National Library of Energy BETA

Sample records for arbitrary code execution

  1. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  2. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - ...

  3. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  4. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  5. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  6. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  7. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  8. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  9. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  10. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  11. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  12. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  13. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  14. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  15. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  16. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  19. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  20. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  1. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  2. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  3. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  4. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  10. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  11. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  12. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  13. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  14. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  15. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  16. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  17. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  18. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  19. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  20. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  1. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  2. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  5. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  6. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  7. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  8. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  9. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  10. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  12. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  13. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  14. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  15. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  16. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  17. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  18. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  19. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  20. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  1. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  2. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  3. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution...

  4. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  5. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  6. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  7. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  8. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  9. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  10. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  11. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  12. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  13. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  14. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  15. How Effective is SIMD in Case of Divergent Code Execution?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    How Effective is SIMD in Case of Divergent Code Execution? BoF: Exploiting SIMD-Parallelism - Today & Tomorrow wende@zib.de ISC 2015, BoF: Exploiting SIMD-Parallelism - Today & Tomorrow (Divergent Code Execution) 1/4 Divergences within SIMD loops Caused by, e.g.,  branching: if-elseif-...-else How to address?  vector masking [ + control logic ]  code restructuring, e.g., loop permutation for nested loops false wende@zib.de ISC 2015, BoF: Exploiting SIMD-Parallelism - Today &

  16. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  17. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R.; Bartholomew, David B.; Johnson, Monte L.

    2007-09-25

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  18. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  19. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  20. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  1. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  2. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  3. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  4. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  5. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  6. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  7. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  8. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  9. The role of the PIRT process in identifying code improvements and executing code development

    SciTech Connect (OSTI)

    Wilson, G.E.; Boyack, B.E.

    1997-07-01

    In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

  10. Code System to Perform Monte Carlo Simulation of Electron Gamma-Ray Showers in Arbitrary Marerials.

    Energy Science and Technology Software Center (OSTI)

    2002-10-15

    Version 00 PENELOPE performs Monte Carlo simulation of electron-photon showers in arbitrary materials. Initially, it was devised to simulate the PENetration and Energy LOss of Positrons and Electrons in matter; photons were introduced later. The adopted scattering model gives a reliable description of radiation transport in the energy range from a few hundred eV to about 1GeV. PENELOPE generates random electron-photon showers in complex material structures consisting of any number of distinct homogeneous regions (bodies)more » with different compositions. The Penelope Forum list archives and other information can be accessed at http://www.nea.fr/lists/penelope.html. PENELOPE-MPI extends capabilities of PENELOPE-2001 (RSICC C00682MNYCP02; NEA-1525/05) by providing for usage of MPI type parallel drivers and extends the original version's ability to read different types of input data sets such as voxel. The motivation is to increase efficiency of Monte Carlo simulations for medical applications. The physics of the calculations have not been changed, and the original description of PENELOPE-2001 (which follows) is still valid. PENELOPE-2001 contains substantial changes and improvements to the previous versions 1996 and 2000. As for the physics, the model for electron/positron elastic scattering has been revised. Bremsstrahlung emission is now simulated using partial-wave data instead of analytical approximate formulae. Photoelectric absorption in K and L-shells is described from the corresponding partial cross sections. Fluorescence radiation from vacancies in K and L-shells is followed. Refinements were also introduced in electron/positron transport mechanics, mostly to account for energy dependence of the mean free paths for hard events. Simulation routines were re-programmed in a more structured way, and new example MAIN programs were written with a more flexible input and expanded output.« less

  11. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  12. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  13. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  14. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code in a user's browser session in context of an affected site. 2) Certain input ... code in a user's browser session in context of an affected site. 3) Certain input ...

  15. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  16. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  17. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-043: Perl Locale::Maketext Module 'compile()' Multiple Code Injection Vulnerabilities ... Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft ...

  18. Arbitrary Lagrangian Eulerian Adaptive Mesh Refinement

    Energy Science and Technology Software Center (OSTI)

    2009-09-29

    This is a simulation code involving an ALE (arbitrary Lagrangian-Eulerian) hydrocode with AMR (adaptive mesh refinement) and pluggable physics packages for material strength, heat conduction, radiation diffusion, and laser ray tracing developed a LLNL, UCSD, and Berkeley Lab. The code is an extension of the open source SAMRAI (Structured Adaptive Mesh Refinement Application Interface) code/library. The code can be used in laser facilities such as the National Ignition Facility. The code is alsi being appliedmore » to slurry flow (landslides).« less

  19. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Positions Our executive corps is comprised of members of our Senior Executive Service and Pay Band V of the Excepted Service. Our executives use their extensive experience in scientific, engineering, program management or administrative leadership to make decisions that touch the lives of Americans every day. Senior Executive Service Other Executive Positions Learn More Senior Executive Service Other Executive Positions

    Executive Secretariat Executive Secretariat The Office of the

  20. SES Executive Development

    Broader source: Energy.gov [DOE]

    Development continues once an individual enters into the SES. Faced with constant challenges, changing technologies and a fluid environment, executives need to pursue ongoing professional executive development. It is crucial that executives continue to strengthen and reinforce their Executive Core Qualifications (ECQs), skills and knowledge. http://www.opm.gov/ses/executive_development/index.asp Federal agencies are required by law (Title 5, U.S. Code, Section 3396) to establish programs for the continuing development of senior executives. DOE’s Office of Learning & Workforce Development is available to assist you in determining a course of action your executive development. They have a guidebook that “contains descriptions of over 350 courses, offered by 56 colleges and universities throughout the continental United States as well as by the Office of Personnel Management.”

  1. Executive Summary: Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary - On the Path to SunShot Executive Summary - On the Path to SunShot The halfway mark of the SunShot Initiative's 2020 target date is a good time to take stock: How much progress has been made? What have we learned? What barriers and opportunities must still be addressed to ensure that solar technologies achieve cost parity in 2020 and realize their full potential in the decades beyond? To answer these questions, the Solar Energy Technology Office launched the On the Path to

  2. Executive Director

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Director Dave Lyons, Executive Director, leads institutional initiatives and provides oversight for numerous Laboratory organizations. Contact Operator Los Alamos National Laboratory (505) 667-5061 David C. Lyons Dave Lyons, Executive Director David C. Lyons became Los Alamos National Laboratory Executive Director in April 2016. He leads institutional initiatives and provides oversight for several Laboratory organizations, including Chief Financial Officer Chief Information Officer

  3. Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary September 2015 Quadrennial Technology Review ES Executive Summary ES Executive Summary Introduction The United States is in the midst of an energy revolution. Over the last decade, the United States has slashed net petroleum imports, dramatically increased shale gas production, scaled up wind and solar power, and cut the growth in electricity consumption to nearly zero through widespread efficiency measures. Emerging advanced energy technologies provide a rich set of options to

  4. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Order 13592 Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011). Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN

  5. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  6. EXECUTIVE SUMMARY

    National Nuclear Security Administration (NNSA)

    FUSION ENERGY SCIENCE ADVISORY COMMITTEE Panel on High Energy Density Laboratory Plasmas ADVANCING THE SCIENCE OF HIGH ENERGY DENSITY LABORATORY PLASMAS January 2009 UNITED STATES DEPARTMENT OF ENERGY 1 TABLE OF CONTENTS EXECUTIVE SUMMARY.......................................................................................... 5 1 HIGH ENERGY DENSITY LABORATORY PLASMA SCIENCE .................................... 15 2 THE CHARGE TO FESAC

  7. Compiling Codes on Cori

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  8. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  9. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  10. Senior Executive Service | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Senior Executive Service

  11. Sandia's Arbitrary Waveform MEMO Actuator

    Energy Science and Technology Software Center (OSTI)

    2003-08-07

    SAMA is a multichannel, arbitrary waveform generator program for driving microelectromechanical systems (MEMS). It allows the user to piece together twelve available wave parts, thereby permitting the user to create practically any waveform, or upload a previously constructed signal. The waveforms (bundled together as a signal) may simultaneously be output through four different channels to actuate MEMS devices, and the number of output channels may be increased depending on the DAQ card or instrument utilized.more » Additionally, real-time changes may be made to the frequency and amplitude. The signal may be paused temporarily. The waveform may be saved to file for future uploading. Recent work for this version has focused on modifications that will allow loading previously generated arbitrary waveforms, independent channel waveform amplification, adding a pause function, separating the "modify waveform: and "end program" functions, and simplifying the user interface by adding test blocks with statements to help the user program and output the desired signals. The program was developed in an effort to alleviate some of the limitations of Micro Driver. For example, Micro Driver will not allow the user to select a segment of a sine wave, but rather the user is limited to choosing either a whole or half sine wave pattern. It therefore becomes quite difficult ot construct partial sine wave patterns out of a "ramp" waveparts for several reasons. First, one must determine on paper how many data points each ramp will cover, and what the slopes of these ramps will be. Second, from what was observed, Micro Driver has difficulty processing more than six distinct waveparts during sequencing. The program will allow the user to input the various waves into the desired sequence; however, it will not allow the user to compile them (by clicking "ok" and returning to the main screen). Third, should the user decide that they want to increase the amplitute of the output signal

  12. An Arbitrary Precision Computation Package

    Energy Science and Technology Software Center (OSTI)

    2003-06-14

    This package permits a scientist to perform computations using an arbitrarily high level of numeric precision (the equivalent of hundreds or even thousands of digits), by making only minor changes to conventional C++ or Fortran-90 soruce code. This software takes advantage of certain properties of IEEE floating-point arithmetic, together with advanced numeric algorithms, custom data types and operator overloading. Also included in this package is the "Experimental Mathematician's Toolkit", which incorporates many of these facilitiesmore » into an easy-to-use interactive program.« less

  13. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  14. Implementing Executive Order 13423

    Broader source: Energy.gov [DOE]

    Guide describes the instructions on the requirements and how fleets should implement the Executive Order 13423.

  15. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  16. V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am...

  17. Sample Project Execution Plan

    Office of Energy Efficiency and Renewable Energy (EERE)

    The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects.  The plan serves as the main communication vehicle to ensure that...

  18. Writing Effective Executive Accomplishment Narratives Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    you overcame * Use first person, past tense and non-jargon terms; PRB members may not ... it is an executive who: o Demonstrates the high level of performance expected and actions ...

  19. Tabled Execution in Scheme

    SciTech Connect (OSTI)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  20. Shared prefetching to reduce execution skew in multi-threaded...

    Office of Scientific and Technical Information (OSTI)

    of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code ...

  1. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  2. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  3. LTS Execution - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Execution About Us Hanford Cultural Resources LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets / Briefings LTS In The News LTS Related Links LTS Contact Us LTS Execution Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size The Hanford LTS Program is described in the Hanford LTS Program Plan and includes two distinct elements: Transition process is a disciplined process that is used

  4. CBECS 1995 - Executive Summary

    U.S. Energy Information Administration (EIA) Indexed Site

    Executive Summary The Commercial Buildings Energy Consumption Survey (CBECS) collects information on physical characteristics of commercial buildings, building use and occupancy...

  5. Efficient isoparametric integration over arbitrary space-filling...

    Office of Scientific and Technical Information (OSTI)

    Efficient isoparametric integration over arbitrary space-filling Voronoi polyhedra for electronic structure calculations Prev Next Title: Efficient isoparametric integration ...

  6. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  7. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  8. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  9. Executive Branch Management Scorecard | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Branch Management Scorecard Executive Branch Management Scorecard PDF icon Executive Branch Management Scorecard More Documents & Publications Executive Branch Management Scorecard ...

  10. Executive Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Services » Executive Resources Executive Resources Executive Resources provides integrated executive policy and operational personnel support services in a centralized location to the Senior Executive Service (SES), Senior-Level (SL), Scientific and Professional (ST), Excepted Service and political appointees. Click the "Contacts" Link to find a list of HR Specialist by the organizations they service. HR Contacts The Senior Executive Service (SES) Excepted Service Authorities

  11. Budget Formulation & Execution

    Broader source: Energy.gov [DOE]

    The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as...

  12. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  13. Data processing with microcode designed with source coding

    DOE Patents [OSTI]

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  14. Executive Order 13423 Implementing Instructions

    Broader source: Energy.gov [DOE]

    INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423“Strengthening Federal Environmental, Energy, and Transportation Management”

  15. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  16. Shared prefetching to reduce execution skew in multi-threaded systems

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  17. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  18. Executive Energy Leadership Academy Alumni

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee Meeting Executive Committee Meeting September 7, 2016 6:00PM to 7:30PM EDT The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open

    Executive Energy Leadership Academy Alumni Since its inception in 2007, decision-makers throughout the country have participated in NREL's Executive Energy Leadership Academy. The following is a list of alumni sorted by program and year. Leadership Program 2015 Participants * Samuel Anderson, Colorado Department of

  19. Tandem Mirror Reactor Systems Code (Version I)

    SciTech Connect (OSTI)

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  20. Post-Fabrication Placement of Arbitrary Chemical Functionality...

    Office of Scientific and Technical Information (OSTI)

    Post-Fabrication Placement of Arbitrary Chemical Functionality on Microphase-Separated Thin Films of Amine-Reactive Block Copolymers Citation Details In-Document Search Title: ...

  1. Mode coupling evolution in arbitrary inflationary backgrounds

    SciTech Connect (OSTI)

    Bernardeau, Francis

    2011-02-01

    The evolution of high order correlation functions of a test scalar field in arbitrary inflationary backgrounds is computed. Whenever possible, exact results are derived from quantum field theory calculations. Taking advantage of the fact that such calculations can be mapped, for super-horizon scales, into those of a classical system, we express the expected correlation functions in terms of classical quantities, power spectra, Green functions, that can be easily computed in the long-wavelength limit. Explicit results are presented that extend those already known for a de Sitter background. In particular the expressions of the late time amplitude of bispectrum and trispectrum, as well as the whole high-order correlation structure, are given in terms of the expansion factor behavior. When compared to the case of a de Sitter background, power law inflation and chaotic inflation induced by a massive field are found to induce high order correlation functions the amplitudes of which are amplified by almost one order of magnitude. These results indicate that the dependence of the related non-Gaussian parameters — such as f{sub NL} — on the wave-modes is at percent level.

  2. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  3. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically provide the necessary MPI include files and libraries. For Fortran source code use mpif90: % mpif90 -o example.x example.f90 For C source code use...

  4. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  5. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  6. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  7. U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders

    Broader source: Energy.gov [DOE]

    Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update.

  8. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  9. STEP Participant Survey Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive S ummary 1 Executive S ummary 2 Executive Summary of Findings July 26th, 2013 Prepared by Jeff Henn Executive S ummary 3 Background information on Baltimore Research Founded in 1960, Baltimore Research is a 53-year old, full service marketing research firm and focus facility located in Towson, MD. We provide research consultation, research design, data collection, analysis, field management, and recruiting and focus facilities. The company offers both qualitative and quantitative

  10. NUG Executive Committee (NUGEX)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconferences and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There

  11. Integrating Program Component Executables

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integrating Program Component Executables on Distributed Memory Architectures via MPH Chris Ding and Yun He Computational Research Division, Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720, USA chqding@lbl.gov, yhe@lbl.gov Abstract A growing trend in developing large and complex ap- plications on today's Teraflop computers is to integrate stand-alone and/or semi-independent program components into a comprehensive simulation package. One example is the climate

  12. Office of the Executive Secretariat

    Energy Savers [EERE]

    the Executive Secretariat, MA-70 Acting Director Carol A. Matthews Special Projects Security Policy and Analysis Group Programmatic Expertise High-level Review and Analysis Correspondence Management Group Correspondence Control & Assignment Correspondence Support FOIA Management Special Projects Receiving and Delivery Administration and Executive Commitments Group eDOCS Executive Commitments Information Management Budget Personnel Administration Office of History and Heritage Resources

  13. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  14. Executive Order 13423: Strengthening Federal Environmental, Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423: Strengthening Federal Environmental, Energy, and ...

  15. National Ignition Facility project execution plan

    SciTech Connect (OSTI)

    Paisner, J., LLNL

    1997-08-01

    This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

  16. Single-Species Aerosol Coagulation and Deposition with Arbitrary Size Resolution.

    Energy Science and Technology Software Center (OSTI)

    2012-07-31

    Version 00 SAEROSA solves the dynamic aerosol coagulation and deposition problem with arbitrary computational precision under a variety of conditions. The code includes numerous user-selectable coagulation kernels, alone or in combinations, and permits an arbitrary initial size distribution. Many parameter combinations and what-if scenarios under user control are possible. The output gives the particle size distribution suspended in the carrier fluid initially and after the desired aerosol aging time in terms of both differential andmore » integral aerosol volume concentrations. An auxiliary routine designed for the Mac OSX environment provides plotting capability. The output can be further processed by e.g., spreadsheets. The code has been benchmarked against three computer models, including MAEROS, and analytical models with excellent agreement. The test cases also included scenarios where previously published computational coagulation models lack capabilities or exhibit numerical instabilities. These included narrow, delta function, and non-lognormal initial size distributions, and further conditions, such as the presence of simultaneous coagulation mechanisms, including electrostatic effects, spanning multiple flow-regimes.« less

  17. Writing Effective Executive Accomplishment Narratives Executive Accomplishment Narrative (EAN)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Accomplishment Narratives Executive Accomplishment Narrative (EAN) At the end of the performance cycle, all career and limited term SES members who have been on a performance plan for a minimum of 90 days must provide an EAN that highlights the results achieved as it relates to the performance requirements and organizational results in ePerformance. While the completion of an Executive Accomplishment Narrative is optional for non-career SES members, it is strongly recommended. This

  18. South Dakota PrairieWinds Project Executive Summary Executive Summary

    Office of Environmental Management (EM)

    PrairieWinds Project Executive Summary Executive Summary This executive summary is included in the beginning of the Draft Environmental Impact Statement (DEIS) for the South Dakota PrairieWinds Project (Proposed Project) and is also intended to serve as a stand-alone document to provide a summary of the information contained within the full text version of the DEIS. For additional information on the topics contained within this summary please see the DEIS. S.1 INTRODUCTION Basin Electric Power

  19. Executive Secretariat | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Secretariat Executive Secretariat The Office of the Executive Secretariat manages the Department's top-level written communications, such as letters, information, action, and decision memos, and Congressional Reports. These form a key component of the Department's interaction with the White House, Congress, other governmental agencies, and the public. Every communication that leaves DOE is an opportunity to promote this Department's and this Administration's strategic mission. Items

  20. About the Senior Executive Service

    Broader source: Energy.gov [DOE]

    The Senior Executive Service (SES) was established by Title IV of the Civil Service Reform Act (CSRA) of 1978 [P.L. 95-454, October 13, 1978] and became effective on July 13, 1979. The CSRA envisioned a Senior Executive Service whose members shared values, a broad perspective of Government, and solid executive skills. Members of a “corporate SES” respected and embraced the dynamics of American democracy - an approach to governance that provided a continuing vehicle for change.

  1. Boise State University: Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary With record growth in the wind energy industry and the increasing discussion of ... but also to educate our younger population about the benefits and utility of ...

  2. Risk Code?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Identify the Task Risk Code >2 Determine if a Work Control Document is needed What is the Unmitigated Risk Code? Rev.1 09/05/14 Read and Agree to Comply with appropriate mitigation and sign Work Control Documents Is there an approved Work Control Document (WCD)? WORK PLANNING, CONTROL AND AUTHORIZATION FLOW DIAGRAM 1. Define Scope of Work 2. Analyze Hazards 3. Develop and Implement Hazard Controls 4. Perform Work Within Controls 5. Feedback and Continuous Improvement Analyze Hazards and

  3. The Integrated TIGER Series Codes

    Energy Science and Technology Software Center (OSTI)

    2006-01-15

    ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with anmore » input scheme based on order-independent descriptive keywords that makes maximum use of defaults and intemal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2) multigroup codes with adjoint transport capabilities, (3) parallel implementations of all ITS codes, (4) a general purpose geometry engine for linking with CAD or other geometry formats, and (5) the Cholla facet geometry library. Moreover, the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.« less

  4. Executive Summary | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary Executive Summary How clean energy investments can be used to spur local economic development. Spurring Local Economic Development with Clean Energy Investments: Lessons from the Field (683.52 KB) More Documents & Publications Spurring Local Economic Development with Clean Energy Investments spurring_local_economic_development_clean_energy_programs.doc Pennsylvania Recovery Act State Memo

  5. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  6. Executive Order 13673 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    673 Executive Order 13673 Executive Order 13673, proposed Federal Acquisition Regulation rule, and proposed Department of Labor guidance are available at: Executive Order 13673 Proposed Federal Acquisition Regulation Rule Proposed Department of Labor Guidance Informational slides about the Executive Order are available below: Executive Order 13673 (176.38 KB)

  7. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High Performance Computing. The default compiler suite is from the Portland Group which is loaded by default at login, along with the PGI compiled Open MPI environment. % module list Currently Loaded Modulefiles: 1) pgi/10.8 2) openmpi/1.4.2 Basic Example Open MPI provides a convenient set of wrapper commands which you should use in

  8. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  9. WENO schemes on arbitrary unstructured meshes for laminar, transitional and turbulent flows

    SciTech Connect (OSTI)

    Tsoutsanis, Panagiotis, E-mail: panagiotis.tsoutsanis@cranfield.ac.uk; Antoniadis, Antonios Foivos, E-mail: a.f.antoniadis@cranfield.ac.uk; Drikakis, Dimitris, E-mail: d.drikakis@cranfield.ac.uk

    2014-01-01

    This paper presents the development and implementation of weighted-essentially-non-oscillatory (WENO) schemes for viscous flows on arbitrary unstructured grids. WENO schemes up to fifth-order accurate have been implemented in conjunction with hybrid and non-hybrid unstructured grids. The schemes are investigated with reference to numerical and experimental results for the TaylorGreen vortex, as well as for laminar and turbulent flows around a sphere, and the turbulent shock-wave boundary layer interaction flow problem. The results show that the accuracy of the schemes depends on the arbitrariness of shape and orientation of the unstructured mesh elements, as well as the compactness of directional stencils. The WENO schemes provide a more accurate numerical framework compared to second-order and third-order total variation diminishing (TVD) methods, however, the fifth-order version of the schemes is computationally too expensive to make the schemes practically usable. On the other hand, the third-order variant offers an excellent numerical framework in terms of accuracy and computational cost compared to the fifth-order WENO and second-order TVD schemes. Parallelisation of the CFD code (henceforth labelled as UCNS3D), where the schemes have been implemented, shows that the present methods offer very good scalable performance.

  10. Arbitrary unitary transformations on optical states using a quantum memory

    SciTech Connect (OSTI)

    Campbell, Geoff T.; Pinel, Olivier; Hosseini, Mahdi; Buchler, Ben C.; Lam, Ping Koy

    2014-12-04

    We show that optical memories arranged along an optical path can perform arbitrary unitary transformations on frequency domain optical states. The protocol offers favourable scaling and can be used with any quantum memory that uses an off-resonant Raman transition to reversibly transfer optical information to an atomic spin coherence.

  11. Executive Committee meeting | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee meeting Executive Committee meeting February 3, 2016 6:00PM to 7:00PM EST The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open...

  12. Executive Committee Meeting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Committee Meeting Executive Committee Meeting September 7, 2016 6:00PM to 7:30PM EDT The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open

  13. Executive Order 12123 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2123 Executive Order 12123 Document covers the extracted pages of Executive Order 12123. PDF icon eo13123.pdf More Documents & Publications EO 13123-Greening the Government Through ...

  14. Implementation of Executive Order 12114 Environmental Effects...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline (DOE, 1981) Implementation of Executive Order 12114 Environmental ...

  15. Executive Energy Leadership Academy | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Energy Leadership Academy NREL's Executive Energy Leadership Academy provides non-technical business, governmental, and community leaders throughout the country an opportunity to learn about renewable energy and energy efficiency technologies, analytical tools, and financing to guide their organizations and communities in energy-related decisions and planning. A group of NREL Energy Execs gather around the bottom of a wind turbine with blue skies and fields in the foreground.

  16. Executive Summary | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary Executive Summary Introduction The United States is in the midst of an energy revolution. Over the last decade, the United States has slashed net petroleum imports, dramatically increased shale gas production, scaled up wind and solar power, and cut the growth in electricity consumption to nearly zero through widespread efficiency measures. Emerging advanced energy technologies provide a rich set of options to address our energy challenges, but their large-scale deployment

  17. NIF User Group Executive Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    executive board NIF User Group Executive Board Professor Don Lamb (Chair) University of Chicago Professor Farhat Beg (Vice Chair) University of California, San Diego Professor Justin Wark (Past Chair) University of Oxford Dr. Riccardo Betti University of Rochester Dr. Kirk Flippo Los Alamos National Laboratory Professor Gianluca Gregori University of Oxford Professor Michel Koenig École Polytechnique Dr. Chikang Li Massachusetts Institute of Technology Dr. Jena Meinecke Young Researcher:

  18. code release

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    code release - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  19. Adaptive reconnection-based arbitrary Lagrangian Eulerian method

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Bo, Wurigen; Shashkov, Mikhail

    2015-07-21

    We present a new adaptive Arbitrary Lagrangian Eulerian (ALE) method. This method is based on the reconnection-based ALE (ReALE) methodology of Refs. [35], [34] and [6]. The main elements in a standard ReALE method are: an explicit Lagrangian phase on an arbitrary polygonal (in 2D) mesh in which the solution and positions of grid nodes are updated; a rezoning phase in which a new grid is defined by changing the connectivity (using Voronoi tessellation) but not the number of cells; and a remapping phase in which the Lagrangian solution is transferred onto the new grid. Furthermore, in the standard ReALEmore » method, the rezoned mesh is smoothed by using one or several steps toward centroidal Voronoi tessellation, but it is not adapted to the solution in any way.« less

  20. Arbitrary waveform generator to improve laser diode driver performance

    DOE Patents [OSTI]

    Fulkerson, Jr, Edward Steven

    2015-11-03

    An arbitrary waveform generator modifies the input signal to a laser diode driver circuit in order to reduce the overshoot/undershoot and provide a "flat-top" signal to the laser diode driver circuit. The input signal is modified based on the original received signal and the feedback from the laser diode by measuring the actual current flowing in the laser diode after the original signal is applied to the laser diode.

  1. A compact, multichannel, and low noise arbitrary waveform generator

    SciTech Connect (OSTI)

    Govorkov, S.; Ivanov, B. I.; Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 ; Il'ichev, E.; Meyer, H.-G.

    2014-05-15

    A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

  2. 3D Multigroup Sn Neutron Transport Code

    Energy Science and Technology Software Center (OSTI)

    2001-02-14

    ATTILA is a 3D multigroup transport code with arbitrary order ansotropic scatter. The transport equation is solved in first order form using a tri-linear discontinuous spatial differencing on an arbitrary tetrahedral mesh. The overall solution technique is source iteration with DSA acceleration of the scattering source. Anisotropic boundary and internal sources may be entered in the form of spherical harmonics moments. Alpha and k eigenvalue problems are allowed, as well as fixed source problems. Forwardmore » and adjoint solutions are available. Reflective, vacumn, and source boundary conditions are available. ATTILA can perform charged particle transport calculations using slowing down (CSD) terms. ATTILA can also be used to peform infra-red steady-state calculations for radiative transfer purposes.« less

  3. DOE Executive Staffing and Recruitment | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Executive Staffing and Recruitment DOE Executive Staffing and Recruitment DOCUMENTS AVAILABLE FOR DOWNLOAD

  4. Business Development Executive (BDE) Program

    SciTech Connect (OSTI)

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  5. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    Georgia's Department of Community Affairs periodically reviews, amends and/or updates the state minimum standard codes. Georgia has "mandatory" and "permissive" codes. Georgia State Energy Code...

  7. A PVM Executive Program for Use with RELAP5-3D

    SciTech Connect (OSTI)

    Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

    2002-04-01

    A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

  8. GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries

    SciTech Connect (OSTI)

    Shalf, John; Goodale, Tom

    2004-02-01

    GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

  9. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    NOTE: On March 9, 2016, the State Fire Prevention and Building Code Council adopted major updates to the State Uniform Code and the State Energy Code. The State Energy Code has been updated to 2015...

  10. Identifying an experimental two-state Hamiltonian to arbitrary accuracy

    SciTech Connect (OSTI)

    Cole, Jared H.; Greentree, Andrew D.; Wellard, Cameron J.; Hollenberg, Lloyd C.L.; Schirmer, Sonia G.; Oi, Daniel K.L.

    2005-06-15

    Precision control of a quantum system requires accurate determination of the effective system Hamiltonian. We develop a method for estimating the Hamiltonian parameters for some unknown two-state system and providing uncertainty bounds on these parameters. This method requires only one measurement basis and the ability to initialize the system in some arbitrary state which is not an eigenstate of the Hamiltonian in question. The scaling of the uncertainty is studied for large numbers of measurements and found to be proportional to the reciprocal of the square root of the number of measurements.

  11. Quantitative phase retrieval with arbitrary pupil and illumination

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Claus, Rene A.; Naulleau, Patrick P.; Neureuther, Andrew R.; Waller, Laura

    2015-10-02

    We present a general algorithm for combining measurements taken under various illumination and imaging conditions to quantitatively extract the amplitude and phase of an object wave. The algorithm uses the weak object transfer function, which incorporates arbitrary pupil functions and partially coherent illumination. The approach is extended beyond the weak object regime using an iterative algorithm. Finally, we demonstrate the method on measurements of Extreme Ultraviolet Lithography (EUV) multilayer mask defects taken in an EUV zone plate microscope with both a standard zone plate lens and a zone plate implementing Zernike phase contrast.

  12. Consistent interaction vertices in arbitrary topological BF theories

    SciTech Connect (OSTI)

    Bizdadea, C.; Cioroianu, E. M.; Saliu, S. O.; Sararu, S. C.; Stanciu-Oprean, L.

    2013-11-13

    Here we extend the previous results from [12] to the computation of all consistent self-interactions for topological BF theories with maximal field spectra in D =5,6,7,8 and present some partial results on possible generalizations on a space-time of arbitrary dimension D. For convenience, the deformation of the solution to the master equation in the context of the BRST-antifield formalism is used as a general method of constructing consistent interacting gauge field theories together with most of the standard hypotheses on quantum field theories on Minkowski space-times.

  13. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It is the policy of ...

  14. Budget Formulation & Execution | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Budget Formulation & Execution Budget Formulation & Execution The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as the external liaison for the Department of Energy on matters related to its budget. Functions: Coordinate and manage the Department's budget formulation, presentation, and execution processes. Provide central administration of

  15. Code Seal v 1.0

    Energy Science and Technology Software Center (OSTI)

    2009-12-11

    CodeSeal is a Sandia National Laboratories developed technology that provides a means of securely obfuscating finite state machines in a mathematically provable way. The technology was developed in order to provide a solution for anti-reverse engineering, assured execution, and integrity of execution. CodeSeal accomplishes these goals with the addition of the concept of a trust anchor, a small piece of trust integrated into the system, to the model of code obfuscation. Code obfuscation is anmore » active area of academic research, but most findings have merely demonstrated that general obfuscation is impossible. By modifying the security model such that we may rely on the presence of a small, tamper-protected device, however, Sandia has developed an effective method for obfuscating code. An open publication describing the technology in more detail can be found at http://eprint.iacr.org/2008/184.pdf.Independent Software/Hardware monitors, Use control, Supervisory Control And Data Acquisition (SCADA), Algorithm obfuscation« less

  16. Carlsbad Area Office Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    June 1998 Carlsbad Area Office Executive Summary The mission of the Carlsbad Area Office (CAO) is to protect human health and the environment by opening and operating the Waste Isolation Pilot Plant (WIPP) for safe disposal of transuranic (TRU) waste and by establishing an effective system for management of TRU waste from generation to disposal. It includes personnel assigned to CAO, WIPP site operations, transportation, and other activities associated with the National TRU Program (NTP). The

  17. Executive Committee Member Roster | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Committee Member Roster Executive Committee Member Roster List of NNMCAB members that serve on the Executive Committee ExCom Roster - June 2016 (277.33 KB) More Documents & Publications Environmental Management and Remediation Committee Roster Waste Management Committee Member Roster NNMCAB Membership Roster

  18. Microsoft PowerPoint - Executive Order13423rbl | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Order13423rbl Microsoft PowerPoint - Executive Order13423rbl PDF icon Microsoft PowerPoint - Executive Order13423rbl More Documents & Publications OPAM Policy Acquisition ...

  19. FEMA - Executive Order11988 - Floodplain Management 1977 | Open...

    Open Energy Info (EERE)

    Order11988 - Floodplain Management 1977 Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Executive OrderExecutive Order: FEMA - Executive...

  20. Energy-Positive Water Resource Recovery Workshop Report Executive...

    Office of Environmental Management (EM)

    Report Executive Summary Energy-Positive Water Resource Recovery Workshop Report Executive Summary Executive summary workshop report for the for the Energy-Positive Water Resource ...

  1. Falcon: automated optimization method for arbitrary assessment criteria

    DOE Patents [OSTI]

    Yang, Tser-Yuan; Moses, Edward I.; Hartmann-Siantar, Christine

    2001-01-01

    FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

  2. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, Mark W.; George, William A.

    1986-01-01

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

  3. Conservative remapping and region overlays by intersecting arbitrary polyhedra

    SciTech Connect (OSTI)

    Grandy, J.

    1999-01-20

    An efficient algorithm for first-order grid intersections, by computing geometrically the intersection volume between donor and target zones, is developed for polyhedral meshes. The author examines two applications of grid intersections. One application is first-order remapping, in which zone and node centered fields defined on a given mesh are transferred to a different mesh. The second application is region overlays, in which a region with homogeneous material properties is approximated by a grid of polyhedra and mapped onto an arbitrary hexahedral mesh, creating mixed zones on the boundary of the region. He demonstrates the use of this grid intersection algorithm within the framework of hydrodynamics simulations, and using a domain decomposed mesh, he studies the feasibility of a parallel implementation.

  4. Agile high resolution arbitrary waveform generator with jitterless frequency stepping

    DOE Patents [OSTI]

    Reilly, Peter T. A.; Koizumi, Hideya

    2010-05-11

    Jitterless transition of the programmable clock waveform is generated employing a set of two coupled direct digital synthesis (DDS) circuits. The first phase accumulator in the first DDS circuit runs at least one cycle of a common reference clock for the DDS circuits ahead of the second phase accumulator in the second DDS circuit. As a phase transition through the beginning of a phase cycle is detected from the first phase accumulator, a first phase offset word and a second phase offset word for the first and second phase accumulators are calculated and loaded into the first and second DDS circuits. The programmable clock waveform is employed as a clock input for the RAM address controller. A well defined jitterless transition in frequency of the arbitrary waveform is provided which coincides with the beginning of the phase cycle of the DDS output signal from the second DDS circuit.

  5. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, M.W.; George, W.A.

    1986-12-16

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

  6. Laplace-Runge-Lenz vector for arbitrary spin

    SciTech Connect (OSTI)

    Nikitin, A. G.

    2013-12-15

    A countable set of superintegrable quantum mechanical systems is presented which admit the dynamical symmetry with respect to algebra so(4). This algebra is generated by the Laplace-Runge-Lenz vector generalized to the case of arbitrary spin. The presented systems describe neutral particles with non-trivial multipole momenta. Their spectra can be found algebraically like in the case of hydrogen atom. Solutions for the systems with spins 1/2 and 1 are presented explicitly, solutions for spin 3/2 can be expressed via solutions of an ordinary differential equation of first order. A more extended version of this paper including detailed calculations is published as an e-print arXiv:1308.4279.

  7. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-07-23

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  8. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Mississippi's existing state code is based on the 1977 Model Code for Energy Conservation (MCEC). The existing law does not mandate enforcement by localities, and any revised code will probably...

  9. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The State Building Code Council revised the Washington State Energy Code (WESC) in February 2013, effective July 1, 2013. The WESC is a state-developed code based upon ASHRAE 90.1-2010 and the...

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Kentucky Building Code (KBC) is updated every three years on a cycle one year behind the publication year for the International Building Code. Any changes to the code by the state of Kentucky...

  11. Office of Federal Procurement (OFPP) Determination of Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Procurement (OFPP) Determination of Executive Compensation Benchmark Amount for ... Office of Federal Procurement (OFPP) Determination of Executive Compensation Benchmark ...

  12. 11. CONTRACT ID CODE

    National Nuclear Security Administration (NNSA)

    79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY ...

  13. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Rhode Island Building Code Standards Committee adopts, promulgates and administers the state building code. Compliance is determined through the building permit and inspection process by local...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    The North Carolina State Building Code Council is responsible for developing all state codes. By statute, the Commissioner of Insurance has general supervision over the administration and...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    Public Act 093-0936 (Illinois Energy Conservation Code for Commercial Buildings) was signed into law in August, 2004. The Illinois Energy Conservation Code for Commercial Buildings became...

  17. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  18. Building Energy Codes: State and Local Code Implementation Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mark Lessans Fellow Building Energy Codes: State and Local Code Implementation Overview ... building code regarding energy efficiency to the revised model code and submit a ...

  19. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy Innovations New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in ...

  20. Code System to Calculate Particle Penetration Through Aerosol Transport Lines.

    Energy Science and Technology Software Center (OSTI)

    1999-07-14

    Version 00 Distribution is restricted to US Government Agencies and Their Contractors Only. DEPOSITION1.03 is an interactive software program which was developed for the design and analysis of aerosol transport lines. Models are presented for calculating aerosol particle penetration through straight tubes of arbitrary orientation, inlets, and elbows. An expression to calculate effective depositional velocities of particles on tube walls is derived. The concept of maximum penetration is introduced, which is the maximum possible penetrationmore » through a sampling line connecting any two points in a three-dimensional space. A procedure to predict optimum tube diameter for an existing transport line is developed. Note that there is a discrepancy in this package which includes the DEPOSITION 1.03 executable and the DEPOSITION 2.0 report. RSICC was unable to obtain other executables or reports.« less

  1. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow ...

  2. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  3. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The...

  4. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The...

  5. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  6. T-589: Citrix XenApp and Citrix Presentation Server Bug

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system.

  7. U-105:Oracle Java SE Critical Patch Update Advisory

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  8. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  9. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  10. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  11. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  12. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module ...

  13. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  14. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  15. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  16. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  17. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  18. V-214: Mozilla Firefox Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors....

  19. TEC Evaluation_PNNL11300_1996.pdf

    Office of Environmental Management (EM)

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  20. T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

    Broader source: Energy.gov [DOE]

    Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible.

  1. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  2. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  3. U-117: Potential security vulnerability has been identified with...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory...

  4. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-022: Apple QuickTime Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  8. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  9. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  10. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...