National Library of Energy BETA

Sample records for arbitrary scripting code

  1. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  2. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  3. V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am...

  4. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  5. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  6. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  7. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  8. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - ...

  9. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  10. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  11. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  12. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  13. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  14. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  15. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  16. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  17. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  18. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  19. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  20. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  2. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  4. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  5. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  6. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  7. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  8. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  9. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  10. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  11. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  12. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  13. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  14. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  15. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  16. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  17. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  18. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  19. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  20. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  1. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  2. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  3. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  4. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  5. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  6. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  7. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  9. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  10. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  11. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

  12. cogent_ats_scripts

    Energy Science and Technology Software Center (OSTI)

    2012-09-30

    The Cogent ATS Scripts are a collection of a dozen Python scripts which coordinate regression testing between COGENT (a plasma physics code) and ATS (an automated software testing system).

  13. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code).

  14. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  15. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  16. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  17. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code in a user's browser session in context of an affected site. 2) Certain input ... code in a user's browser session in context of an affected site. 3) Certain input ...

  18. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  19. SCRIPTS FSM

    Energy Science and Technology Software Center (OSTI)

    003648MLTPL00 Scripts for Scalable Monitoring of Parallel Filesystem Infrastructure https://github.com/bacaldwell

  20. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  1. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  2. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  3. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  4. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  5. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  6. Code System to Perform Monte Carlo Simulation of Electron Gamma-Ray Showers in Arbitrary Marerials.

    Energy Science and Technology Software Center (OSTI)

    2002-10-15

    Version 00 PENELOPE performs Monte Carlo simulation of electron-photon showers in arbitrary materials. Initially, it was devised to simulate the PENetration and Energy LOss of Positrons and Electrons in matter; photons were introduced later. The adopted scattering model gives a reliable description of radiation transport in the energy range from a few hundred eV to about 1GeV. PENELOPE generates random electron-photon showers in complex material structures consisting of any number of distinct homogeneous regions (bodies)more » with different compositions. The Penelope Forum list archives and other information can be accessed at http://www.nea.fr/lists/penelope.html. PENELOPE-MPI extends capabilities of PENELOPE-2001 (RSICC C00682MNYCP02; NEA-1525/05) by providing for usage of MPI type parallel drivers and extends the original version's ability to read different types of input data sets such as voxel. The motivation is to increase efficiency of Monte Carlo simulations for medical applications. The physics of the calculations have not been changed, and the original description of PENELOPE-2001 (which follows) is still valid. PENELOPE-2001 contains substantial changes and improvements to the previous versions 1996 and 2000. As for the physics, the model for electron/positron elastic scattering has been revised. Bremsstrahlung emission is now simulated using partial-wave data instead of analytical approximate formulae. Photoelectric absorption in K and L-shells is described from the corresponding partial cross sections. Fluorescence radiation from vacancies in K and L-shells is followed. Refinements were also introduced in electron/positron transport mechanics, mostly to account for energy dependence of the mean free paths for hard events. Simulation routines were re-programmed in a more structured way, and new example MAIN programs were written with a more flexible input and expanded output.« less

  7. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  8. Energy Citations Database (ECD) - Widget Code

    Office of Scientific and Technical Information (OSTI)

    Widget Inclusion Code <script type"textjavascript" src"http:cdn.widgetserver.comsyndicationsubscriberInsertWidget.js"><script> type"textjavascript">if (WIDGETBOX)...

  9. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  10. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution...

  11. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  12. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  13. Dpkg-Scripts

    Energy Science and Technology Software Center (OSTI)

    2007-09-24

    dpkg-scripts is a set of utilities for building and manipulating "dep" packages rooted in/usr/local. It works in conjunction with a modified version of the dpkg utility from Devian Linux and performs the following functions: build package from subversion or working cipy, edit a package, verify md5sums of files in an installed package, execute an installed package's unit tests, build a web page listing all installed packages and their documentation, obtain the soure code of anmore » installed package, auto-generate dotkits for packages, find unpackaged files in/usr/local, and auto-generate wrappers that set up the environment for a package executable and run it.« less

  14. V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters

  15. Example Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Example Batch Scripts Example Batch Scripts Sample Batch Scripts One of the most noted differences between the Hopper system and other NERSC systems is the number of cores per node is NOT a power of two. This means if you want to run a job on 32 cores, two nodes will be used and some cores will remain idle. Basic Batch Script This script uses the default 24 cores per node, (except on the remainder node when the number of cores requested is not a multiple of 24) #PBS -q debug #PBS -l

  16. Parallel Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Parallel Batch Scripts Parallel Batch Scripts Parallel Environments on Genepool You can run parallel jobs that use MPI or OpenMP on Genepool as long as you make the appropriate changes to your submission script! To investigate the parallel environments that are available on Genepool, you can use Command Description qconf -sp <pename> Show the configuration for the specified parallel environment. qconf -spl Show a list of all currently configured parallel environments. Basic Parallel

  17. Example Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Example Batch Scripts Example Batch Scripts Here are some sample job scripts that cover the most of the use cases on Edison. If you find anything that you need is missing, please let us know at consult at nersc dot gov. Note, Edison queue may still undergo configuration change as we gain more insight about how Slurm works with Edison workload. Basic Job Scripts #!/bin/bash -l #SBATCH -p regular #SBATCH -N 2 #SBATCH -t 04:00:00 #SBATCH -J my_job #SBATCH -o my_job.o%j #SBATCH -L SCRATCH,project

  18. HSI Shell Script

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This script assumes that you have previously interactively logged into HSI at least once to encrypt your usernamepassword. bincsh First copy the data and program source from ...

  19. scriptEnv - loading modules before starting a script

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    scriptEnv - loading modules before starting a script scriptEnv - loading modules before starting a script In some cases a script needs to load modules before the script can be executed, but it can often be inconvenient or impossible to provide wrapper scripts which load the needed modules. CGI scripts on the gpweb resources or in the NERSC portal environment which require the genepool-specific python/perl/R or databases configuration modules are a strong example of this. NERSC provides the

  20. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  1. Example batch scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Example batch scripts Example batch scripts Access to the BurstBuffer resource is integrated with the Scheduler of the system (i.e. SLURM). The Scheduler provides the ability to provision the BurstBuffer resource to be shared by a set of users or jobs. Using the Burst Buffer on Cori Phase 1 can be as simple as adding a line to your slurm batch script. Here we give examples of how to use the Burst Buffer as a scratch space and as a persistent reservation, and how to stage data in and out of the

  2. Batch Script Examples

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Batch Script Examples Batch Script Examples My First Script This is a simple example that you can use to make sure that your settings are correct before submitting more complicated jobs. First, copy the contents of hello.sh into a file. genepool% cat hello.sh #!/bin/bash sleep 120 echo "Hello World" Then submit your job with the qsub command genepool% qsub hello.sh Monitor your job with the qstat command: genepool% qs -u <username> You can also get more detailed information about

  3. Web service performance script

    Energy Science and Technology Software Center (OSTI)

    2009-08-01

    This python script, available from ESRI and modified here, checks a server at specified intervals to ensure that web services remain up and running. If any are found to be off, they are automatically turned back on.

  4. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  5. Nagios Down-Time scripts

    SciTech Connect (OSTI)

    Buddeberg, Patrick

    2014-11-11

    The Nagios Down-Time scripts are a set of Python scripts that create a commandline interface to Nagios' scheduled down-times. This allows for large-scale management of down-times, beyond what is feasible with the default web interface. Additionally, one of the scripts can be setup to periodically send emails of down-times that are scheduled to end within a specified amount of time after the script has been run; for example, it could run once a day and send an email including down-times ending within the next 24 hours.

  6. Nagios Down-Time scripts

    Energy Science and Technology Software Center (OSTI)

    2014-11-11

    The Nagios Down-Time scripts are a set of Python scripts that create a commandline interface to Nagios' scheduled down-times. This allows for large-scale management of down-times, beyond what is feasible with the default web interface. Additionally, one of the scripts can be setup to periodically send emails of down-times that are scheduled to end within a specified amount of time after the script has been run; for example, it could run once a day andmore » send an email including down-times ending within the next 24 hours.« less

  7. Laboratory Equipment Donation Program - LEDP Widget Code

    Office of Scientific and Technical Information (OSTI)

    Widget Inclusion Code Copy the code below and paste it to your website or blog: <script type"textjavascript" src"http:cdn.widgetserver.comsyndicationsubscriber...

  8. Repast for Python Scripting.

    SciTech Connect (OSTI)

    Collier, N.; North, M. J.; Decision and Information Sciences

    2005-01-01

    Repast for Python Scripting (RepastPy) is a rapid application development (RAD) tool for producing simulations from the Repast agent simulation framework. Using a point-and-click component based interface, users can easily construct a simulation and then use a special subset of the Python programming language to define agent behaviors. RepastPy is the next generation of Repast visual development tools superceding the older SimBuilder tool and incorporating a streamlined user interface, improved Python language support, and the latest improvements to Repast. RepastPy now provides the ability to export RepastPy models to Java, allowing users to then work in the traditional Repast for Java environment.

  9. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  10. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-043: Perl Locale::Maketext Module 'compile()' Multiple Code Injection Vulnerabilities ... Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft ...

  11. Arbitrary Lagrangian Eulerian Adaptive Mesh Refinement

    Energy Science and Technology Software Center (OSTI)

    2009-09-29

    This is a simulation code involving an ALE (arbitrary Lagrangian-Eulerian) hydrocode with AMR (adaptive mesh refinement) and pluggable physics packages for material strength, heat conduction, radiation diffusion, and laser ray tracing developed a LLNL, UCSD, and Berkeley Lab. The code is an extension of the open source SAMRAI (Structured Adaptive Mesh Refinement Application Interface) code/library. The code can be used in laser facilities such as the National Ignition Facility. The code is alsi being appliedmore » to slurry flow (landslides).« less

  12. Revising the worksheet with L3: a language and environment foruser-script interaction

    SciTech Connect (OSTI)

    Hohn, Michael H.

    2008-01-22

    This paper describes a novel approach to the parameter anddata handling issues commonly found in experimental scientific computingand scripting in general. The approach is based on the familiarcombination of scripting language and user interface, but using alanguage expressly designed for user interaction and convenience. The L3language combines programming facilities of procedural and functionallanguages with the persistence and need-based evaluation of data flowlanguages. It is implemented in Python, has access to all Pythonlibraries, and retains almost complete source code compatibility to allowsimple movement of code between the languages. The worksheet interfaceuses metadata produced by L3 to provide selection of values through thescriptit self and allow users to dynamically evolve scripts withoutre-running the prior versions. Scripts can be edited via text editors ormanipulated as structures on a drawing canvas. Computed values are validscripts and can be used further in other scripts via simplecopy-and-paste operations. The implementation is freely available underan open-source license.

  13. 2012 PATRIOT SCRIPT User's Guide

    SciTech Connect (OSTI)

    Cuellar, Leticia; Cleland, Timothy J.; Kubicek, Deborah A.; Mathis, Mark M.; Stroud, Phillip D.

    2012-05-31

    PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].

  14. HyRAM Testing Script.

    SciTech Connect (OSTI)

    Parkins, Owen

    2014-12-01

    The testing script is to provide a method of inspections to HyRAM (v1.0.0.244 Alpha) application features. This document will lead participants through the use of the application to make sure the application performs as designed. If a feature of the application becomes non-working, this script will relay useful information back to the designers of the application so that the feature can be fixed. This is essential to keep the application updated and performing as designed so that the users of this program can be satisfied. There will be frequent updates of this document to ensure proper testing of future application versions.

  15. Scripted Building Energy Modeling and Analysis: Preprint

    SciTech Connect (OSTI)

    Hale, E.; Macumber, D.; Benne, K.; Goldwasser, D.

    2012-08-01

    Building energy modeling and analysis is currently a time-intensive, error-prone, and nonreproducible process. This paper describes the scripting platform of the OpenStudio tool suite (http://openstudio.nrel.gov) and demonstrates its use in several contexts. Two classes of scripts are described and demonstrated: measures and free-form scripts. Measures are small, single-purpose scripts that conform to a predefined interface. Because measures are fairly simple, they can be written or modified by inexperienced programmers.

  16. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  17. Parallel, Distributed Scripting with Python

    SciTech Connect (OSTI)

    Miller, P J

    2002-05-24

    Parallel computers used to be, for the most part, one-of-a-kind systems which were extremely difficult to program portably. With SMP architectures, the advent of the POSIX thread API and OpenMP gave developers ways to portably exploit on-the-box shared memory parallelism. Since these architectures didn't scale cost-effectively, distributed memory clusters were developed. The associated MPI message passing libraries gave these systems a portable paradigm too. Having programmers effectively use this paradigm is a somewhat different question. Distributed data has to be explicitly transported via the messaging system in order for it to be useful. In high level languages, the MPI library gives access to data distribution routines in C, C++, and FORTRAN. But we need more than that. Many reasonable and common tasks are best done in (or as extensions to) scripting languages. Consider sysadm tools such as password crackers, file purgers, etc ... These are simple to write in a scripting language such as Python (an open source, portable, and freely available interpreter). But these tasks beg to be done in parallel. Consider the a password checker that checks an encrypted password against a 25,000 word dictionary. This can take around 10 seconds in Python (6 seconds in C). It is trivial to parallelize if you can distribute the information and co-ordinate the work.

  18. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  19. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  20. A Freely Available Matlab Script for Automatic Spatial Drift...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: A Freely Available Matlab Script for Automatic Spatial Drift Correction. Citation Details In-Document Search Title: A Freely Available Matlab Script for Automatic ...

  1. Script for Monitoring Infiniband Switch Links

    Energy Science and Technology Software Center (OSTI)

    2015-09-08

    This script ingests a configuration file and parses it to determine an Infiniband network topology, specifically the port information for switches. It then loops over the fabric to determine which, if any, ports do not meet their desired configuration.

  2. Scripted Building Energy Modeling and Analysis (Presentation)

    SciTech Connect (OSTI)

    Macumber, D.

    2012-10-01

    Building energy analysis is often time-intensive, error-prone, and non-reproducible. Entire energy analyses can be scripted end-to-end using the OpenStudio Ruby API. Common tasks within an analysis can be automated using OpenStudio Measures. Graphical user interfaces (GUI's) and component libraries reduce time, decrease errors, and improve repeatability in energy modeling.

  3. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  4. Script identification from images using cluster-based templates

    DOE Patents [OSTI]

    Hochberg, J.G.; Kelly, P.M.; Thomas, T.R.

    1998-12-01

    A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script. 17 figs.

  5. Script identification from images using cluster-based templates

    DOE Patents [OSTI]

    Hochberg, Judith G.; Kelly, Patrick M.; Thomas, Timothy R.

    1998-01-01

    A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script.

  6. The Swift Parallel Scripting Language for ALCF Systems | Argonne Leadership

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computing Facility Projects bgclang Compiler Cobalt Scheduler GLEAN Petrel Swift The Swift Parallel Scripting Language for ALCF Systems Swift is an implicitly parallel functional language that makes it easier to script higher-level applications or workflows composed from serial or parallel programs. Recently made available across ALCF systems, it has been used to script application workflows in a broad range of diverse disciplines from protein structure prediction to modeling global

  7. Sandia's Arbitrary Waveform MEMO Actuator

    Energy Science and Technology Software Center (OSTI)

    2003-08-07

    SAMA is a multichannel, arbitrary waveform generator program for driving microelectromechanical systems (MEMS). It allows the user to piece together twelve available wave parts, thereby permitting the user to create practically any waveform, or upload a previously constructed signal. The waveforms (bundled together as a signal) may simultaneously be output through four different channels to actuate MEMS devices, and the number of output channels may be increased depending on the DAQ card or instrument utilized.more » Additionally, real-time changes may be made to the frequency and amplitude. The signal may be paused temporarily. The waveform may be saved to file for future uploading. Recent work for this version has focused on modifications that will allow loading previously generated arbitrary waveforms, independent channel waveform amplification, adding a pause function, separating the "modify waveform: and "end program" functions, and simplifying the user interface by adding test blocks with statements to help the user program and output the desired signals. The program was developed in an effort to alleviate some of the limitations of Micro Driver. For example, Micro Driver will not allow the user to select a segment of a sine wave, but rather the user is limited to choosing either a whole or half sine wave pattern. It therefore becomes quite difficult ot construct partial sine wave patterns out of a "ramp" waveparts for several reasons. First, one must determine on paper how many data points each ramp will cover, and what the slopes of these ramps will be. Second, from what was observed, Micro Driver has difficulty processing more than six distinct waveparts during sequencing. The program will allow the user to input the various waves into the desired sequence; however, it will not allow the user to compile them (by clicking "ok" and returning to the main screen). Third, should the user decide that they want to increase the amplitute of the output signal

  8. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, ...

  9. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure...

  10. V-028: Splunk Multiple Cross-Site Scripting and Denial of Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    28: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 -...

  11. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  12. An Arbitrary Precision Computation Package

    Energy Science and Technology Software Center (OSTI)

    2003-06-14

    This package permits a scientist to perform computations using an arbitrarily high level of numeric precision (the equivalent of hundreds or even thousands of digits), by making only minor changes to conventional C++ or Fortran-90 soruce code. This software takes advantage of certain properties of IEEE floating-point arithmetic, together with advanced numeric algorithms, custom data types and operator overloading. Also included in this package is the "Experimental Mathematician's Toolkit", which incorporates many of these facilitiesmore » into an easy-to-use interactive program.« less

  13. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  14. V-216: Drupal Monster Menus Module Security Bypass and Script...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP ...

  15. Scripts for Scalable Monitoring of Parallel Filesystem Infrastructure

    SciTech Connect (OSTI)

    2014-02-27

    Scripts for scalable monitoring of parallel filesystem infrastructure provide frameworks for monitoring the health of block storage arrays and large InfiniBand fabrics. The block storage framework uses Python multiprocessing to within scale the number monitored arrays to scale with the number of processors in the system. This enables live monitoring of HPC-scale filesystem with 10-50 storage arrays. For InfiniBand monitoring, there are scripts included that monitor InfiniBand health of each host along with visualization tools for mapping the topology of complex fabric topologies.

  16. Scripts for Scalable Monitoring of Parallel Filesystem Infrastructure

    Energy Science and Technology Software Center (OSTI)

    2014-02-27

    Scripts for scalable monitoring of parallel filesystem infrastructure provide frameworks for monitoring the health of block storage arrays and large InfiniBand fabrics. The block storage framework uses Python multiprocessing to within scale the number monitored arrays to scale with the number of processors in the system. This enables live monitoring of HPC-scale filesystem with 10-50 storage arrays. For InfiniBand monitoring, there are scripts included that monitor InfiniBand health of each host along with visualization toolsmore » for mapping the topology of complex fabric topologies.« less

  17. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain ...

  18. Scripts and Dynamic Pages on Websites Outside of the Energy.gov Drupal Environment

    Broader source: Energy.gov [DOE]

    This page describes the requirements for developing scripts and dynamic pages on EERE websites outside of Energy.gov. The use of scripting allows the creation of dynamic websites that allow user...

  19. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

  20. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

  1. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting ...

  2. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  3. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  5. T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting Attacks Arbitrary Code | Department of Energy 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A

  6. Microsoft Word - 02.20.07.CAES.script.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INL Video 1 CAES video script Groundbreaking Ceremony Feb. 20, 2007 Blake Hall, Idaho State Board of Education member This is a great opportunity for the State Board of Education to be present today with our universities and with private industry and government to announce the groundbreaking for the Center for Advanced Energy Studies. Arthur Vailas, Idaho State University president This partnership creates a core facility, a core resource, worldwide, that brings the best intellectual capital -

  7. Efficient isoparametric integration over arbitrary space-filling...

    Office of Scientific and Technical Information (OSTI)

    Efficient isoparametric integration over arbitrary space-filling Voronoi polyhedra for electronic structure calculations Prev Next Title: Efficient isoparametric integration ...

  8. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  9. SAE2.py : a python script to automate parameter studies using SCREAMER with application to magnetic switching on Z.

    SciTech Connect (OSTI)

    Orndorff-Plunkett, Franklin

    2011-05-01

    The SCREAMER simulation code is widely used at Sandia National Laboratories for designing and simulating pulsed power accelerator experiments on super power accelerators. A preliminary parameter study of Z with a magnetic switching retrofit illustrates the utility of the automating script for optimizing pulsed power designs. SCREAMER is a circuit based code commonly used in pulsed-power design and requires numerous iterations to find optimal configurations. System optimization using simulations like SCREAMER is by nature inefficient and incomplete when done manually. This is especially the case when the system has many interactive elements whose emergent effects may be unforeseeable and complicated. For increased completeness, efficiency and robustness, investigators should probe a suitably confined parameter space using deterministic, genetic, cultural, ant-colony algorithms or other computational intelligence methods. I have developed SAE2 - a user-friendly, deterministic script that automates the search for optima of pulsed-power designs with SCREAMER. This manual demonstrates how to make input decks for SAE2 and optimize any pulsed-power design that can be modeled using SCREAMER. Application of SAE2 to magnetic switching on model of a potential Z refurbishment illustrates the power of SAE2. With respect to the manual optimization, the automated optimization resulted in 5% greater peak current (10% greater energy) and a 25% increase in safety factor for the most highly stressed element.

  10. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  11. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are

  12. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Symantec’s Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages.

  13. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  14. T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

  15. Post-Fabrication Placement of Arbitrary Chemical Functionality...

    Office of Scientific and Technical Information (OSTI)

    Post-Fabrication Placement of Arbitrary Chemical Functionality on Microphase-Separated Thin Films of Amine-Reactive Block Copolymers Citation Details In-Document Search Title: ...

  16. Mode coupling evolution in arbitrary inflationary backgrounds

    SciTech Connect (OSTI)

    Bernardeau, Francis

    2011-02-01

    The evolution of high order correlation functions of a test scalar field in arbitrary inflationary backgrounds is computed. Whenever possible, exact results are derived from quantum field theory calculations. Taking advantage of the fact that such calculations can be mapped, for super-horizon scales, into those of a classical system, we express the expected correlation functions in terms of classical quantities, power spectra, Green functions, that can be easily computed in the long-wavelength limit. Explicit results are presented that extend those already known for a de Sitter background. In particular the expressions of the late time amplitude of bispectrum and trispectrum, as well as the whole high-order correlation structure, are given in terms of the expansion factor behavior. When compared to the case of a de Sitter background, power law inflation and chaotic inflation induced by a massive field are found to induce high order correlation functions the amplitudes of which are amplified by almost one order of magnitude. These results indicate that the dependence of the related non-Gaussian parameters — such as f{sub NL} — on the wave-modes is at percent level.

  17. Writing World-Wide Web CGI scripts in the REXX language

    SciTech Connect (OSTI)

    Cottrell, R.L.A.

    1996-03-01

    This talk is aimed at people who have experience with REXX and are interested in using it to write WWW CGI scripts. As part of this, the author describes several functions that are available in a library of REXX functions that simplify writing WWW CGI scripts. This library is freely available at //www.slac.standard.edu/slac/www/tool/cgi-rexx/.

  18. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically provide the necessary MPI include files and libraries. For Fortran source code use mpif90: % mpif90 -o example.x example.f90 For C source code use...

  19. Python interface generator for Fortran based codes (a code development aid)

    Energy Science and Technology Software Center (OSTI)

    2012-02-22

    Forthon generates links between Fortran and Python. Python is a high level, object oriented, interactive and scripting language that allows a flexible and versatile interface to computational tools. The Forthon package generates the necessary wrapping code which allows access to the Fortran database and to the Fortran subroutines and functions. This provides a development package where the computationally intensive parts of a code can be written in efficient Fortran, and the high level controlling codemore » can be written in the much more versatile Python language.« less

  20. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  1. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  2. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clickjacking, and File Upload Attacks | Department of Energy 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer

  3. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attacks | Department of Energy 9: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740

  4. Single-Species Aerosol Coagulation and Deposition with Arbitrary Size Resolution.

    Energy Science and Technology Software Center (OSTI)

    2012-07-31

    Version 00 SAEROSA solves the dynamic aerosol coagulation and deposition problem with arbitrary computational precision under a variety of conditions. The code includes numerous user-selectable coagulation kernels, alone or in combinations, and permits an arbitrary initial size distribution. Many parameter combinations and what-if scenarios under user control are possible. The output gives the particle size distribution suspended in the carrier fluid initially and after the desired aerosol aging time in terms of both differential andmore » integral aerosol volume concentrations. An auxiliary routine designed for the Mac OSX environment provides plotting capability. The output can be further processed by e.g., spreadsheets. The code has been benchmarked against three computer models, including MAEROS, and analytical models with excellent agreement. The test cases also included scenarios where previously published computational coagulation models lack capabilities or exhibit numerical instabilities. These included narrow, delta function, and non-lognormal initial size distributions, and further conditions, such as the presence of simultaneous coagulation mechanisms, including electrostatic effects, spanning multiple flow-regimes.« less

  5. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  6. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  7. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  8. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  9. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities...

  10. Poly 3D fault modeling scripts/data for permeability potential of Washington State geothermal prospects

    SciTech Connect (OSTI)

    Michael Swyer

    2015-02-05

    Matlab scripts/functions and data used to build Poly3D models and create permeability potential GIS layers for 1) Mount St Helen's, 2) Wind River Valley, and 3) Mount Baker geothermal prospect areas located in Washington state.

  11. V-216: Drupal Monster Menus Module Security Bypass and Script Insertion

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 6: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and

  12. Risk Code?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Identify the Task Risk Code >2 Determine if a Work Control Document is needed What is the Unmitigated Risk Code? Rev.1 09/05/14 Read and Agree to Comply with appropriate mitigation and sign Work Control Documents Is there an approved Work Control Document (WCD)? WORK PLANNING, CONTROL AND AUTHORIZATION FLOW DIAGRAM 1. Define Scope of Work 2. Analyze Hazards 3. Develop and Implement Hazard Controls 4. Perform Work Within Controls 5. Feedback and Continuous Improvement Analyze Hazards and

  13. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  14. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  15. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  16. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  17. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  18. The Integrated TIGER Series Codes

    Energy Science and Technology Software Center (OSTI)

    2006-01-15

    ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with anmore » input scheme based on order-independent descriptive keywords that makes maximum use of defaults and intemal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2) multigroup codes with adjoint transport capabilities, (3) parallel implementations of all ITS codes, (4) a general purpose geometry engine for linking with CAD or other geometry formats, and (5) the Cholla facet geometry library. Moreover, the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.« less

  19. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  20. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High Performance Computing. The default compiler suite is from the Portland Group which is loaded by default at login, along with the PGI compiled Open MPI environment. % module list Currently Loaded Modulefiles: 1) pgi/10.8 2) openmpi/1.4.2 Basic Example Open MPI provides a convenient set of wrapper commands which you should use in

  1. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  2. WENO schemes on arbitrary unstructured meshes for laminar, transitional and turbulent flows

    SciTech Connect (OSTI)

    Tsoutsanis, Panagiotis, E-mail: panagiotis.tsoutsanis@cranfield.ac.uk; Antoniadis, Antonios Foivos, E-mail: a.f.antoniadis@cranfield.ac.uk; Drikakis, Dimitris, E-mail: d.drikakis@cranfield.ac.uk

    2014-01-01

    This paper presents the development and implementation of weighted-essentially-non-oscillatory (WENO) schemes for viscous flows on arbitrary unstructured grids. WENO schemes up to fifth-order accurate have been implemented in conjunction with hybrid and non-hybrid unstructured grids. The schemes are investigated with reference to numerical and experimental results for the TaylorGreen vortex, as well as for laminar and turbulent flows around a sphere, and the turbulent shock-wave boundary layer interaction flow problem. The results show that the accuracy of the schemes depends on the arbitrariness of shape and orientation of the unstructured mesh elements, as well as the compactness of directional stencils. The WENO schemes provide a more accurate numerical framework compared to second-order and third-order total variation diminishing (TVD) methods, however, the fifth-order version of the schemes is computationally too expensive to make the schemes practically usable. On the other hand, the third-order variant offers an excellent numerical framework in terms of accuracy and computational cost compared to the fifth-order WENO and second-order TVD schemes. Parallelisation of the CFD code (henceforth labelled as UCNS3D), where the schemes have been implemented, shows that the present methods offer very good scalable performance.

  3. Arbitrary unitary transformations on optical states using a quantum memory

    SciTech Connect (OSTI)

    Campbell, Geoff T.; Pinel, Olivier; Hosseini, Mahdi; Buchler, Ben C.; Lam, Ping Koy

    2014-12-04

    We show that optical memories arranged along an optical path can perform arbitrary unitary transformations on frequency domain optical states. The protocol offers favourable scaling and can be used with any quantum memory that uses an off-resonant Raman transition to reversibly transfer optical information to an atomic spin coherence.

  4. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  5. Please use "gres" settings in your batch scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Please use "gres" settings in your batch scripts Please use "gres" settings in your batch scripts September 4, 2012 by Helen He We would like to encourage you to use the generic resources ("gres") setting for various file systems that your batch jobs use. This feature is currently available on Hopper and Carver. The advantage of this setting is that your jobs won't start (thus won't fail) during a scheduled file system maintenance. The syntax for the

  6. code release

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    code release - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  7. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  8. Adaptive reconnection-based arbitrary Lagrangian Eulerian method

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Bo, Wurigen; Shashkov, Mikhail

    2015-07-21

    We present a new adaptive Arbitrary Lagrangian Eulerian (ALE) method. This method is based on the reconnection-based ALE (ReALE) methodology of Refs. [35], [34] and [6]. The main elements in a standard ReALE method are: an explicit Lagrangian phase on an arbitrary polygonal (in 2D) mesh in which the solution and positions of grid nodes are updated; a rezoning phase in which a new grid is defined by changing the connectivity (using Voronoi tessellation) but not the number of cells; and a remapping phase in which the Lagrangian solution is transferred onto the new grid. Furthermore, in the standard ReALEmore » method, the rezoned mesh is smoothed by using one or several steps toward centroidal Voronoi tessellation, but it is not adapted to the solution in any way.« less

  9. Patriot Script 1.0.13 User Guide for PEM 1.3.2

    SciTech Connect (OSTI)

    Cleland, Timothy James; Kubicek, Deborah Ann; Stroud, Phillip David; Cuellar-Hengartner, Leticia; Mathis, Mark

    2015-11-02

    This document provides an updated user guide for Patriot Script Version 1.0.13, for release with PEM 1.3.1 (LAUR-1422817) that adds description and instructions for the new excursion capability (see section 4.5.1).

  10. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.

  11. Arbitrary waveform generator to improve laser diode driver performance

    DOE Patents [OSTI]

    Fulkerson, Jr, Edward Steven

    2015-11-03

    An arbitrary waveform generator modifies the input signal to a laser diode driver circuit in order to reduce the overshoot/undershoot and provide a "flat-top" signal to the laser diode driver circuit. The input signal is modified based on the original received signal and the feedback from the laser diode by measuring the actual current flowing in the laser diode after the original signal is applied to the laser diode.

  12. A compact, multichannel, and low noise arbitrary waveform generator

    SciTech Connect (OSTI)

    Govorkov, S.; Ivanov, B. I.; Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 ; Il'ichev, E.; Meyer, H.-G.

    2014-05-15

    A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

  13. 3D Multigroup Sn Neutron Transport Code

    Energy Science and Technology Software Center (OSTI)

    2001-02-14

    ATTILA is a 3D multigroup transport code with arbitrary order ansotropic scatter. The transport equation is solved in first order form using a tri-linear discontinuous spatial differencing on an arbitrary tetrahedral mesh. The overall solution technique is source iteration with DSA acceleration of the scattering source. Anisotropic boundary and internal sources may be entered in the form of spherical harmonics moments. Alpha and k eigenvalue problems are allowed, as well as fixed source problems. Forwardmore » and adjoint solutions are available. Reflective, vacumn, and source boundary conditions are available. ATTILA can perform charged particle transport calculations using slowing down (CSD) terms. ATTILA can also be used to peform infra-red steady-state calculations for radiative transfer purposes.« less

  14. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  15. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    Georgia's Department of Community Affairs periodically reviews, amends and/or updates the state minimum standard codes. Georgia has "mandatory" and "permissive" codes. Georgia State Energy Code...

  17. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    NOTE: On March 9, 2016, the State Fire Prevention and Building Code Council adopted major updates to the State Uniform Code and the State Energy Code. The State Energy Code has been updated to 2015...

  18. Identifying an experimental two-state Hamiltonian to arbitrary accuracy

    SciTech Connect (OSTI)

    Cole, Jared H.; Greentree, Andrew D.; Wellard, Cameron J.; Hollenberg, Lloyd C.L.; Schirmer, Sonia G.; Oi, Daniel K.L.

    2005-06-15

    Precision control of a quantum system requires accurate determination of the effective system Hamiltonian. We develop a method for estimating the Hamiltonian parameters for some unknown two-state system and providing uncertainty bounds on these parameters. This method requires only one measurement basis and the ability to initialize the system in some arbitrary state which is not an eigenstate of the Hamiltonian in question. The scaling of the uncertainty is studied for large numbers of measurements and found to be proportional to the reciprocal of the square root of the number of measurements.

  19. Quantitative phase retrieval with arbitrary pupil and illumination

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Claus, Rene A.; Naulleau, Patrick P.; Neureuther, Andrew R.; Waller, Laura

    2015-10-02

    We present a general algorithm for combining measurements taken under various illumination and imaging conditions to quantitatively extract the amplitude and phase of an object wave. The algorithm uses the weak object transfer function, which incorporates arbitrary pupil functions and partially coherent illumination. The approach is extended beyond the weak object regime using an iterative algorithm. Finally, we demonstrate the method on measurements of Extreme Ultraviolet Lithography (EUV) multilayer mask defects taken in an EUV zone plate microscope with both a standard zone plate lens and a zone plate implementing Zernike phase contrast.

  20. Consistent interaction vertices in arbitrary topological BF theories

    SciTech Connect (OSTI)

    Bizdadea, C.; Cioroianu, E. M.; Saliu, S. O.; Sararu, S. C.; Stanciu-Oprean, L.

    2013-11-13

    Here we extend the previous results from [12] to the computation of all consistent self-interactions for topological BF theories with maximal field spectra in D =5,6,7,8 and present some partial results on possible generalizations on a space-time of arbitrary dimension D. For convenience, the deformation of the solution to the master equation in the context of the BRST-antifield formalism is used as a general method of constructing consistent interacting gauge field theories together with most of the standard hypotheses on quantum field theories on Minkowski space-times.

  1. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  2. U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in ajax links before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed...

  3. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  4. Falcon: automated optimization method for arbitrary assessment criteria

    DOE Patents [OSTI]

    Yang, Tser-Yuan; Moses, Edward I.; Hartmann-Siantar, Christine

    2001-01-01

    FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

  5. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, Mark W.; George, William A.

    1986-01-01

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

  6. Conservative remapping and region overlays by intersecting arbitrary polyhedra

    SciTech Connect (OSTI)

    Grandy, J.

    1999-01-20

    An efficient algorithm for first-order grid intersections, by computing geometrically the intersection volume between donor and target zones, is developed for polyhedral meshes. The author examines two applications of grid intersections. One application is first-order remapping, in which zone and node centered fields defined on a given mesh are transferred to a different mesh. The second application is region overlays, in which a region with homogeneous material properties is approximated by a grid of polyhedra and mapped onto an arbitrary hexahedral mesh, creating mixed zones on the boundary of the region. He demonstrates the use of this grid intersection algorithm within the framework of hydrodynamics simulations, and using a domain decomposed mesh, he studies the feasibility of a parallel implementation.

  7. Agile high resolution arbitrary waveform generator with jitterless frequency stepping

    DOE Patents [OSTI]

    Reilly, Peter T. A.; Koizumi, Hideya

    2010-05-11

    Jitterless transition of the programmable clock waveform is generated employing a set of two coupled direct digital synthesis (DDS) circuits. The first phase accumulator in the first DDS circuit runs at least one cycle of a common reference clock for the DDS circuits ahead of the second phase accumulator in the second DDS circuit. As a phase transition through the beginning of a phase cycle is detected from the first phase accumulator, a first phase offset word and a second phase offset word for the first and second phase accumulators are calculated and loaded into the first and second DDS circuits. The programmable clock waveform is employed as a clock input for the RAM address controller. A well defined jitterless transition in frequency of the arbitrary waveform is provided which coincides with the beginning of the phase cycle of the DDS output signal from the second DDS circuit.

  8. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, M.W.; George, W.A.

    1986-12-16

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

  9. Laplace-Runge-Lenz vector for arbitrary spin

    SciTech Connect (OSTI)

    Nikitin, A. G.

    2013-12-15

    A countable set of superintegrable quantum mechanical systems is presented which admit the dynamical symmetry with respect to algebra so(4). This algebra is generated by the Laplace-Runge-Lenz vector generalized to the case of arbitrary spin. The presented systems describe neutral particles with non-trivial multipole momenta. Their spectra can be found algebraically like in the case of hydrogen atom. Solutions for the systems with spins 1/2 and 1 are presented explicitly, solutions for spin 3/2 can be expressed via solutions of an ordinary differential equation of first order. A more extended version of this paper including detailed calculations is published as an e-print arXiv:1308.4279.

  10. Running Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... MPI for Python (mpi4py, pyMPI) These expose MPI standard bindings to the Python programming language. Documentation on mpi4py is available here and useful collection of example ...

  11. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Mississippi's existing state code is based on the 1977 Model Code for Energy Conservation (MCEC). The existing law does not mandate enforcement by localities, and any revised code will probably...

  12. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The State Building Code Council revised the Washington State Energy Code (WESC) in February 2013, effective July 1, 2013. The WESC is a state-developed code based upon ASHRAE 90.1-2010 and the...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Kentucky Building Code (KBC) is updated every three years on a cycle one year behind the publication year for the International Building Code. Any changes to the code by the state of Kentucky...

  14. 11. CONTRACT ID CODE

    National Nuclear Security Administration (NNSA)

    79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY ...

  15. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Rhode Island Building Code Standards Committee adopts, promulgates and administers the state building code. Compliance is determined through the building permit and inspection process by local...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    The North Carolina State Building Code Council is responsible for developing all state codes. By statute, the Commissioner of Insurance has general supervision over the administration and...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    Public Act 093-0936 (Illinois Energy Conservation Code for Commercial Buildings) was signed into law in August, 2004. The Illinois Energy Conservation Code for Commercial Buildings became...

  19. Building Energy Codes: State and Local Code Implementation Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mark Lessans Fellow Building Energy Codes: State and Local Code Implementation Overview ... building code regarding energy efficiency to the revised model code and submit a ...

  20. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy Innovations New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in ...

  1. Manually operated coded switch

    DOE Patents [OSTI]

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  2. The solid angle (geometry factor) for a spherical surface source and an arbitrary detector aperture

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Favorite, Jeffrey A.

    2016-01-13

    It is proven that the solid angle (or geometry factor, also called the geometrical efficiency) for a spherically symmetric outward-directed surface source with an arbitrary radius and polar angle distribution and an arbitrary detector aperture is equal to the solid angle for an isotropic point source located at the center of the spherical surface source and the same detector aperture.

  3. T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input before displaying the input.

  4. Massive graviton on arbitrary background: derivation, syzygies, applications

    SciTech Connect (OSTI)

    Bernard, Laura; Deffayet, Cédric; Strauss, Mikael von

    2015-06-23

    We give the detailed derivation of the fully covariant form of the quadratic action and the derived linear equations of motion for a massive graviton in an arbitrary background metric (which were presented in arXiv:1410.8302 [hep-th]). Our starting point is the de Rham-Gabadadze-Tolley (dRGT) family of ghost free massive gravities and using a simple model of this family, we are able to express this action and these equations of motion in terms of a single metric in which the graviton propagates, hence removing in particular the need for a “reference metric' which is present in the non perturbative formulation. We show further how 5 covariant constraints can be obtained including one which leads to the tracelessness of the graviton on flat space-time and removes the Boulware-Deser ghost. This last constraint involves powers and combinations of the curvature of the background metric. The 5 constraints are obtained for a background metric which is unconstrained, i.e. which does not have to obey the background field equations. We then apply these results to the case of Einstein space-times, where we show that the 5 constraints become trivial, and Friedmann-Lemaître-Robertson-Walker space-times, for which we correct in particular some results that appeared elsewhere. To reach our results, we derive several non trivial identities, syzygies, involving the graviton fields, its derivatives and the background metric curvature. These identities have their own interest. We also discover that there exist backgrounds for which the dRGT equations cannot be unambiguously linearized.

  5. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    New Hampshire adopted a mandatory statewide building code in 2002 based on the 2000 IECC. S.B. 81 was enacted in July 2007, and it upgraded the New Hampshire Energy Code to the 2006 IECC. In Dece...

  7. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...

  9. Building Energy Code

    Broader source: Energy.gov [DOE]

    Legislation passed in March 2010 authorized the Alabama Energy and Residential Code (AERC) Board to adopt mandatory residential and commercial energy codes for all jurisdictions. In 2015, the AER...

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    A mandatory energy code is not enforced at the state level. If a local energy code is adopted, it is enforced at the local level. Builders or sellers of new residential buildings (single-family or...

  11. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  12. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Indiana Residential Building Code is based on the 2003 IRC with state amendments (eff. 9/11/05). This code applies to 1 and 2 family dwellings and townhouses. During the adoption process,...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 1993 State Legislature updated the state energy code to the 1989 Model Energy Code (MEC) and established a procedure to update the standard. Then in 1995, following consultation with an...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Florida Building Commission (FBC) is directed to adopt, revise, update, and maintain the Florida Building Code in accordance with Chapter 120 of the state statutes. The code is mandatory...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2006 Iowa enacted H.F. 2361, requiring the State Building Commissioner to adopt energy conservation requirements based on a nationally recognized building energy code. The State Building Code...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    In September 2011 the Nebraska Building Energy Code was updated to the 2009 International Energy Conservation Code (IECC) standards. As with the previous 2003 IECC standards, which had been in...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    In November of 2015, the Commission adopted the 2015 International Building Code (IBC) with amendments. The Commission did not adopt the 2012 International Energy Conservation Code (IECC) as part...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more deta...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    Changes to the energy code are submitted to the Uniform Building Code Commission. The proposed change is reviewed by the Commission at a monthly meeting to decide if it warrants further considera...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  2. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Virginia Uniform Statewide Building Code (USBC) is a statewide minimum requirement that local jurisdictions cannot amend. The code is applicable to all new buildings in the commonwealth. The...

  3. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    Colorado is a home rule state, so no statewide energy code exists, although state government buildings do have specific requirements. Voluntary adoption of energy codes is encouraged and efforts...

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    All residential and commercial structures are required to comply with the state’s energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 2012 IECC is in effect for all residential and commercial buildings, Idaho schools, and Idaho jurisdictions that adopt and enforce building codes, unless a local code exists that is more...

  7. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-01-01

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  8. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-02-20

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  9. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  10. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    In March 2006, SB 459 was enacted to promote renewable energy and update the state's building energy codes.

  11. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  12. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  13. XSOR codes users manual

    SciTech Connect (OSTI)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

  14. DLLExternalCode

    Energy Science and Technology Software Center (OSTI)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read frommore » files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.« less

  15. DLLExternalCode

    SciTech Connect (OSTI)

    Greg Flach, Frank Smith

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  16. Simulation of neoclassical transport with the continuum gyrokinetic code COGENT

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Dorf, M. A.; Cohen, R. H.; Dorr, M.; Rognlien, T.; Hittinger, J.; Compton, J.; Colella, P.; Martin, D.; McCorquodale, P.

    2013-01-25

    The development of the continuum gyrokinetic code COGENT for edge plasma simulations is reported. The present version of the code models a nonlinear axisymmetric 4D (R, v∥, μ) gyrokinetic equation coupled to the long-wavelength limit of the gyro-Poisson equation. Here, R is the particle gyrocenter coordinate in the poloidal plane, and v∥ and μ are the guiding center velocity parallel to the magnetic field and the magnetic moment, respectively. The COGENT code utilizes a fourth-order finite-volume (conservative) discretization combined with arbitrary mapped multiblock grid technology (nearly field-aligned on blocks) to handle the complexity of tokamak divertor geometry with high accuracy.more » Furthermore, topics presented are the implementation of increasingly detailed model collision operators, and the results of neoclassical transport simulations including the effects of a strong radial electric field characteristic of a tokamak pedestal under H-mode conditions.« less

  17. Simulation of neoclassical transport with the continuum gyrokinetic code COGENT

    SciTech Connect (OSTI)

    Dorf, M. A.; Cohen, R. H.; Dorr, M.; Rognlien, T.; Hittinger, J.; Compton, J.; Colella, P.; Martin, D.; McCorquodale, P.

    2013-01-15

    The development of the continuum gyrokinetic code COGENT for edge plasma simulations is reported. The present version of the code models a nonlinear axisymmetric 4D (R, v{sub Parallel-To }, {mu}) gyrokinetic equation coupled to the long-wavelength limit of the gyro-Poisson equation. Here, R is the particle gyrocenter coordinate in the poloidal plane, and v{sub Parallel-To} and {mu} are the guiding center velocity parallel to the magnetic field and the magnetic moment, respectively. The COGENT code utilizes a fourth-order finite-volume (conservative) discretization combined with arbitrary mapped multiblock grid technology (nearly field-aligned on blocks) to handle the complexity of tokamak divertor geometry with high accuracy. Topics presented are the implementation of increasingly detailed model collision operators, and the results of neoclassical transport simulations including the effects of a strong radial electric field characteristic of a tokamak pedestal under H-mode conditions.

  18. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  19. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  20. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention

  1. Code of Conduct

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Governance » Ethics, Accountability, Contract » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Ethics and Compliance Group (505) 667-7506 Email Code of Conduct Los Alamos National Laboratory is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our

  2. Shields - Code Coupling

    SciTech Connect (OSTI)

    Vernon, Louis James

    2015-03-02

    This PowerPoint presentation focuses on the history and benefits of the Space Weather Modeling Framework (SWMF) code and collaborative software development.

  3. Tokamak Systems Code

    SciTech Connect (OSTI)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  4. Building Energy Codes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    David Cohan Program Manager Building Energy Codes April 22, 2014 Presentation Outline * Mission * Goals * Program Organization * StrategiesRoles * Near-Term Focus * Measuring ...

  5. Improving Code Compliance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    provisions in International Energy Conservation Code (IECC) through proof-of-concept ... This includes updating recommendations based on newer CBECs or BPD energy statistics. ...

  6. Top NAICS Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Related Products Manufacturing for Measuring, Displaying, Top Ten NAICS Codes Dollar Value 511210 Software Publishers 334516 Analytical Laboratory Instrument Manufacturing...

  7. Building Energy Code

    Broader source: Energy.gov [DOE]

    Kansas adopted the 2006 International Energy Conservation Code (IECC) as "the applicable state standard" for commercial and industrial buildings. Enforcement is provided by local jurisdictions; t...

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    Pennsylvania Department of Labor and Industry (DLI) has the authority to upgrade commercial and residential energy standards through the regulatory process. The current code, the 2009 UCC, became...

  9. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Maryland Building Performance Standards (MBPS) are adopted by the Maryland Department of Housing and Community Development (DHCD) Codes Administration. As required by legislation passed in...

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Connecticut Office of the State Building Inspector establishes and enforces building, electrical, mechanical, plumbing and energy code requirements by reviewing, developing, adopting and...