Government Series of Executive Orders Executive Orders 13101 Recovered Materials 13101 Recovered Materials 13123 Energy Efficiency 13123 Energy Efficiency 13148 Environment 13148 Environment 13149 Transportation 13149 Transportation BUT BUT 13221 Standby Power was retained 13221 Standby Power was retained 3 3 Two Parts Involved Two Parts Involved Executive Order Executive Order States Policy States Policy Establishes Goals Establishes Goals Assigns Responsibilities for Agencies, CEQ, Assigns Responsibilities for Agencies, CEQ,

284

Sample Project Execution Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sample Project Execution Plan Sample Project Execution Plan Sample Project Execution Plan The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects. The plan serves as the main communication vehicle to ensure that everyone is aware and knowledgeable of project objectives and how they will be accomplished. The plan is the primary agreement between Headquarters and the federal project director and a preliminary plan should be developed and approved at Critical Decision-1. Project objectives are derived from the mission needs statement, and an integrated project team assists in development of the PEP. The plan is a living document and should be updated to describe current and future processes and procedures, such as integrating safety

285

Executive Potential Program (EPP) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Potential Program (EPP) Executive Potential Program (EPP) Executive Potential Program (EPP) January 10, 2014 (All day) Application Procedure: Nomination packages for EPP-2015-1 and EPP 2015-DC, must be received by deadline dates of January 10, 2014 and April 8, 2014 respectively, and must include the following: -The completed Executive Potential Program Application that includes information about the applicant, the applicant's immediate supervisor, and the DOE program coordinator, Johnny McChriston. - A statement from the applicant indicating the purpose for applying and how participation in the Executive Potential Program will support the applicant's career goals. -The applicant's current resume, signed and dated by the applicant - Payment must accompany the application before it will be processed.

286

Executive Fleet Vehicles Report | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Fleet Vehicles Report Executive Fleet Vehicles Report Executive Fleet Vehicles Report On May 24, 2011, the President issued a Presidential Memorandum on Federal Fleet Performance. In accordance with Section 1 (b) of the Presidential Memorandum and pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50), executive fleets are required to achieve maximum fuel efficiency; be limited in motor vehicle body size, engine size, and optional equipment to what is essential to meet agency mission; and be midsize or smaller sedans, except where larger sedans are essential to the agency mission. Executive fleet vehicles that are larger than midsize sedans or are not AFVs must be disclosed on the website of the agency operating the vehicles within 180 days of the date of the memorandum (on or before November 17,

287

Code Generation and Separate Compilation in a Parallel Program Debugger  

E-Print Network (OSTI)

The Parallel Program Debugger (PPD) allows a programmer to find bugs by following dynamic dependences in a program's execution; this technique is called flowback analysis. Flowback analysis requires the tracing of all variable references and modifications. PPD avoids the overhead of this tracing by recording only a subset of the program's state during execution, and incrementally filling in the missing details when the programmer makes queries about execution dependences. There is a trade-off between overhead of the tracing during program execution and the speed of generating the missing details during user queries. Our compiler is divided into four phases. This separation of phases allows us to first compile separate files, and to generate code for these files. Second, we perform interprocedural analysis using the data structures generated by the first phase. Third, we modify the individual assembly files to account for optimizations to the tracing, and to generate tracing for shared ...

Jong-deok Choi; Barton P. Miller

1990-01-01T23:59:59.000Z

288

Project Execution Plan, Rev. 3  

Science Conference Proceedings (OSTI)

This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

IT Corporation, Las Vegas

2002-08-01T23:59:59.000Z

289

Codes 101 | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101 Codes 101 This course covers basic knowledge of energy codes and standards, the development processes of each, historical timelines, adoption, implementation, and enforcement of energy codes and standards, and voluntary energy efficiency programs. Most sections have links that provide additional details on that section's topic as well as additional resources for more information. Begin Learning! Estimated Length: 1-2 hours CEUs Offered: 1.0 AIA/CES LU (HSW); .10 CEUs towards ICC renewal certification. Course Type: Self-paced, online Building Type: Commercial Residential Focus: Adoption Code Development Compliance Code Version: ASHRAE Standard 90.1 International Energy Conservation Code (IECC) Model Energy Code (MEC) Target Audience: Advocate Architect/Designer Builder

290

Hydrogen recycle modeling in transport codes  

DOE Green Energy (OSTI)

The hydrogen recycling models now used in Tokamak transport codes are reviewed and the method by which realistic recycling models are being added is discussed. Present models use arbitrary recycle coefficients and therefore do not model the actual recycling processes at the wall. A model for the hydrogen concentration in the wall serves two purposes: (1) it allows a better understanding of the density behavior in present gas puff, pellet, and neutral beam heating experiments; and (2) it allows one to extrapolate to long pulse devices such as EBT, ISX-C and reactors where the walls are observed or expected to saturate. Several wall models are presently being studied for inclusion in transport codes.

Howe, H.C.

1979-01-01T23:59:59.000Z

291

SHUG Executive Committee | ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Committee Executive Committee SHUG Executive Committee Members Tyrel McQueen Tyrel McQueen mcqueen@jhu.edu Term expires December 2014 Chair: Tyrel McQueen Assistant Professor of Chemistry Johns Hopkins University Research interests: New solid state chemistry materials design and synthesis techniques; experimental condensed matter physics, quantum magnetism, heat- and light-induced charge separation through strong electron correlations; superconductivity. Greg Beaucage Greg Beaucage beaucag@uc.edu Term expires December 2014 Past Chair: Greg Beaucage University of Cincinnati Research interests: Soft condensed matter and polymers, especially quantification of molecular topology using SANS, in the hierarchical structure of ceramic and metallic aggregates, and in the study of protein

292

Evolution of star clusters in arbitrary tidal fields  

E-Print Network (OSTI)

We present a novel and flexible tensor approach to computing the effect of a time-dependent tidal field acting on a stellar system. The tidal forces are recovered from the tensor by polynomial interpolation in time. The method has been implemented in a direct-summation stellar dynamics integrator (NBODY6) and test-proved through a set of reference calculations: heating, dissolution time and structural evolution of model star clusters are all recovered accurately. The tensor method is applicable to arbitrary configurations, including the important situation where the background potential is a strong function of time. This opens up new perspectives in stellar population studies reaching to the formation epoch of the host galaxy or galaxy cluster, as well as for star-burst events taking place during the merger of large galaxies. A pilot application to a star cluster in the merging galaxies NGC 4038/39 (the Antennae) is presented.

Renaud, Florent; Boily, Christian

2011-01-01T23:59:59.000Z

293

Hyperscaling violation for scalar black branes in arbitrary dimensions  

E-Print Network (OSTI)

We extend to black branes (BB) in arbitrary dimensions the results of Ref. [1] about hyperscaling violation and phase transition for scalar black 2-branes. We derive the analytic form of the (d+1)-dimensional scalar soliton interpolating between a conformal invariant AdS vacuum in the infrared and a scale covariant metric in the ultraviolet. We show that the thermodynamical system undergoes a phase transition between Schwarzschild-AdS and a scalar-dressed BB. We calculate the critical exponent and the hyperscaling violation parameter in the two phases. We show that our scalar BB solutions generically emerge as compactifications of p-brane solutions of supergravity theories. We also derive the short distance form of the correlators for the scalar operators corresponding to an UV exponential potential supporting our black brane solution. We show that also for negative values of the hyperscaling violation parameter these correlators have a short distance power-law behavior.

Mariano Cadoni; Matteo Serra

2012-09-20T23:59:59.000Z

294

Prediction of turbulence control for arbitrary periodic spanwise wall movement  

E-Print Network (OSTI)

In order to generalize the well-known spanwise-oscillating-wall technique for drag reduction, non-sinusoidal oscillations of a solid wall are considered as a means to alter the skin-friction drag in a turbulent channel flow. A series of Direct Numerical Simulations is conducted to evaluate the control performance of nine different temporal waveforms, in addition to the usual sinusoid, systematically changing the wave amplitude and the period for each waveform. The turbulent average spanwise motion is found to coincide with the laminar Stokes solution that is constructed, for the generic waveform, through harmonic superposition. This allows us to define and compute, for each waveform, a new penetration depth of the Stokes layer which correlates with the amount of turbulent drag reduction, and eventually to predict both turbulent drag reduction and net energy saving rate for arbitrary waveforms. Among the waveforms considered, the maximum net energy saving rate is obtained by the sinusoidal wave at its optimal ...

Cimarelli, Andrea; Hasegawa, Yosuke; De Angelis, Elisabetta; Quadrio, Maurizio

2013-01-01T23:59:59.000Z

295

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents (OSTI)

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

Grossman, M.W.; George, W.A.

1986-12-16T23:59:59.000Z

296

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents (OSTI)

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

Grossman, Mark W. (Belmont, MA); George, William A. (Rockport, MA)

1986-01-01T23:59:59.000Z

297

WinCuts: Manipulating Arbitrary Window Regions for  

E-Print Network (OSTI)

Each window on our computer desktop provides a view into some information. Although users can currently manipulate multiple windows, we assert that being able to spatially arrange smaller regions of these windows could help users perform certain tasks more efficiently. In this paper, we describe a novel interaction technique that allows users to replicate arbitrary regions of existing windows into independent windows called WinCuts. Each WinCut is a live view of a region of the source window with which users can interact. We also present an extension that allows users to share WinCuts across multiple devices. Next, we classify the set of tasks for which WinCuts may be useful, both in single as well as multiple device scenarios. We present high level implementation details so that other researchers can replicate this work. And finally, we discuss future work that we will pursue in extending these ideas.

More Effective Use; Desney S. Tan; Brian Meyers; Mary Czerwinski

2004-01-01T23:59:59.000Z

298

HiggsSignals: Confronting arbitrary Higgs sectors with measurements at the Tevatron and the LHC  

E-Print Network (OSTI)

HiggsSignals is a Fortran90 computer code that allows to test the compatibility of Higgs sector predictions against Higgs rates and masses measured at the LHC or the Tevatron. Arbitrary models with any number of Higgs bosons can be investigated using a model-independent input scheme based on HiggsBounds. The test is based on the calculation of a chi-squared measure from the predictions and the measured Higgs rates and masses, with the ability of fully taking into account systematics and correlations for the signal rate predictions, luminosity and Higgs mass predictions. It features two complementary methods for the test. First, the peak-centered method, in which each observable is defined by a Higgs signal rate measured at a specific hypothetical Higgs mass, corresponding to a tentative Higgs signal. Second, the mass-centered method, where the test is evaluated by comparing the signal rate measurement to the theory prediction at the Higgs mass predicted by the model. The program allows for the simultaneous us...

Bechtle, Philip; Stål, Oscar; Stefaniak, Tim; Weiglein, Georg

2013-01-01T23:59:59.000Z

299

PIA - Savannah River Operations Office Executive Commitment Action...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah...

300

Executive Order 13148-Greening the Government Through Leadership...  

NLE Websites -- All DOE Office Websites (Extended Search)

You are here Home Executive Order 13148-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Executive nformation Sysytems (EIS) 1 - U.S. Energy ...  

U.S. Energy Information Administration (EIA)

... Characteristics of an EIS Tailored to executive’s information needs Reports Analysis and graphics “Drill-down” process Easy to use ... Safety and Health ...

302

Clean Development Mechanism Executive Board CDM EB | Open Energy...  

Open Energy Info (EERE)

Mechanism Executive Board CDM EB Jump to: navigation, search Name Clean Development Mechanism Executive Board (CDM EB) Place Bonn, Germany Zip D-53175 Product The CDM EB supervises...

303

President Issues Executive Order Aimed at Preparing for the Impacts...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for...

304

FAPAC-NM Executive Board | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Executive Board FAPAC-NM Executive Board "Promoting Equal Opportunity and Cultural Diversity for APAs in Government" Ligaya White Chairperson Administrative Support Assistant...

305

Executive Order -- Preparing the United States for the Impacts...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order -- Preparing the United States for the Impacts of Climate Change Executive Order -- Preparing the United States for the Impacts of Climate Change...

306

Department of Energy and Commercial Real Estate Executives Launch...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Energy and Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings Department of Energy and Commercial Real Estate Executives Launch Alliance...

307

American Indian Policy and Relevant DOE and Executive Orders...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive Orders Waste Management Nuclear Materials &...

308

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

request to 'pref.php' to include an arbitrary local file. magicquotesgpc must be disabled to exploit this flaw. Impact: A remote user may be able to execute arbitrary PHP code...

309

Quantum error control codes  

E-Print Network (OSTI)

It is conjectured that quantum computers are able to solve certain problems more quickly than any deterministic or probabilistic computer. For instance, Shor's algorithm is able to factor large integers in polynomial time on a quantum computer. A quantum computer exploits the rules of quantum mechanics to speed up computations. However, it is a formidable task to build a quantum computer, since the quantum mechanical systems storing the information unavoidably interact with their environment. Therefore, one has to mitigate the resulting noise and decoherence effects to avoid computational errors. In this dissertation, I study various aspects of quantum error control codes - the key component of fault-tolerant quantum information processing. I present the fundamental theory and necessary background of quantum codes and construct many families of quantum block and convolutional codes over finite fields, in addition to families of subsystem codes. This dissertation is organized into three parts: Quantum Block Codes. After introducing the theory of quantum block codes, I establish conditions when BCH codes are self-orthogonal (or dual-containing) with respect to Euclidean and Hermitian inner products. In particular, I derive two families of nonbinary quantum BCH codes using the stabilizer formalism. I study duadic codes and establish the existence of families of degenerate quantum codes, as well as families of quantum codes derived from projective geometries. Subsystem Codes. Subsystem codes form a new class of quantum codes in which the underlying classical codes do not need to be self-orthogonal. I give an introduction to subsystem codes and present several methods for subsystem code constructions. I derive families of subsystem codes from classical BCH and RS codes and establish a family of optimal MDS subsystem codes. I establish propagation rules of subsystem codes and construct tables of upper and lower bounds on subsystem code parameters. Quantum Convolutional Codes. Quantum convolutional codes are particularly well-suited for communication applications. I develop the theory of quantum convolutional codes and give families of quantum convolutional codes based on RS codes. Furthermore, I establish a bound on the code parameters of quantum convolutional codes - the generalized Singleton bound. I develop a general framework for deriving convolutional codes from block codes and use it to derive families of non-catastrophic quantum convolutional codes from BCH codes. The dissertation concludes with a discussion of some open problems.

Abdelhamid Awad Aly Ahmed, Sala

2008-05-01T23:59:59.000Z

310

High-level networking with mobile code and first order AND-continuations  

Science Conference Proceedings (OSTI)

We describe a scheme for moving living code between a set of distributed processes coordinated with unification based Linda operations, and its application to building a comprehensive Logic programming based Internet programming framework. Mobile ... Keywords: Internet programming, Linda coordination, blackboard-based logic programming, code migration, dynamic recompilation, first order continuations, mobile agents, mobile computations, networking, remote execution

Paul Tarau; Veronica Dahl

2001-05-01T23:59:59.000Z

311

State Building Code  

NLE Websites -- All DOE Office Websites (Extended Search)

Adoption Updated: 121708 - 1 - Code Adoption Process Checklist Para-Technical Adoption of Code Effective Date Responsible Chief Policy Analyst Support Staff: Boards Coordinator...

312

Senior Executive Fellows | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Overview: The Senior Executive Fellows program is designed for upper-level Overview: The Senior Executive Fellows program is designed for upper-level managers. The curriculum incorporates the executive core qualifications (ECQs) for SES and it is the program of choice for participants in SES Candidate Development Programs and other professionals looking to strengthen skills in problem solving, strategic analysis, persuasion and negotiation. Target Audience: The program focuses on skills associated with the Office of Personnel Management's (OPM) executive core qualifications (ECQs) and is designed for federal government employees at the GS-14/GS-15 levels. Program Cost: Is $19,800 and includes tuition, housing, curricular materials, and most meals. Program Session(s) and Application Deadline(s): Session Date: February 9, 2014 - March 7, 2014, Application

313

Project Execution Plan Review Module (RM)  

Energy.gov (U.S. Department of Energy (DOE))

The Project Execution Plan (PEP) Review Module (RM) is a tool that assists DOE federal project review teams in evaluating the adequacy of the PEP development and maintenance for projects of any...

314

The procedure execution manager and its application to Advanced Photon Source operation  

SciTech Connect

The Procedure Execution Manager (PEM) combines a complete scripting environment for coding accelerator operation procedures with a manager application for executing and monitoring the procedures. PEM is based on Tcl/Tk, a supporting widget library, and the dp-tcl extension for distributed processing. The scripting environment provides support for distributed, parallel execution of procedures along with join and abort operations. Nesting of procedures is supported, permitting the same code to run as a top-level procedure under operator control or as a subroutine under control of another procedure. The manager application allows an operator to execute one or more procedures in automatic, semi-automatic, or manual modes. It also provides a standard way for operators to interact with procedures. A number of successful applications of PEM to accelerator operations have been made to date. These include start-up, shutdown, and other control of the positron accumulator ring (PAR), low-energy transport (LET) lines, and the booster rf systems. The PAR/LET procedures make nested use of PEM`s ability to run parallel procedures. There are also a number of procedures to guide and assist tune-up operations, to make accelerator physics measurements, and to diagnose equipment. Because of the success of the existing procedures, expanded use of PEM is planned.

Borland, M. [Argonne National Lab., IL (United States). Advanced Photon Source

1997-06-01T23:59:59.000Z

315

Probabilistic Risk Assessment - Insights for Executives  

Science Conference Proceedings (OSTI)

This report describes the development and use of a new Probabilistic Risk Assessment (PRA) training resource, Probabilistic Risk Assessment – Insights for Executives.  It consists of a slide package with speaker notes, for use by EPRI members to expand understanding of PRA and its applications among executives and nuclear power plant leadership teams.BackgroundWhile many technical disciplines in the nuclear industry have gained acceptance and are ...

2013-07-31T23:59:59.000Z

316

Theoretical atomic physics code development at Los Alamos  

SciTech Connect

We have developed a set of computer codes for atomic physics calculations at Los Alamos. These codes can calculate a large variety of data with a minimum of effort on the part of the user. In particular, differential cross sections and electron impact coherence parameters can be readily obtained for arbitrary ions or atoms. Currently, the theory consists of non-relativistic Hartree-Fock structure calculations and non relativistic distorted wave approximation or first order many body theory collisional calculations. 12 refs., 2 figs., 5 tabs.

Clark, R.E.H.; Abdallah, J. Jr.

1989-01-01T23:59:59.000Z

317

Executive Order 13123-Greening the Government Through Efficient Energy Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0851 0851 Federal Register Vol. 64, No. 109 Tuesday, June 8, 1999 Title 3- The President Executive Order 13123 of June 3, 1999 Greening the Government Through Efficient Energy Management By the authority vested in me as President by the Constitution and the laws of the United States of America, including the National Energy Conserva- tion Policy Act (Public Law 95-619, 92 Stat. 3206, 42 U.S.C. 8252 et seq.), as amended by the Energy Policy Act of 1992 (EPACT) (Public Law 102- 486, 106 Stat. 2776), and section 301 of title 3, United States Code, it is hereby ordered as follows: PART 1-PREAMBLE Section 101. Federal Leadership. The Federal Government, as the Nation's largest energy consumer, shall significantly improve its energy management in order to save taxpayer dollars and reduce emissions that contribute to

318

ALEGRA -- code validation: Experiments and simulations  

SciTech Connect

In this study, the authors are providing an experimental test bed for validating features of the ALEGRA code over a broad range of strain rates with overlapping diagnostics that encompass the multiple responses. A unique feature of the Arbitrary Lagrangian Eulerian Grid for Research Applications (ALEGRA) code is that it allows simultaneous computational treatment, within one code, of a wide range of strain-rates varying from hydrodynamic to structural conditions. This range encompasses strain rates characteristic of shock-wave propagation (10{sup 7}/s) and those characteristic of structural response (10{sup 2}/s). Most previous code validation experimental studies, however, have been restricted to simulating or investigating a single strain-rate regime. What is new and different in this investigation is that the authors have performed well-instrumented experiments which capture features relevant to both hydrodynamic and structural response in a single experiment. Aluminum was chosen for use in this study because it is a well characterized material--its EOS and constitutive material properties are well defined over a wide range of loading rates. The current experiments span strain rate regimes of over 10{sup 7}/s to less than 10{sup 2}/s in a single experiment. The input conditions are extremely well defined. Velocity interferometers are used to record the high strain-rate response, while low strain rate data were collected using strain gauges.

Chhabildas, L.C.; Konrad, C.H.; Mosher, D.A.; Reinhart, W.D; Duggins, B.D.; Rodeman, R.; Trucano, T.G.; Summers, R.M.; Peery, J.S.

1998-03-16T23:59:59.000Z

319

Optimal quantum source coding with quantum side information at the encoder and decoder  

Science Conference Proceedings (OSTI)

Consider many instances of an arbitrary quadripartite pure state of four quantum systems ABCD. Alice holds the AC part of each state, Bob holds B, while R represents all other parties correlated with ABC. Alice is required to redistribute ... Keywords: quantum information, side information, source coding

Jon T. Yard; Igor Devetak

2009-11-01T23:59:59.000Z

320

Electric field in hard superconductors with arbitrary cross section and general critical current law  

E-Print Network (OSTI)

Electric field in hard superconductors with arbitrary cross section and general critical current field E x during magnetic flux entry in superconductors with arbitrary cross section and general critical current law, has been evaluated by integration along the vortex penetration paths. Nontrivial flux

Majós, Antonio Badía

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

A study on transformation of self-similar processes with arbitrary marginal distributions  

Science Conference Proceedings (OSTI)

Stochastic discrete-event simulation studies of communication networks often require a mechanism to transform self-similar processes with normal marginal distributions into self-similar processes with arbitrary marginal distributions. The problem of ... Keywords: arbitrary marginal distribution, autocorrelation function, inverse cumulative distribution function, self-similar process, stochastic simulation

Hae-Duck J. Jeong; Jong-Suk R. Lee

2006-09-01T23:59:59.000Z

322

Stability of Iterative Decoding of Multi-Edge Type Doubly-Generalized LDPC Codes Over the BEC  

E-Print Network (OSTI)

Using the EXIT chart approach, a necessary and sufficient condition is developed for the local stability of iterative decoding of multi-edge type (MET) doubly-generalized low-density parity-check (D-GLDPC) code ensembles. In such code ensembles, the use of arbitrary linear block codes as component codes is combined with the further design of local Tanner graph connectivity through the use of multiple edge types. The stability condition for these code ensembles is shown to be succinctly described in terms of the value of the spectral radius of an appropriately defined polynomial matrix.

Paolini, Enrico; Chiani, Marco; Fossorier, Marc P C

2011-01-01T23:59:59.000Z

323

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

may result in remote command execution. A remote user can create a specially crafted zip file that, when imported by the target user, will execute arbitrary code on the target...

324

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

325

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets 45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger a heap corruption error in 'vidplin.dll' and execute arbitrary code on the target system. The code will run with the

326

DOE-LM Executable Plan Cover Page  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30.2B Executable Plan for LM 30.2B Executable Plan for LM (DOE FEMP Draft) Signature for Site Office Concurrence_______________________________ Digitally signed by Raymond M. Plieness DOE ORDER 430.2B EXECUTABLE PLAN TEAM GOAL SUMMARY Please mark the appropriate box below with an "X" Goal Elements Plan Meets Goal Plan Exceeds Goal Plan Falls Short of Goal Comments Energy Efficiency X LM currently falls short of the goal and shows an increase of energy usage per square foot; however, this is due to the removal of buildings, and plans are in place to ensure that the goal is met by 2015 (by reducing groundwater treatment). Renewable Energy X Water X Transportation/Fleet Management X High Performance and Sustainable Buildings X This page intentionally left blank Page i Contents 1.0

327

2009 Wind Technologies Market Report: Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

1 1 2009 Wind Technologies Market Report Executive Summary Primary authors Ryan Wiser, Lawrence Berkeley National Laboratory Mark Bolinger, Lawrence Berkeley National Laboratory With contributions from Galen Barbose, Naïm Darghouth, Ben Hoen, and Andrew Mills (Berkeley Lab) Kevin Porter and Sari Fink (Exeter Associates) Suzanne Tegen (National Renewable Energy Laboratory) This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report available at http://www.nrel.gov/docs/fy10osti/48666.pdf (PDF 3.1 MB) 2 2009 Wind Technologies Market Report Executive Summary Despite grim predictions at the close of 2008, the U.S. wind power industry experienced yet another record year in 2009, once again surpassing even optimistic growth projections from years past. At the

328

Senior Executive Fellows | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senior Executive Fellows Senior Executive Fellows Senior Executive Fellows February 7, 2014 (All day) Application Deadline(s): February 7, 2014 and July 12, 2014 Application Process: Please forward your name, organizational name, and program interest date to the DOE Career Development Program Manager via email to; Johnny McChriston not later than February 7, 2014 for the April 13, 2014 program date, and July 12, 2014 for the October 12, 2014 program date. Please go to the link below to complete an application. In addition, please be advised that early submission of your application are encouraged because the program is often filled to capacity. SEF Application Completed application packages should be emailed to the DOE program coordinator, Johnny McChriston or packages can be sent via FedEx, or UPS

329

Executive Leadership Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Program Leadership Program Executive Leadership Program Program Overview: This program is based on the U.S. Office of Personnel Management's Leadership Effectiveness Framework (LEF), a model for effective leadership/managerial performance. The program helps participants acquire or enhance the LEF competencies needed to become a successful government leader and manager. Participants will complete the following activities: individual needs assessment; leadership development plans; leadership development team activities; developmental work assignment; shadowing assignment; executive interviews; management readings; and four residential training sessions. In order to complete all the components of the program, participants will be away from their position of record for a

330

How to Apply for Senior Executive positions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

How to Apply for Senior Executive positions How to Apply for Senior Executive positions How to Apply for Senior Executive positions To apply vacancies for SENIOR EXECUTIVE SERVICE (SES) , SENIOR LEVEL (SL), SCIENTIFIC AND PROFESSIONAL (ST) positions within the Department of Energy please visit OPM's website: http://www.usajobs.gov. From this site, you may download announcements for vacancies of interest to you. SENIOR EXECUTIVE SERVICE (SES) The Guide to Senior Executive Service Qualifications provides detailed information about executive qualifications and tips for writing effective qualification statements. What Are Executive Core Qualifications (ECQs) The Executive Core Qualifications (ECQs) define the competencies needed to build a federal corporate culture that drives for results, serves customers, and builds successful teams and coalitions within and outside

331

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

332

Active code completion  

Science Conference Proceedings (OSTI)

Code completion menus have replaced standalone API browsers for most developers because they are more tightly integrated into the development workflow. Refinements to the code completion menu that incorporate additional sources of information have similarly ...

Cyrus Omar; YoungSeok Yoon; Thomas D. LaToza; Brad A. Myers

2012-06-01T23:59:59.000Z

333

Model Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

334

INTERNATIONAL CODE COUNCIL  

Science Conference Proceedings (OSTI)

... EE concepts / practices Page 8. IGCC Code Development Timeline ... Board modification) Page 9. IGCC Subject Areas 1. Energy use efficiency- ...

2012-10-14T23:59:59.000Z

335

Locally Testable Cyclic Codes  

Science Conference Proceedings (OSTI)

Cyclic linear codes of block length n over a finite field \\mathbb{F}_qare the linear subspace of \\mathbb{F}_{_q }^n that are invariant under a cyclic shift of their coordinates. A family of codes is good if all the codes in the family have constant rate ...

Lászl Babai; Amir Shpilka; Daniel Štefankovic

2003-10-01T23:59:59.000Z

336

Informal Control code logic  

E-Print Network (OSTI)

General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

Bergstra, Jan A

2010-01-01T23:59:59.000Z

337

A framework for adaptive execution in grids  

Science Conference Proceedings (OSTI)

Grids offer a dramatic increase in the number of available processing and storing resources that can be delivered to applications. However, efficient job submission and management continue being far from accessible to ordinary scientists and engineers ... Keywords: Globus, adaptive execution, grid technology, job migration

Eduardo Huedo; Ruben S. Montero; Ignacio M. Llorente

2004-06-01T23:59:59.000Z

338

Hawaii energy strategy: Executive summary, October 1995  

SciTech Connect

This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

NONE

1995-10-01T23:59:59.000Z

339

Executing Modular Exponentiation on a Graphics Accelerator  

E-Print Network (OSTI)

to be reprogrammed. Vector shaders are programs that transform 3D vectors within the graphics pipeline by custom projections and calculations. Pixel shaders allow the value of pixels to be specified by the programmer-precision floating-point values. In the GPU programming model a single pixel shader is executed over a 2D rectangle

International Association for Cryptologic Research (IACR)

340

Executive Education Program Freight Transportation and  

E-Print Network (OSTI)

Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

Bustamante, Fabián E.

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

SF STATE Extended Learning EXECUTIVE CERTIFICATE  

E-Print Network (OSTI)

Participants in the certificate program must have a four-year degree or equivalent work experience. AnySF STATE Extended Learning 2013/2014 EXECUTIVE CERTIFICATE in FINANCIAL PLANNING PROGRAM FREE as a webcast. For exact dates and times, visit www.cel.sfsu.edu/financial. · Learn about the program · Meet

342

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

343

Quantum circuit optimization by topological compaction in the surface code  

E-Print Network (OSTI)

The fragile nature of quantum information limits our ability to construct large quantities of quantum bits suitable for quantum computing. An important goal, therefore, is to minimize the amount of resources required to implement quantum algorithms, many of which are serial in nature and leave large numbers of qubits idle much of the time unless compression techniques are used. Furthermore, quantum error-correcting codes, which are required to reduce the effects of noise, introduce additional resource overhead. We consider a strategy for quantum circuit optimization based on topological deformation in the surface code, one of the best performing and most practical quantum error-correcting codes. Specifically, we examine the problem of minimizing computation time on a two-dimensional qubit lattice of arbitrary, but fixed dimension, and propose two algorithms for doing so.

Adam Paetznick; Austin G. Fowler

2013-04-09T23:59:59.000Z

344

Arizona | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

None Statewide Amendments Additional State Code Information Arizona has no statewide energy code. However, many counties have adopted the IECC 2006 as an energy efficiency code....

345

Microsoft Word - Building Energy Codes Survey Report GEO _2_.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Building & Energy Codes Building & Energy Codes Survey Results Prepared by the Governor's Energy Offi ce July 2009 The Governor's Energy Offi ce 1580 Logan Street, Suite 100 Denver, CO 80203 www.colorado.gov/energy (303) 866-2100 Executive Summary Colorado Governor Bill Ritter, Jr., issued an Executive Order on April 16, 2007, re-creating the Governor's Office of Energy Management and Conservation as the Governor's Energy Office (GEO). The GEO's mission is to lead Colorado to a New Energy Economy by advancing energy efficiency and renewable, clean energy resources. The New Energy Economy embraces energy conservation as an important component in our energy future, yet requires a broader mission to meet the goals of expanding renewable and clean energy resources and opportunities for the state's economy, environment and energy

346

XSOR codes users manual  

SciTech Connect

This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

Jow, Hong-Nian [Sandia National Labs., Albuquerque, NM (United States); Murfin, W.B. [Technadyne Engineering Consultants, Inc., Albuquerque, NM (United States); Johnson, J.D. [Science Applications International Corp., Albuquerque, NM (United States)

1993-11-01T23:59:59.000Z

347

SEAMOPT: A Stirling engine performance optimization code  

SciTech Connect

A computer code for Stirling engine research and design is described. The code system, SEAMOPT, has been used to: optimize component and engine performance, modify an existing engine to meet new application requirements, and identify design methods that lead to performance improvement and simplified engine design. SEAMOPT consists of a full Stirling engine simulation linked to a rigorous optimization code through an interface module which defines performance objectives and constraints which might limit values of design variables. Calculated results are presented from two example problems using the GPU-3 Stirling engine as a base design. The first example shows how regenerator dimensions can be changed to achieve three different performance objectives. The second example shows changes in the entire thermodynamic section needed to increase power by a factor of 8 while maintaining efficiency. The code, which requires 65K words of memory, executed problem 1 in 45 seconds and problem 2 in 10 minutes on an IBM 3033. 13 refs., 10 figs., 10 tabs.

Heames, T.J.; Daley, J.G.; Minkoff, M.

1986-05-01T23:59:59.000Z

348

Code of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Governance » Governance » Ethics, Accountability » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Code of Conduct (505) 667-7506 Code of Conduct LANL is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our work, and mutual respect and teamwork. LANL must demonstrate to customers and the public that the Laboratory is accountable for its actions and that it conducts business in a trustworthy manner. What is LANL's Code of Conduct? Charlie McMillan 1:46 Laboratory Director Charlie McMillan introduces the code LANL's Code of Conduct is designed to help employees recognize and

349

Sustainable Acquisition Coding System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents & Publications Policy...

350

Air Flow and Particle Trajectories around Aircraft Fuselages. Part III: Extensions to Particles of Arbitrary Shape  

Science Conference Proceedings (OSTI)

Earlier work that produced generalized rules for obtaining trajectories of water droplets moving around aircraft fuselages has been extended to cover the case for particles of arbitrary shape. The parameters determining the major features of the ...

W. D. King

1985-12-01T23:59:59.000Z

351

Energy-Efficient, Utility Accrual Real-Time Scheduling Under the Unimodal Arbitrary Arrival Model  

Science Conference Proceedings (OSTI)

We present an energy-efficient real-time scheduling algorithm called EUA*, for the unimodal arbitrary arrival model (or UAM). UAM embodies a "stronger" adversary than most arrival models. The algorithm considers application activities that are subject ...

Haisang Wu; Binoy Ravindran; E. Douglas Jensen

2005-03-01T23:59:59.000Z

352

Fluctuating-surface-current formulation of radiative heat transfer for arbitrary geometries  

E-Print Network (OSTI)

We describe a fluctuating-surface-current formulation of radiative heat transfer, applicable to arbitrary geometries in both the near and far field, that directly exploits efficient and sophisticated techniques from the ...

Rodriguez, Alejandro W.

353

Trace formulas for nonequilibrium Casimir interactions, heat radiation, and heat transfer for arbitrary objects  

E-Print Network (OSTI)

We present a detailed derivation of heat radiation, heat transfer, and (Casimir) interactions for N arbitrary objects in the framework of fluctuational electrodynamics in thermal nonequilibrium. The results can be expressed ...

Bimonte, Giuseppe

354

Complete SE[superscript 3] underwater robot control with arbitrary thruster configurations  

E-Print Network (OSTI)

e present a control algorithm for autonomous underwater robots with modular thruster configuration. The algorithm can handle arbitrary thruster configurations. It maintains the robot's desired attitude while solving for ...

Doniec, Marek Wojciech

355

Time-domain non-Monte Carlo noise simulation for nonlinear dynamic circuits with arbitrary excitations  

Science Conference Proceedings (OSTI)

A new, time-domain, non-Monte Carlo method for computer simulation of electrical noise in nonlinear dynamic circuits with arbitrary excitations is presented. This time-domain noise simulation ...

Alper Demir; Edward W. Y. Liu; Alberto L. Sangiovanni-Vincentelli

1994-11-01T23:59:59.000Z

356

A Statistical Generalization of the Transformed Eulerian-Mean Circulation for an Arbitrary Vertical Coordinate System  

Science Conference Proceedings (OSTI)

A new method is derived for approximating the mean meridional circulation in an arbitrary vertical coordinate system using only the time-mean and zonally averaged meridional velocity, meridional eddy transport, and eddy variance. The method is ...

Olivier Pauluis; Tiffany Shaw; Frédéric Laliberté

2011-08-01T23:59:59.000Z

357

The Senior Executive Service (SES) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Resources » The Senior Executive Service Executive Resources » The Senior Executive Service (SES) The Senior Executive Service (SES) The Senior Executive Service (SES) is a corps of men and women who administer public programs at the highest levels of Federal Government utilizing well-honed executive skills and broad perspectives of government and public service. Positions are primarily managerial and supervisory and serve just below top Presidential appointees forming a vital link between these appointees and the rest of the Federal workforce. Members of the SES are selected according to their leadership qualifications based on criteria established by the Office of Personnel Management which manages the overall Federal executive personnel system. The SES was established by the Civil Service Reform Act (CSRA) of 1978 as a

358

The Structural Context of Executive Information Systems Adoption  

Science Conference Proceedings (OSTI)

While some firms are developing computer-based Executive Information Systems EIS to support key executives and managers, a large number of organizations are presently not using EIS. Our focus here is on structural factors associated with the adoption ...

Arun Rai; Arkalgud Ramaprasad; Deepinder S. Bajwa

1998-07-01T23:59:59.000Z

359

On linear combinations of two idempotent matrices over an arbitrary field  

E-Print Network (OSTI)

Given an arbitrary field $\\K$ and non-zero scalars $\\alpha$ and $\\beta$, we give necessary and sufficient conditions for a matrix $A \\in \\Mat_n(\\K)$ to be a linear combination of two idempotents with coefficients $\\alpha$ and $\\beta$. This extends results previously obtained by Hartwig and Putcha in two ways : the field $\\K$ considered here is arbitrary (possibly of characteristic 2), and the case $\\alpha \

Pazzis, Clément de Seguins

2009-01-01T23:59:59.000Z

360

Executive Fleet Vehicles DOE HQ 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Motor Vehicle Management Report Motor Vehicle Management Report U.S. Department of Energy - HQ Pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50) November 14, 2011 Background: On May 24, 2011, the President issued a Presidential Memorandum on Federal Fleet Performance. In accordance with Section 1 (b) of the Presidential Memorandum and pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50), executive fleets are required to achieve maximum fuel efficiency; be limited in motor vehicle body size, engine size, and optional equipment to what is essential to meet agency mission; and be midsize or smaller sedans, except where larger sedans are essential to the agency mission. Within 180 days of the date of the Presidential Memorandum, any executive fleet vehicles that are larger than a midsize sedan or do not comply with alternative fueled

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

TRAN-STAR EXECUTIVE LIMOUSINE COMPANY  

NLE Websites -- All DOE Office Websites (Extended Search)

TRAN-STAR EXECUTIVE LIMOUSINE COMPANY TRAN-STAR EXECUTIVE LIMOUSINE COMPANY http://www.tranexec.com 20% off published rates for BNL Our reservation center is open 24 hours a day, 365 days a year, so you will always talk to a live agent who has direct contact with our chauffeurs. You can make reservations via phone, website or a simple e-mail to customerservice@tranexec.com once a profile has been established. Our advanced reservation system will track any flight and you can rest assured someone will always be there to meet the arriving passenger, no matter what time the flight arrives. http://www.tranexec.com/TranStarSalesBrochure.pdf These rates are inclusive rates, meaning they include gratuity, taxes....everything. They do not include parking or tolls

362

Executive Order 13007 Indian Sacred Sites (1996)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6771 6771 Federal Register / Vol. 61, No. 104 / Wednesday, May 29, 1996 / Presidential Documents Executive Order 13007 of May 24, 1996 Indian Sacred Sites By the authority vested in me as President by the Constitution and the laws of the United States, in furtherance of Federal treaties, and in order to protect and preserve Indian religious practices, it is hereby ordered: Section 1. Accommodation of Sacred Sites. (a) In managing Federal lands, each executive branch agency with statutory or administrative responsibility for the management of Federal lands shall, to the extent practicable, permitted by law, and not clearly inconsistent with essential agency functions, (1) accommodate access to and ceremonial use of Indian sacred sites by Indian religious practitioners and (2) avoid adversely affecting the physical integrity

363

Executive Order 13514 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

514 514 Executive Order 13514 October 8, 2013 - 1:41pm Addthis Executive Order (E.O.) 13514, Federal Leadership in Environmental, Energy, and Economic Performance, was signed on October 5, 2009. It expanded upon the energy reduction and environmental performance requirements of E.O. 13423. E.O. 13514 sets numerous Federal energy requirements the following. This summary is intended as a reference only. Refer to the full text of E.O. 13514 for more details relevant to your work. Accountability and Transparency E.O. 13514 accountability, transparency, and reporting requirements include: Within 30 days, Federal agency heads must designate a senior management official to serve as Senior Sustainability Officer accountable for agency conformance. The Senior Sustainability Officer designation must be reported

364

PROJECT MANGEMENT PLAN EXAMPLES Project Execution Example  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Execution Example Project Execution Example Example 73 6.3 Project Approach The overall schedule strategy for the PFP project includes ongoing minimum safe activities, combined with stabilization of materials followed by materials disposition, and subsequent transition of the PFP complex to a decommissioned state. The PFP material stabilization baseline was developed using a functionally-based work WBS. The WBS defines all activities required to take each material stream from their current location/conditions through stabilization (as required), and disposition the stabilized material as solid waste for shipment to WIPP or as product material for shipment to SRS. Initially, workshops were held with subject matter experts, project managers, schedulers, and support personnel (experts in the

365

Executive Order 12968 Access to Classified Information  

NLE Websites -- All DOE Office Websites (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

366

Executive Potential Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Potential Program Potential Program Executive Potential Program Program Overview: This is a one year training program designed to help senior leaders understand and meet the challenges facing today's federal workforce. Through personal and professional development, The Executive Potential Program builds leadership capacity through strengthening the competencies needed to help today's leaders create a work environment prepared to meet changing agency initiatives. Nomination Due Date: Nomination Due Date: The nomination package must be received by the nomination deadline, which are as follows. (For EEP 2015-1 January 10, 2014 or until filled). (For EPP 2015-DC, April 8, 2014 or until filled) Please be advised that for the 2015-DC session only, there is a limit of 30 participants on a first come basis. Applicants are advised

367

Renewable Electricity Futures Study: Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary Executive Summary NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. Volume 2 PDF Volume 3 PDF Volume 1 PDF Volume 4 PDF Renewable Electricity Futures Study Edited By Hand, M.M. National Renewable Energy Laboratory Baldwin, S. U.S. Department of Energy DeMeo, E. Renewable Energy Consulting Services, Inc. Reilly, J.M. Massachusetts Institute of Technology Mai, T. National Renewable Energy Laboratory Arent, D. Joint Institute for Strategic Energy Analysis Porro, G. National Renewable Energy Laboratory Meshek, M. National Renewable Energy Laboratory Sandor, D. National Renewable Energy Laboratory Suggested Citations Renewable Electricity Futures Study (Entire Report)

368

Executive Order 13221 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

221 221 Executive Order 13221 October 8, 2013 - 1:48pm Addthis Executive Order (E.O.) 13221, Energy-Efficient Standby Power Devices, calls for Federal agencies to purchase products that use minimal standby power when possible. It was signed on August 2, 2001. Requirements for Energy Efficiency and Standby Power This section outlines major requirements defined by E.O. 13221. The content is intended as a reference only. You should refer to the text of E.O. 13221 for more details relevant to your work. Federal agencies must purchase products that use no more than one watt in standby power consuming mode when purchasing commercially-available, off-the-shelf products that use external standby power devices or that contain an internal standby power function. If such products are not available, agencies shall purchase products with

369

Executive Order 13423 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

423 423 Executive Order 13423 October 8, 2013 - 1:44pm Addthis Executive Order (E.O.) 13423, Strengthening Federal Environmental, Energy, and Transportation Management, was signed on January 24, 2007, to strengthen key goals for the Federal Government. It set more challenging goals than the Energy Policy Act of 2005 (EPAct 2005) and superseded E.O. 13123 and E.O. 13149. This summary below is intended as a reference only. You should refer to the full text of E.O. 13423 for more details relevant to your work. Implementing Instructions In consultation with the Director of the Office of Management and Budget, the Chairman of the Council on Environmental Quality issued instructions and defined requirements for implementing E.O. 13423. The implementation instructions identify the entities responsible for coordination and

370

Mr. William Mendoza Acting Executive Director  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

William Mendoza William Mendoza Acting Executive Director Department of Energy Washing!on, DC 20585 May4, 2011 White House Initiative on Tribal Colleges and Universities Department of Education 400 Maryland A venue, SW Washington, DC 20202 Dear Mr. Mendoza: Enclosed is the Department of Energy's (DOE) Fiscal Year (FY) 2010 Annual Performance Report on our activities to assist Tribal College and Universities (TCUs). DOE is submitting this information in accordance with Executive Order 13270. In FY 2010, DOE provided $275,000 in total expenditures for TCUs, an increase of $169,500 from the amount provided to TCU s in FY 2009. In an effort to raise the level of support in future years, DOE will continue to set funding goals and to identify opportunities for additional

371

SAMPLE MODEL AGREEMENT Â… NOT FOR EXECUTION  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MODEL AGREEMENT - NOT FOR EXECUTION MODEL AGREEMENT - NOT FOR EXECUTION 5/2/11 Template start-up option 1 of 8 OPTION AGREEMENT This option agreement (the "Agreement") is made by and is effective as of the date of last signature ("Effective Date") by Name of Contractor ("Abbreviated name of the Contractor" or "Lab"), which operates Name of National Laboratory at Address of the Lab (hereinafter "Abbreviated name of the Laboratory") under Contract No. ####### with the United States Department of Energy ("DOE") and Name of Company ("Abbreviated name of the Company" or "Company"), having a principal place of business at Address of the Company. 1. BACKGROUND 1.1. Lab owns certain U.S. patent properties related to describe the technology

372

Equivalence between executable OOZE and algebraic specification  

E-Print Network (OSTI)

In this paper two algorithms are presented: one which turns an executable OOZE specification into an algebraic specification and another which does the reverse operation. In this way, we shall be able to prove in a constructive way that executable OOZE and algebraic specification are equivalent and that, generally speaking, state-based specification is equivalent to to algebraic specification. We shall discuss whether these results can be made to cover other object-oriented Z dialects. 1 Introduction Formal methods are a constant subject of research within the field of Software Engineering. They have been being developed since the mid 70's, and are nowadays beginning to be applied in industry (see [Hal90]) and are expected to become a most favourable tool for saving the time and effort which is spent in the development of applications. This very same objective is shared by object-oriented programming. This new style of programming, which helps to reduce costs during the development pr...

Vicent-Ramon Palasi Lallana

1995-01-01T23:59:59.000Z

373

Executive roundtable on coal-fired generation  

Science Conference Proceedings (OSTI)

Power Engineering magazine invited six industry executives from the coal-fired sector to discuss issues affecting current and future prospects of coal-fired generation. The executives are Tim Curran, head of Alstom Power for the USA and Senior Vice President and General Manager of Boilers North America; Ray Kowalik, President and General Manager of Burns and McDonnell Energy Group; Jeff Holmstead, head of Environmental Strategies for the Bracewell Giuliani law firm; Jim Mackey, Vice President, Fluor Power Group's Solid Fuel business line; Tom Shelby, President Kiewit Power Inc., and David Wilks, President of Energy Supply for Excel Energy Group. Steve Blankinship, the magazine's Associate Editor, was the moderator. 6 photos.

NONE

2009-09-15T23:59:59.000Z

374

RELAP5-3D Code for Supercritical-Pressure Light-Water-Cooled Reactors  

SciTech Connect

The RELAP5-3D computer program has been improved for analysis of supercritical-pressure, light-water-cooled reactors. Several code modifications were implemented to correct code execution failures. Changes were made to the steam table generation, steam table interpolation, metastable states, interfacial heat transfer coefficients, and transport properties (viscosity and thermal conductivity). The code modifications now allow the code to run slow transients above the critical pressure as well as blowdown transients (modified Edwards pipe and modified existing pressurized water reactor model) that pass near the critical point.

Riemke, Richard Allan; Davis, Cliff Bybee; Schultz, Richard Raphael

2003-04-01T23:59:59.000Z

375

TESLA Technical Design Report Executive Summary  

E-Print Network (OSTI)

TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bjørn H. Wiik (1937-1999) #12;#12;TESLA ­ A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

376

Automated testing using executable formal specifications  

Science Conference Proceedings (OSTI)

A new method is presented for the automated random generation of valid content-sensitive test data and corresponding oracle information. The process takes as input a specification of the program under test, expressed as a functional program, and produces ... Keywords: automated program testing, automated random test data generation, automatic testing, computer aided software engineering, executable formal specifications, formal specification, functional program, oracle information, output test cases, program testing, valid content-sensitive test data, valid input space

N. Sanders

1996-01-01T23:59:59.000Z

377

Mechanical code comparator  

DOE Patents (OSTI)

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

378

Magma benchmark code - CECM  

E-Print Network (OSTI)

Below is the Magma code used to run the benchmarks in Section 5 of the paper " In-place Arithmetic for Univariate Polynomials over an Algebraic Number Field" ...

379

11. CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120...

380

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2002; " " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Quantum convolutional stabilizer codes  

E-Print Network (OSTI)

Quantum error correction codes were introduced as a means to protect quantum information from decoherance and operational errors. Based on their approach to error control, error correcting codes can be divided into two different classes: block codes and convolutional codes. There has been significant development towards finding quantum block codes, since they were first discovered in 1995. In contrast, quantum convolutional codes remained mainly uninvestigated. In this thesis, we develop the stabilizer formalism for quantum convolutional codes. We define distance properties of these codes and give a general method for constructing encoding circuits, given a set of generators of the stabilizer of a quantum convolutional stabilizer code, is shown. The resulting encoding circuit enables online encoding of the qubits, i.e., the encoder does not have to wait for the input transmission to end before starting the encoding process. We develop the quantum analogue of the Viterbi algorithm. The quantum Viterbi algorithm (QVA) is a maximum likehood error estimation algorithm, the complexity of which grows linearly with the number of encoded qubits. A variation of the quantum Viterbi algorithm, the Windowed QVA, is also discussed. Using Windowed QVA, we can estimate the most likely error without waiting for the entire received sequence.

Chinthamani, Neelima

2005-05-01T23:59:59.000Z

382

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

9.1 Enclosed Floorspace and Number of Establishment Buildings, 2006;" " Level: National Data; " " Row: NAICS Codes;" " Column: Floorspace and Buildings;" " Unit: Floorspace Square...

383

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

384

11. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

1 PAGE 1 OF2 AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT PAGES 2. AMENDMENT/MODIFICATION NO. I 3. EFFECTIVE DATE M191 See Block 16C 4. REQUISITION/PURCHASE I 5. PROJECT NO. (If applicable) REQ. NO. 6.ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 87185-5400 7. ADMINISTERED BY (If other than Item 6) CODE U.S. Department of Energy National Nuclear Security Administration Manager, Pantex Site Office P.O. Box 30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY CODE SA. AMENDMENT OF SOLICITATION NO.

385

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

386

Hydrogen Codes and Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes and Standards Codes and Standards James Ohi National Renewable Energy Laboratory 1617 Cole Blvd. Golden, CO 80401 Background The development and promulgation of codes and standards are essential if hydrogen is to become a significant energy carrier and fuel because codes and standards are critical to establishing a market-receptive environment for commercializing hydrogen-based products and systems. The Hydrogen, Fuel Cells, and Infrastructure Technologies Program of the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL), with the help of the National Hydrogen Association (NHA) and other key stakeholders, are coordinating a collaborative national effort by government and industry to prepare, review, and promulgate hydrogen codes and standards needed to expedite hydrogen infrastructure development. The

387

Residential Building Code Compliance  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 Residential Building Code Compliance: Recent Findings and Implications Energy use in residential buildings in the U.S. is significant-about 20% of primary energy use. While several approaches reduce energy use such as appliance standards and utility programs, enforcing state building energy codes is one of the most promising. However, one of the challenges is to understand the rate of compliance within the building community. Utility companies typically use these codes as the baseline for providing incentives to builders participating in utility-sponsored residential new construction (RNC) programs. However, because builders may construct homes that fail to meet energy codes, energy use in the actual baseline is higher than would be expected if all buildings complied with the code. Also,

388

EIA - Annual Energy Outlook 2009 - Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Executive Summary Executive Summary Annual Energy Outlook 2009 with Projections to 2030 Executive Summary The past year has been a tumultuous one for world energy markets, with oil prices soaring through the first half of 2008 and diving in its second half. The downturn in the world economy has had a significant impact on energy demand, and the near-term future of energy markets is tied to the downturnÂ’s uncertain depth and persistence. The recovery of the worldÂ’s financial markets is especially important for the energy supply outlook, because the capital-intensive nature of most large energy projects makes access to financing a critical necessity. The projections in AEO2009 look beyond current economic and financial woes and focus on factors that drive U.S. energy markets in the longer term. Key issues highlighted in the AEO2009 include higher but uncertain world oil prices, growing concern about greenhouse gas (GHG) emissions and its impacts on energy investment decisions, the increasing use of renewable fuels, the increasing production of unconventional natural gas, the shift in the transportation fleet to more efficient vehicles, and improved efficiency in end-use appliances. Using a reference case and a broad range of sensitivity cases, AEO2009 illustrates these key energy market trends and explores important areas of uncertainty in the U.S. energy economy. The AEO2009 cases, which were developed before enactment of the American Recovery and Reinvestment Act of 2009 (ARRA2009) in February 2009, reflect laws and policies in effect as of November 2008.

389

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

390

NREL: Energy Executive Leadership Academy - Leadership Institute  

NLE Websites -- All DOE Office Websites (Extended Search)

Institute Institute Participants in NREL's Executive Energy Leadership Institute learn about renewable energy and energy efficiency from the experts through this accelerated training program typically conducted over a three-day period. Course content includes briefings by technology experts on renewable energy and energy efficiency technologies, market assessments, and analytical and financial tools, as well as associated technology tours. Tours of NREL research facilities are a key component of the Institute. All sessions originate and end at NREL's campus in Golden, Colorado. For additional details, including a customized Leadership Institute in your region, see the sample syllabus or contact Energy Execs. Qualified individuals are invited to apply for the upcoming 2014 Institute.

391

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2011 4, 2011 U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. September 30, 2011 T-731:Symantec IM Manager Code Injection Vulnerability Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. September 29, 2011 T-730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution Citrix Provisioning Services is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application. September 29, 2011 T-729: Mozilla Code Installation Through Holding Down Enter

392

Report number codes  

SciTech Connect

This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

Nelson, R.N. (ed.)

1985-05-01T23:59:59.000Z

393

Dispersion in a thermal plasma including arbitrary degeneracy and quantum recoil  

Science Conference Proceedings (OSTI)

The longitudinal response function for a thermal electron gas is calculated including two quantum effects exactly, degeneracy, and the quantum recoil. The Fermi-Dirac distribution is expanded in powers of a parameter that is small in the nondegenerate limit and the response function is evaluated in terms of the conventional plasma dispersion function to arbitrary order in this parameter. The infinite sum is performed in terms of polylogarithms in the long-wavelength and quasistatic limits, giving results that apply for arbitrary degeneracy. The results are applied to the dispersion relations for Langmuir waves and to screening, reproducing known results in the nondegenerate and completely degenerate limits, and generalizing them to arbitrary degeneracy.

Melrose, D. B. [School of Physics, University of Sydney, New South Wales 2006 (Australia); Mushtaq, A. [School of Physics, University of Sydney, New South Wales 2006 (Australia); Theoretical Plasma Physics Division, PINSTECH, Nilore, 44000 Islamabad (Pakistan)

2010-11-15T23:59:59.000Z

394

Thermodynamic Model for Fluid-Fluid Interfacial Areas in Porous Media for Arbitrary Drainage-Imbibition Sequences  

SciTech Connect

Fluid/fluid interfacial areas are important in controlling the rate of mass and energy transfer between fluid phases in porous media. We present a modified thermodynamically based model (TBM) to predict fluid/fluid interfacial areas in porous media for arbitrary drainage/imbibition sequences. The TBM explicitly distinguishes between interfacial areas associated with continuous (free) and isolated (entrapped) nonwetting fluids. The model is restricted to two-fluid systems in which (1) no significant conversion of mechanical work into heat occurs, (2) the wetting fluid completely wets the porous medium’s solid surfaces, and (3) no changes in interfacial area due to mass transfer between phases occur. We show example calculations for two different drainage/imbibition sequences in two porous media: a highly uniform silica sand and a well-graded silt. The TBM’s predictions for interfacial area associated with free nonwetting-fluid are identical to those of a previously published geometry-based model (GBM). However, predictions for interfacial area associated with entrapped nonwetting-fluid are consistently larger in the TBM than in the GBM. Although a comparison of model predictions with experimental data is currently only possible to a limited extent, good general agreement was found for the TBM. As required model parameters are commonly used as inputs for or tracked during multifluid-flow simulations, the modified TBM may be easily incorporated in numerical codes.

Schroth, Martin H.; Oostrom, Mart; Dobson, Richard; Zeyer, Josef

2008-08-01T23:59:59.000Z

395

Codes base on unambiguous products  

Science Conference Proceedings (OSTI)

In this paper, we propose the notion of +-unambiguous product which is expanded from unambiguous product and the definitions of alternative product, alternative code, even alternative code on a pair (X, Y) of languages. Some basic properties of ... Keywords: +-unambiguous product, alt-code, ealt-code, generations of code, independency of conditions

Ho Ngoc Vinh; Vu Thanh Nam; Phan Trung Huy

2010-11-01T23:59:59.000Z

396

FCT Safety, Codes and Standards: DOE Safety, Codes, and Standards...  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Codes, and Standards Activities to someone by E-mail Share FCT Safety, Codes and Standards: DOE Safety, Codes, and Standards Activities on Facebook Tweet about FCT Safety,...

397

Energy study of Laundry Facilities, Fort Knox, Kentucky: Executive summary (revised). Executive summary  

SciTech Connect

This document is the Executive Summary of the Energy Survey of Laundry Facilities at Fort Knox, Kentucky. The purpose of this document is to briefly outline the existing and historical energy situation, summarize the methodology and results of the Energy Study, and present the specific energy conservation projects developed through the Energy Study.

1986-12-01T23:59:59.000Z

398

Trusted Computing Technologies, Intel Trusted Execution Technology.  

Science Conference Proceedings (OSTI)

We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

Guise, Max Joseph; Wendt, Jeremy Daniel

2011-01-01T23:59:59.000Z

399

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2011 29, 2011 U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. December 28, 2011 U-070:Redhat krb5 Critical Security Update Vulnerability can be exploited by malicious people to compromise a vulnerable system. December 27, 2011 U-069: Telnet code execution vulnerability: FreeBSD and Kerberos Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 23, 2011 U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities

400

T-730: Vulnerability in Citrix Provisioning Services could result in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

730: Vulnerability in Citrix Provisioning Services could result 730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution T-730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution September 29, 2011 - 8:30am Addthis PROBLEM: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution. PLATFORM: This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6 Service Pack 1. ABSTRACT: Citrix Provisioning Services is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application. reference LINKS: Citrix Document ID: CTX130846 Security Focus: Bugtraq ID 49803 IMPACT ASSESSMENT:

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Gate fidelity of arbitrary single-qubit gates constrained by conservation laws  

E-Print Network (OSTI)

Recent investigations show that conservation laws limit the accuracy of gate operations in quantum computing. The inevitable error under the angular momentum conservation law has been evaluated so far for the CNOT, Hadamard, and NOT gates for spin 1/2 qubits, while the SWAP gate has no constraint. Here, we extend the above results to general single-qubit gates. We obtain an upper bound of the gate fidelity of arbitrary single-qubit gates implemented under arbitrary conservation laws, determined by the geometry of the conservation law and the gate operation on the Bloch sphere as well as the size of the ancilla.

Tokishiro Karasawa; Julio Gea-Banacloche; Masanao Ozawa

2008-09-18T23:59:59.000Z

402

CODES: Enabling Co-Design of Multilayer Exascale Storage Architectures |  

NLE Websites -- All DOE Office Websites (Extended Search)

CODES: Enabling Co-Design of Multilayer Exascale Storage Architectures CODES: Enabling Co-Design of Multilayer Exascale Storage Architectures CODES seeks to enable the exploration and co-design of exascale storage systems by providing a detailed, accurate, and highly parallel simulation of exascale storage and the surrounding environment. Specifically the intention is to (1) portray realistic application checkpointing and analysis workloads, (2) capture the complexity, scale, and multilayer nature of exascale storage hardware and software, and (3) execute in a timeframe that enables "what if'" exploration of design concepts. To this end we develop models of the major hardware and software components in an exascale storage system, as well as the application I/O workloads that drive them. We will use our simulation system to investigate critical

403

Executive Order 13583, Establishing a Coordinated Government-Wide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13583, Establishing a Coordinated Government-Wide Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce August 18, 2011 - 11:15am Addthis Executive Order 13583 Established a "coordinated government-wide initiative to promote diversity and inclusion in the federal workforce". Wherever possible, the Federal Government must also seek to consolidate compliance efforts established through related or overlapping statutory mandates, directions from Executive Orders, and regulatory requirements. Addthis Related Articles A Government-Wide Approach to a Diverse Workforce Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce

404

FY 2006 Executive Order 13101 Report: Department of Energy Affirmative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2006 Executive Order 13101 Report: Department of Energy FY 2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 3/12/07 FY 2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 3/12/07 The Department of Energy (DOE) is pleased to transmit the enclosed report in fulfillment of the annual reporting requirements under Executive Order 13101, Greening the Government through Waste Prevention, Recycling, and Federal Acquisition. The report was prepared in accordance with the survey instructions provided in your letter to Agency Environmental Executives and Senior Procurement Executives, dated November 2, 2006. DOE's report contains the specific purchasing data that you requested on the eight (8)

405

On the behaviours produced by instruction sequences under execution  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. The increasingly occurring case where the processing takes place remotely involves the generation of a stream of instructions to be processed and a remote execution unit that handles the processing of this stream of instructions. We use process algebra to describe the behaviours produced by instruction sequences under execution and to describe two protocols implementing these behaviours in the case of remote processing. We also show that all finite-state behaviours considered in process algebra can be produced by instruction sequences under execution.

Bergstra, J A

2011-01-01T23:59:59.000Z

406

Residential Codes and Standards | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

houses, which are built in a factory and transported to the home site. ICC ASHRAE International Energy Conservation Code The International Energy Conservation Code...

407

Building Energy Codes in Arizona: Best Practices in Code Support...  

NLE Websites -- All DOE Office Websites (Extended Search)

in Code Support, Compliance, and Enforcement A study funded by the North American Insulation Manufacturers Association to identify "the best practices in energy code support,...

408

APPENDIX A CRUDE STREAM CODES COUNTRY Stream Code Stream Name ...  

U.S. Energy Information Administration (EIA)

Page ?? 6 * A Former Soviet Republic APPENDIX A CRUDE STREAM CODES COUNTRY Stream Code Stream Name Gravity Sulfur Columbia - Continued CO043 Orito ...

409

T ID CODE I  

National Nuclear Security Administration (NNSA)

I 9B. DATED (SEE ITEM 11) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) 10A. MODIFICATION OF CONTRACTIORDER NO. DE-AC52-06NA25396 3. EFFECTIVE DATE See...

410

" Row: NAICS Codes;" " ...  

U.S. Energy Information Administration (EIA) Indexed Site

Only","Other than","and","Any","from Only","Other than","and" "Code(a)","Subsector and Industry","Electricity(b)","Local Utility(c)","Local Utility(d)","Other Sources","Natural...

411

" Row: NAICS Codes;" " ...  

U.S. Energy Information Administration (EIA) Indexed Site

than","and","Any","from Only","Other than","and","Row" "Code(a)","Subsector and Industry","Electricity(b)","Local Utility(c)","Local Utility(d)","Other Sources","Natural...

412

Network coding: an instant primer  

Science Conference Proceedings (OSTI)

Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are linear combinations of previously received information. There are two ... Keywords: network coding

Christina Fragouli; Jean-Yves Le Boudec; Jörg Widmer

2006-01-01T23:59:59.000Z

413

Memorandum of Understanding on Environmental Justice and Executive Order 12898  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ON ON ENVIRONMENTAL JUSTICE AND EXECUTIVE ORDER 12898 WHEREAS, on February 11, 1994, the President signed Executive Order 12898, "Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations" ("Executive Order 12898" or "Order"), and issued an accompanying Presidential Memorandum (references to this Order herein also generally include this Memorandum), and WHEREAS, Executive Order 12898 applies to the following agencies: the Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Housing and Urban Development, Department of the Interior, Department of Justice, Department of Labor, Department of Transportation, and the Environmental

414

Executive Order 13148-Greening the Government Through Leadership in  

NLE Websites -- All DOE Office Websites (Extended Search)

48-Greening the Government Through Leadership 48-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership in Environmental Management The head of each Federal agency is responsible for ensuring that all necessary actions are taken to integrate environmental accountability into agency day-to-day decisionmaking and long-term planning processes, across all agency missions, activities, and functions. Executive Order 13148-Greening the Government Through Leadership in Environmental Management More Documents & Publications Executive Order 12969-Federal Acquisition and Community RightTo-Know Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000

415

TMS Executive Director Appointed to University of California ...  

Science Conference Proceedings (OSTI)

Sep 6, 2011 ... DISLOCATION: THE YOUNG LEADERS NEWSLETTER. 09/6 - TMS Executive Director Appointed to University of California Academic Advisory ...

416

Microsoft Word - Executive Summary Rework v2.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary SECA Program Overview The U.S. Department of Energy (DOE) Office of Fossil Energy, through the National Energy Technology Laboratory (NETL) and in collaboration...

417

Baldrige 2020: an Executive's Guide to the Performance ...  

Science Conference Proceedings (OSTI)

... expectations to the emergence of new markets and global competition, it is ... today's executives with practical examples and keen insights on how ...

2012-09-17T23:59:59.000Z

418

Natural Gas 1998: Issues and Trends - Executive Summary  

U.S. Energy Information Administration (EIA)

Energy Information Administration / Natural Gas Monthly April 1999 vii The following article is the Executive Summary from the report Natural Gas ...

419

Engaging Non-IT Executives in IT Infrastructure Decisions  

E-Print Network (OSTI)

This case study describes how information technology (IT) managers from Insurance Co. successfully engaged non-IT executives in IT infrastructure investment decisions. This

Fonstad, Nils O.

2008-07-01T23:59:59.000Z

420

Executive Order 13031-Federal Alternative Fueled Vehicle Leadership...  

NLE Websites -- All DOE Office Websites (Extended Search)

in the use of alternative fueled vehicles (AFVs). Executive Order 13031-Federal Alternative Fueled Vehicle Leadership More Documents & Publications NATIONAL DEFENSE...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Optimal Execution Under Jump Models For Uncertain Price Impact  

E-Print Network (OSTI)

Aug 13, 2012 ... A major source of the execution cost comes from price impacts of both the investor's own trades and other concurrent institutional trades.

422

Executive Order 13514-Federal Leadership in Environmental, Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

514-Federal Leadership in Environmental, Energy, and Economic Performance Executive Order 13514-Federal Leadership in Environmental, Energy, and Economic Performance It is...

423

Prototyping Faithful Execution in a Java virtual machine.  

SciTech Connect

This report presents the implementation of a stateless scheme for Faithful Execution, the design for which is presented in a companion report, ''Principles of Faithful Execution in the Implementation of Trusted Objects'' (SAND 2003-2328). We added a simple cryptographic capability to an already simplified class loader and its associated Java Virtual Machine (JVM) to provide a byte-level implementation of Faithful Execution. The extended class loader and JVM we refer to collectively as the Sandia Faithfully Executing Java architecture (or JavaFE for short). This prototype is intended to enable exploration of more sophisticated techniques which we intend to implement in hardware.

Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

2003-09-01T23:59:59.000Z

424

The Health Benefits of Tackling Climate Change: An Executive...  

Open Energy Info (EERE)

The Health Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Jump to: navigation, search Tool Summary Name: The Health Benefits of Tackling Climate...

425

Adequacy report-executive summary. October 31, 2008 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

summary. October 31, 2008 Adequacy report-executive summary. October 31, 2008 The electricity industry has gone through major changes in structure, shape, and form over the...

426

Approval of Contractor Executive Salaries by Department of Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is responsible for oversight of the UCOR contract, including analyzing and performing market analyses to assess the reasonableness of the proposed contractor executive salaries....

427

Fiscal Year 2008 Annual Federal Performance Report On Executive...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities Fiscal Year 2008 Annual Federal Performance Report On...

428

Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary  

DOE Green Energy (OSTI)

This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

Haase, S.

2009-11-01T23:59:59.000Z

429

Training Program EOC-003 EOC Training for Executives COURSE SYLLABUS  

NLE Websites -- All DOE Office Websites (Extended Search)

3 EOC Training for Executives COURSE SYLLABUS Subject Category: Emergency Operations Schedule: Upon Request Course Length: 1 hour Medical Approval: None Delivery Method: Classroom...

430

Connecticut | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

431

Maryland | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

432

Oregon | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

433

Indiana | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

434

California | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

435

Iowa | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

utility company must obtain a written statementcertification from the builder or homeowner attesting to their compliance with the state energy code. Code enforcement is...

436

A model for stratified gas-liquid turbulent flow in ducts of arbitrary cross-section  

E-Print Network (OSTI)

93 A model for stratified gas-liquid turbulent flow in ducts of arbitrary cross-section J. M the pressure gradient and the liquid fraction in two-phase gas- liquid fully developed stratified flow.60 Nomenclature. - TWO-PHASE VARIABLES. Definition densities statistical average (gas, liquid) mass average phase

Paris-Sud XI, Université de

437

Hardware generation of arbitrary random number distributions from uniform distributions via the inversion method  

Science Conference Proceedings (OSTI)

We present an automated methodology for producing hardware-based random number generator (RNG) designs for arbitrary distributions using the inverse cumulative distribution function (ICDF). The ICDF is evaluated via piecewise polynomial approximation ... Keywords: Chebyshev approximation and theory, algorithms implemented in hardware, automatic synthesis, computer arithmetic, elementary function approximation, error analysis, gate arrays, piecewise polynomial approximation

Ray C. C. Cheung; Dong-U Lee; Wayne Luk; John D. Villasenor

2007-08-01T23:59:59.000Z

438

One-step hybrid remapping algorithm for multi-material arbitrary Lagrangian-Eulerian methods  

Science Conference Proceedings (OSTI)

In this paper, a new flux-based one-step hybrid remapping method for multi-material arbitrary Lagrangian-Eulerian (ALE) approach is introduced. In the vicinity of material interfaces, the swept region is intersected with pure material polygons in the ... Keywords: Conservative interpolations, Flux-based hybrid remap, Multi-material ALE, Swept regions

Milan Kucharik; Mikhail Shashkov

2012-04-01T23:59:59.000Z

439

Numerical Regularized Moment Method of Arbitrary Order for Boltzmann-BGK Equation  

Science Conference Proceedings (OSTI)

We introduce a numerical method for solving Grad's moment equations or regularized moment equations for an arbitrary order of moments. In our algorithm, we do not explicitly need the moment equations. Instead, we directly start from the Boltzmann equation ... Keywords: Boltzmann-BGK equation, Grad's moment method, regularized moment-equations

Zhenning Cai; Ruo Li

2010-08-01T23:59:59.000Z

440

Single-Scan NMR Spectroscopy at Arbitrary Dimensions Yoav Shrot and Lucio Frydman*  

E-Print Network (OSTI)

Single-Scan NMR Spectroscopy at Arbitrary Dimensions Yoav Shrot and Lucio Frydman* Contribution resonance (NMR) provides one of the foremost analytical tools available to elucidate the structure a parametric incrementation of their values throughout independent experiments. Two-dimensional (2D) NMR

Frydman, Lucio

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Reduced-dissipation remapping of velocity in staggered arbitrary Lagrangian-Eulerian methods  

Science Conference Proceedings (OSTI)

Remapping is an essential part of most Arbitrary Lagrangian-Eulerian (ALE) methods. In this paper, we focus on the part of the remapping algorithm that performs the interpolation of the fluid velocity field from the Lagrangian to the rezoned computational ... Keywords: Conservative interpolations, Flux-based remap, Staggered discretization, Velocity remap

David Bailey; Markus Berndt; Milan Kucharik; Mikhail Shashkov

2010-04-01T23:59:59.000Z

442

Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary  

Science Conference Proceedings (OSTI)

In this paper, we re-visit the problem of unconditionally secure message transmission (USMT) from a sender S to a receiver R, who are part of a distributed synchronous network, modeled as an arbitrary directed graph. Some ... Keywords: error probability, information theoretic security, mixed adversary

Kannan Srinathan; Arpita Patra; Ashish Choudhary; C. Pandu Rangan

2009-03-01T23:59:59.000Z

443

Federal Energy Management Program: Executive Order 13514  

NLE Websites -- All DOE Office Websites (Extended Search)

514 514 Executive Order (E.O.) 13514; Federal Leadership in Environmental, Energy, and Economic Performance; was signed on October 5, 2009. It expanded upon the energy reduction and environmental performance requirements of E.O. 13423. E.O. 13514 sets numerous Federal energy requirements in several areas, including: Accountability and Transparency Strategic Sustainability Performance Planning Greenhouse Gas Management Sustainable Buildings and Communities Water Efficiency Electronic Products and Services Fleet and Transportation Management Pollution Prevention and Waste Reduction The summary below is intended as a reference only. Refer to the full text of E.O. 13514 for more details relevant to your work. Accountability and Transparency E.O. 13514 accountability, transparency, and reporting requirements include:

444

Microsoft Word - Executive Summary.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Generation-IV Roadmap Generation-IV Roadmap Report of the Fuel Cycle Crosscut Group March 18, 2001 "This document has not been patent-cleared and has not received DOE approval for external release. Do not distribute beyond the Generation IV Roadmap Project Participants" FCCG Rpt Executive Sum FR03-00 18-Mar-2002 Page ii Generation-IV Roadmap Report of the Fuel Cycle Crosscut Group (FCCG) March 18, 2002 FCCG Membership Organization TWG Arden Bement Purdue Gas Cooled Doug Crawford ANL-W Evaluation Methodology Charles Forsberg* ORNL Non Classical Steve Herring INEEL Non Classical Bill Halsey LLNL Evaluation Methodology Dave Lewis ANL-E Non Classical Chuck Boardman GE Metal Cooled Per Peterson UC Berkeley Evaluation Methodology

445

Microsoft Word - Executive Summary.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar PEIS ES-1 December 2010 Solar PEIS ES-1 December 2010 EXECUTIVE SUMMARY 1 2 3 ES.1 BACKGROUND 4 5 The U.S. Department of the Interior (DOI) Bureau of Land Management (BLM) and the 6 U.S. Department of Energy (DOE) are each considering taking actions to facilitate solar energy 7 development in compliance with various orders, mandates, and agency policies. For the BLM, 8 these actions include the evaluation of a new BLM Solar Energy Program applicable to utility- 9 scale solar energy development on BLM-administered lands in six southwestern states (Arizona, 10 California, Colorado, Nevada, New Mexico, and Utah). 1 For DOE, they include the evaluation 11 of developing new program guidance relevant to DOE-supported solar projects. 12 13 The BLM and DOE are working jointly as lead agencies to prepare this programmatic 14

446

Maine | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Maine Maine Last updated on 2013-11-04 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information As of September 28, 2011, municipalities over 4,000 in population were required to enforce the new code if they had a building code in place by August 2008. Municipalities under 4,000 are not required to enforce it unless they wish to do so and have the following options: 1. Adopt and enforce the Maine Uniform Building and Energy Code 2. Adopt and enforce the Maine Uniform Building Code (the building code without energy) 3. Adopt and enforce the Maine Uniform Energy Code (energy code only) 4. Have no code Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Maine (BECP Report, Sept. 2009)

447

Product Service Codes @ Headquarters | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Product Service Codes @ Headquarters Product Service Codes @ Headquarters A listing of Product Service Codes used at Headquarters Procurement Services Produce Service Codes @...

448

Additive semisimple multivariable codes over F4  

Science Conference Proceedings (OSTI)

The structure of additive multivariable codes over Keywords: 11T61, 13M10, 81P70, 94B99, Abelian codes, Additive multivariable codes, Duality, Quantum codes

E. Martínez-Moro; A. Piñera-Nicolás; I. F. Rúa

2013-11-01T23:59:59.000Z

449

Code Tables | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The Obligation Code table shows the valid country of obligation codes. Type of Inventory ChangeUse Code The type of inventory changeuse code (UC) identifies the category...

450

A geometrically-conservative, synchronized, flux-corrected remap for arbitrary Lagrangian-Eulerian computations with nodal finite elements  

Science Conference Proceedings (OSTI)

This article describes a conservative synchronized remap algorithm applicable to arbitrary Lagrangian-Eulerian computations with nodal finite elements. In the proposed approach, ideas derived from flux-corrected transport (FCT) methods are extended to ... Keywords: Arbitrary Lagrangian-Eulerian methods, Compatible discretizations, Geometric conservation law, Meteorological flows, Nodal finite element method, Remap, Shock hydrodynamics

A. LóPez Ortega; G. Scovazzi

2011-07-01T23:59:59.000Z

451

A Hamilton-Jacobi-Bellman approach to optimal trade execution  

Science Conference Proceedings (OSTI)

The optimal trade execution problem is formulated in terms of a mean-variance tradeoff, as seen at the initial time. The mean-variance problem can be embedded in a linear-quadratic (LQ) optimal stochastic control problem. A semi-Lagrangian scheme is ... Keywords: HJB equation, Mean-variance tradeoff, Optimal execution, Semi-Lagrangian discretization, Viscosity solution

Peter A. Forsyth

2011-02-01T23:59:59.000Z

452

NAICS Codes Description:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Codes Description: Filters: Date Signed only show values between '10/01/2006' and '09/30/2007', Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001') Contracting Agency ID: 8900, Contracting Office ID: 00001 NAICS Code NAICS Description Actions Action Obligation 541519 OTHER COMPUTER RELATED SERVICES 251 $164,546,671 541611 ADMINISTRATIVE MANAGEMENT AND GENERAL MANAGEMENT CONSULTING SERVICES 236 $52,396,806 514210 DATA PROCESSING SERVICES 195 $28,941,727 531210 OFFICES OF REAL ESTATE AGENTS AND BROKERS 190 $6,460,652 541330 ENGINEERING SERVICES 165 $33,006,079 163 $11,515,387 541690 OTHER SCIENTIFIC AND TECHNICAL CONSULTING SERVICES 92 $40,527,088 531390 OTHER ACTIVITIES RELATED TO REAL ESTATE 79 -$659,654 337214 OFFICE FURNITURE (EXCEPT WOOD) MANUFACTURING 78 $1,651,732

453

T-729: Mozilla Code Installation Through Holding Down Enter | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Mozilla Code Installation Through Holding Down Enter 9: Mozilla Code Installation Through Holding Down Enter T-729: Mozilla Code Installation Through Holding Down Enter September 29, 2011 - 8:30am Addthis PROBLEM: Mozilla Code Installation Through Holding Down Enter. PLATFORM: Versions prior to the following are vulnerable: Firefox 7.0 Firefox 3.6.23 Thunderbird 7.0 SeaMonkey 2.4 ABSTRACT: Attackers can exploit this issue by enticing an unsuspecting victim into viewing and interacting with a malicious Web page. An attacker may be able to exploit this issue to bypass a confirmation dialog and install an arbitrary add-on. This may aid in further attacks. reference LINKS: Mozilla Foundation Security Advisory 2011-40 Firefox Security Advisories CVE-2011-2372 CVE-2011-3001 IMPACT ASSESSMENT: High Discussion: If a user holds down the Enter key--as part of a game or test, perhaps--a

454

LDPC codes from Singer cycles  

Science Conference Proceedings (OSTI)

The main goal of coding theory is to devise efficient systems to exploit the full capacity of a communication channel, thus achieving an arbitrarily small error probability. Low Density Parity Check (LDPC) codes are a family of block codes-characterised ... Keywords: LDPC Codes, Projective spaces, Singer cycles

Luca Giuzzi; Angelo Sonnino

2009-04-01T23:59:59.000Z

455

Thermodynamics Software/Codes - TMS  

Science Conference Proceedings (OSTI)

FORUMS > THERMODYNAMICS SOFTWARE/CODES, Replies, Views, Originator ... Thermodynamic calculations in multicomponent systems, 0, 1887, Cathy ...

456

Executive Order 13212 - Actions To Expedite Energy-Related Projects:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13212 - Actions To Expedite Energy-Related Executive Order 13212 - Actions To Expedite Energy-Related Projects: Federal Register Notice Volume 66, No. 99 - May 18, 2001 Executive Order 13212 - Actions To Expedite Energy-Related Projects: Federal Register Notice Volume 66, No. 99 - May 18, 2001 The increased production and transmission of energy in a safe and environmentally sound manner is essential to the well-being of the American people. In general, it is the policy of this Administration that executive departments and agencies (agencies) shall take appropriate actions, to the extent consistent with applicable law, to expedite projects that will increase the production, transmission, or conservation of energy. Executive Order 13212: 66 FR 28357 (22 May 2001) More Documents & Publications

457

African American Federal Executive Association, Inc. 9th Annual Training  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

African American Federal Executive Association, Inc. 9th Annual African American Federal Executive Association, Inc. 9th Annual Training Workshop African American Federal Executive Association, Inc. 9th Annual Training Workshop September 16, 2013 9:00AM EDT to September 17, 2013 5:00PM EDT Washington, DC The African American Federal Executive Association, Inc. (AAFEA) will hold its 9th Annual Training Workshop (TW) September 16-17, 2013 in Washington, DC. The theme of this year's TW is "LEADING CHANGE." This training is focused on the programs, policies, practices, and processes that promote career-enhancing opportunities and the core subjects critical for becoming a member of the Senior Executive Service (SES). This TW qualifies as training in compliance with 5 U.S.C. chapter 41, and is open to GS-13/14/15 Federal employees and SES members. It will provide

458

Office of Executive Resources (HC-40) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Resources (HC-40) Executive Resources (HC-40) Office of Executive Resources (HC-40) Mission and Function Statement This organization provides a full range of human capital management workforce services and support as well as policy guidance functions to senior level positions (SES, SL, and ST), excepted service positions (EJ, EK, and ARPA-E ET/ER) and political appointments for the Department. This includes: Providing operational and advisory executive services to Headquarters and field components, including political appointees and the immediate Office of the Secretary. Providing operational support to the Department's Executive Resources and Performance Review Boards. Administering the SES and SL/ST performance management systems and recognition and awards programs. Managing the SES Candidate Development Program.

459

Executive Orders Defining Tribal Relationships | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Order 13592 Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011). Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN Education to establish educational goals across the government. Executive Order 13096 American Indian and Alaska Education (1998). Directs federal agencies to improve the academic performance of American Indian and Alaska Native students via six goals: (1) improving reading and mathematics (2) increasing high school completion

460

DOE Announces New Executive Director of Loan Guarantee Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Director of Loan Guarantee Program Executive Director of Loan Guarantee Program DOE Announces New Executive Director of Loan Guarantee Program November 10, 2009 - 12:00am Addthis Washington D.C. --- Underscoring his commitment to strengthen and streamline the Department of Energy's operations, Secretary Steven Chu today named Jonathan Silver Executive Director of the Department's loan program office. In this role, Silver will oversee the Department's Loan Guarantee Program as well as the Advanced Technology Vehicles Manufacturing (ATVM) loan program. Silver will report directly to Secretary Chu, helping accelerate the application review process for both programs. As Executive Director, Silver will be responsible for staffing the programs and leading origination, analysis, and negotiation, as well as managing the full range of the

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Washington | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Washington Washington Last updated on 2013-11-05 Current News The Washington State Building Code Council recently completed deliberations on adoption and amendment of the 2012 codes. This includes adoption of the 2012 IECC with state amendments. The new codes became effective July 1, 2013. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information WA 2012 Nonresidential Codes Approved Compliance Tools Nonresidential Energy Code Compliance Tools Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2010 Effective Date 07/01/2013 Adoption Date 02/01/2013 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes Washington DOE Determination Letter, May 31, 2013 Washington State Certification of Commercial and Residential Building Energy Codes

462

Alabama | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Adoption » Status of State Energy Code Adoption Adoption » Status of State Energy Code Adoption Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Alabama Last updated on 2013-05-31 Current News The Alabama Energy and Residential Codes Board adopted the 2009 International Energy Conservation Code (IECC) for Commercial Buildings and the 2009 International Residential Code (IRC) for Residential Construction. The new codes will become effective on October 1, 2012. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in Alabama (BECP Report, Sept. 2009)

463

The Woodland Carbon Code  

E-Print Network (OSTI)

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

464

EXECUTIVE OFFICE OF THE PRESIDENT O  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

M M A N A G E M E N T A N D B U D G E T W AS H I N G T O N , D . C . 2 0 5 0 3 O F F I C E O F F E D E R A L P R O C U R E M E N T P O L I C Y September 29, 2011 MEMORANDUM FOR CHIEF ACQUISTION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Daniel I. Gordon Administrator SUBJECT: Development, Review and Approval of Business Cases for Certain Interagency and Agency-Specific Acquisitions It is critical that the Federal Government, in its procurement activity, leverage its buying power to the maximum extent as well as achieve administrative efficiencies and cost savings. Too often, however, agencies establish new overlapping and duplicative contracts for supplies or services, because the agencies have not adequately considered the suitability of existing interagency contract vehicles: government-wide acquisition contracts (GWACs), multi-agency

465

Coded modulation in the block-fading channel: coding theorems and code construction  

Science Conference Proceedings (OSTI)

We consider coded modulation schemes for the block-fading channel. In the setting where a codeword spans a finite number N of fading degrees of freedom, we show that coded modulations of rate R bit per complex dimension, over a finite signal set ??C ... Keywords: Block-fading channels, bit-interleaved coded modulation, concatenated codes, distance spectrum, diversity, iterative decoding, maximum distance-separable (MDS) codes, maximum-likelihood (ML) decoding, outage probability

A. Guillen i Fabregas; G. Caire

2006-01-01T23:59:59.000Z

466

Energy-Effectiveness of Pre-Execution and Energy-Aware P-Thread Selection  

Science Conference Proceedings (OSTI)

Pre-execution removes the microarchitectural latency of "problem" loads from a programýs critical path by redundantly executing copies of their computations in parallel with the main program. There have been several proposed pre-execution systems, ...

Vlad Petric; Amir Roth

2005-06-01T23:59:59.000Z

467

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

468

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code April 25, 2011 - 7:00am Addthis PROBLEM: A vulnerability was reported in Adobe Acrobat and Adobe Reader. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems ABSTRACT: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run

469

Nebraska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Nebraska Nebraska Last updated on 2013-11-04 Current News Nebraska Legislature adopted the 2009 IECC/ASHRAE 90.1-2007. The code became effective August 27, 2011. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Cities and counties may adopt codes that differ from the Nebraska Energy Code; however, state law requires the adopted code to be equivalent to the Nebraska Energy Code. For existing buildings, only those renovations that will cost more than 50 percent of the replacement cost of the building must comply with the code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Nebraska (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

470

Summary | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Summary The impact of energy codes on our future is apparent. From environmental and resource conservation to national security, energy concerns, and our economic challenges, energy codes will continue to be a key component of a sound public policy. For further information on building energy code adoption, compliance, and enforcement, review the ACE toolkits Adoption Compliance Enforcement Popular Links ACE Learning Series ACE Overview Top 10 Reasons for Energy Codes Development of Energy Codes Adoption of Energy Codes Compliance with Energy Codes Enforcement of Energy Codes Going Beyond Code Summary Acronyms and Abbreviations Toolkit Definitions Adoption Toolkit Compliance Toolkit Enforcement Toolkit Contacts Web Site Policies U.S. Department of Energy USA.gov Last Updated: Thursday, January 31, 2013 - 15:19

471

Florida | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Florida Florida Last updated on 2013-11-18 Current News The triennial code change process is currently underway. Florida expects to be equivalent to ASHRAE 90.1-10 and IECC 2012 by early 2014. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information N/A Approved Compliance Tools Can use State specific EnergyGauge Summit FlaCom State Specific Research Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/15/2012 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Florida DOE Determination Letter, May 31, 2013 Florida State Certification of Commercial Building Codes Current Code State Specific Amendments / Additional State Code Information Florida Building Code

472

Coded modulation with Low Density Parity Check codes  

E-Print Network (OSTI)

This thesis proposes the design of Low Density Parity Check (LDPC) codes for cases where coded modulation is used. We design these codes by extending the idea of Density Evolution (DE) that has been introduced as a powerful tool to analyze LDPC codes. We first discuss methods by which we can design these codes for higher order constellations like 8 Phase Shift Keying (PSK) and 16 Quadrature Amplitude Modulation (QAM). We present simulation results that are within 0.22 dB and 0.4 dB within the constrained capacity of 8 PSK and 16 QAM constellations respectively in an Additive White Gaussian Noise (AWGN) channel. In the second part, we investigate serial concatenation of LDPC codes and minimum shift keying (MSK) with iterative decoding. We show that the design of LDPC codes is crucially dependent on the realization of the MSK modulator. For MSK modulators with non-recursive continuous phase encoders (CPEs), optimal codes for BPSK are optimal whereas for MSK modulators with recursive CPEs the BPSK codes are not optimal. We show that for non-recursive CPEs, iterative demodulation and decoding is not required even though the CPE has memory. However, iterative demodulation is essential for recursive CPEs. For recursive CPEs, we design LDPC codes using density evolution and differential evolution by looking at the graph structure of the CPE and considering message passing between both these codes. The resulting codes provide significantly improved performance over the existing codes.

Narayanaswami, Ravi

2001-01-01T23:59:59.000Z

473

Laser ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refi  

NLE Websites -- All DOE Office Websites (Extended Search)

ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refinement ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refinement hydrocode This article has been downloaded from IOPscience. Please scroll down to see the full text article. 2010 J. Phys.: Conf. Ser. 244 032022 (http://iopscience.iop.org/1742-6596/244/3/032022) Download details: IP Address: 50.136.219.251 The article was downloaded on 18/04/2013 at 01:39 Please note that terms and conditions apply. View the table of contents for this issue, or go to the journal homepage for more Home Search Collections Journals About Contact us My IOPscience Laser Ray Tracing in a Parallel Arbitrary Lagrangian-Eulerian Adaptive Mesh Refinement Hydrocode N D Masters 1 , T B Kaiser 1 , R W Anderson 1 , D C Eder 1 , A C Fisher 1 , A E Koniges 2 1 Lawrence Livermore National Laboratory, Livermore, CA U.S.A. 2 National

474

Generating Minimally Coupled Einstein-Scalar Field Solutions from Vacuum Solutions with Arbitrary Cosmological Constant  

E-Print Network (OSTI)

This paper generalizes two previously known techniques for generating minimally coupled Einstein-scalar field solutions in 4 dimensions; the Buchdahl and Fonarev transformations. By applying this solution generation technique, minimally coupled Einstein-scalar field solutions can be generated from vacuum solutions with arbitrary cosmological constant in arbitrary dimension. The only requirement to a seed solution is that it posesses a hypersurface-orthogonal Killing vector field. The generalization that allows us to use seed solutions with arbitrary cosmological constant uncovers a new class of Einstein-scalar field solutions that has previously not been studied. We apply the new solution transformation to the (A)dS4 vacuum solution. Transforming the resulting Einstein-scalar field solution to the conformal frame, a two-parameter family of spatially finite, expanding and accelerating cosmological solutions are found that are conformally isometric to the Einstein static universe RxS^3. We study null geodesics and find that for any observer, the solution has a cosmological horizon at an angular distance of pi/2 away from the observer. We find that a subset of these solutions can be naturally interpreted as expanding cosmologies in which a scalar black hole is formed at late times. The conformally coupled scalar field satisfies the weak energy condition as long as the energy density is positive, while the strong energy condition is generally violated.

Kjell Tangen

2007-05-30T23:59:59.000Z

475

Executive Order 13423- Strengthening Federal Environmental, Energy, and  

NLE Websites -- All DOE Office Websites (Extended Search)

423- Strengthening Federal Environmental, 423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy-related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner. Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management More Documents & Publications Executive Order 13514-Federal Leadership in Environmental, Energy, and Economic Performance EPAct 2005. Conference Report, July 27, 2005 In the Senate of the United States,June 28, 2005.

476

Executive Order 13175: Consultation and Coordination with Indian Tribal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

175: Consultation and Coordination with Indian 175: Consultation and Coordination with Indian Tribal Governments (2000) Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000) Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000). Establishes standards for regular and meaningful consultation with Tribal officials to strengthen the government-to-government relationships with Indian tribes, including establishment of fundamental principles, policymaking criteria, special requirements of legislative proposals, consultation, accountability principles, and increasing flexibility for Indian Tribal Waivers. EO 13175 supersedes EO 13084. Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000) More Documents & Publications

477

Erasure Techniques in MRD codes  

E-Print Network (OSTI)

This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

2012-05-03T23:59:59.000Z

478

Compliance with Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance with Energy Codes Compliance with Energy Codes Energy code compliance must be achieved to realize the considerable benefits inherent in energy codes. BECP supports successful compliance by making no-cost compliance tools, REScheck(tm) and COMcheck(tm), and other resources widely available to everyone. BECP has also developed several resources to help states uniformly assess the rate of compliance with their energy codes for residential and commercial buildings. It is important to note that regardless of the level of enforcement, as a law the building owner/developer is ultimately responsible to comply with the energy code. Compliance will be increased if the adopting agency prepares the building construction community to comply with the energy code and provides resources to code officials to enforce it.

479

Building Energy Codes 101: An Introduction | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101: An Introduction Codes 101: An Introduction In order to provide a basic introduction to the varied and complex issues associated with building energy codes, the U.S. Department of Energy's Building Energy Codes Program, with valued assistance from the International Codes Council and ASHRAE, has prepared Building Energy Codes 101: An Introduction. This guide is designed to speak to a broad audience with an interest in building energy efficiency, including state energy officials, architects, engineers, designers, and members of the public. Publication Date: Wednesday, February 17, 2010 BECP_Building Energy Codes 101_February2010_v00.pdf Document Details Last Name: Britt Initials: M Affiliation: PNNL Document Number: PNNL-70586 Focus: Adoption Code Development Compliance Building Type:

480

Building Energy Codes Resource Guide: Code Officials Edition  

NLE Websites -- All DOE Office Websites (Extended Search)

in it FOR ME? DOE's Building Energy Codes Program (www.energycodes.gov) and ICC (www.iccsafe.org) offer many resources for commercial code of cials. Examples in this section...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Methane Hydrates Code Comparison  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Comparison Code Comparison Set-up for Problem 7 (Long-term simulations for Mt Elbert and PBU L- Pad "Like" Deposits) As discussed in the phone conference held on 11/9/2007, it is proposed that Problem 7 be made up of three separate cases: Problem 7a will look at a deposit similar to the Mt Elbert site. Problem 7b will be based on the PBU L-Pad site, and Problem 7c will be a down-dip version of the L-Pad site. In all three cases, a standard set of parameters will be used based on those found in Problem 6 (the history matches to the MDT data). The parameters chosen were consensus values based on the experiences of the various groups in attempting to match the MDT data for the C2 formation at Mount Elbert. Given below are the detailed descriptions of the three problems and the proposed

482

Status of MARS Code  

SciTech Connect

Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

N.V. Mokhov

2003-04-09T23:59:59.000Z

483

Codes and Standards Tech Team (CSTT) Purpose & Operation  

NLE Websites -- All DOE Office Websites (Extended Search)

FreedomCAR and Fuel Partnership FreedomCAR and Fuel Partnership Codes and Standards Tech Team (CSTT) Overview & Introduction CSTT Purpose & Operation C&S Roadmap & Fuel Purity Brad Smith, Shell Hydrogen - CSTT co-lead April 26, 2004 Members FreedomCAR and Fuel Partnership ChevronTexaco EXONMobil ConocoPhillips w/ National Labs Organization Executive Steering Group OEM & Energy R&D VPs DOE-EE Asst Sec Fuel Cell & Vehicle Tech Teams OEM Tech Experts DOE Tech Experts Fuel Operations Group Energy Directors DOE Program Managers Fuel Tech Teams Energy Tech Experts DOE Tech Experts FreedomCAR Operations Group OEM Directors DOE Program Managers Hydrogen Storage Tech Team OEM & Energy & DOE Tech Experts Codes & Standards Tech Team OEM & Energy & DOE

484

MELCOR computer code manuals  

Science Conference Proceedings (OSTI)

MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

1995-03-01T23:59:59.000Z

485