Powered by Deep Web Technologies
Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

2

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

3

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

4

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

5

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

6

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

7

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

8

V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Articles U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability T-692:...

9

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

10

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

11

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

12

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

13

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

14

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Passwords to Remote Authenticated and Local Users V-041: Red Hat CloudForms Multiple Vulnerabilities T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

15

Directory  

Science Journals Connector (OSTI)

This cross-reference table summarises the type of products available from each manufacturer or supplier, giving the page number for the company entry in the directory section of this book.

Bob Hussey; Jo Wilson

1998-01-01T23:59:59.000Z

16

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

17

V-163: Red Hat Network Satellite Server Inter-Satellite Sync...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

18

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 -...

19

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

20

ARM - People Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

govPeople Directory People Directory Enter last name to begin search: Search Icon Register a new user to the directory...

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Berkeley Lab Directory Services: Offsite Directory Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Offsite Directories Offsite Directories Directories for Organizations Related to the Lab Berkeley Lab Directory Services DOE Labs and Sites DOE National Telephone Directory EPA ESnet Contacts Federal Telephone Directories Lawrence Livermore National Laboratory National Institute of Standards and Technology (NIST) National Institutes of Health (NIH) Directory National Science Foundation (NSF) SLAC Directories, Including High Energy Physics (HEP Names) UC Berkeley Directory (all current faculty, staff, and students) University of California Campuses and Offices General Online Directories AT&T directory services All-In-One HotBot Internet Address Finder WhoWhere? People Search Yellowbook Yahoo People Search International Country Codes for Email Addresses Official USPS Abbreviations (States, Street Suffixes, Secondary Unit

22

Fellows Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory Directory Fellows Directory Complete listing of senior, active, and retired Laboratory Fellows. Senior, active, and retired Laboratory Fellows Senior Fellows Mark Bitensky, retired Gregory H. Canavan Stirling A. Colgate, retired Harry Dreicer, retired Hans Frauenfelder Gerald T. Garvey, retired Houston T. Hawkins Siegfried S. Hecker, retired Alan S. Perelson William H. Press A. P. Sattelberger, retired Benno P. Schoenborn, retired Geoffrey B. West, retired Stephen M. Younger, retired Deceased Fellows Herbert L. Anderson Aloysius Arko George I. Bell Peter A. Carruthers Edward Cashwell George A. Cowan Arthur N. Cox Keith H. Despain Clarence Max Fowler Walter B. Goad Gordon E. Hansen P. O'Dean Judd Robert G. Keepin Edward A. Knapp Jere D. Knight H. Ralph Lewis John Marshall Nicholas Metropolis

23

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

24

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

25

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

26

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

27

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets 4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service May 17, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in Novell eDirectory. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HP/UX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user can cause denial of service conditions. reference LINKS: Novell eDirectory - LDAP-SSL SECURELIST.ORG SecurityFocus BugTrackID: 47858 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Novell eDirectory. A remote user can cause

28

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

29

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

30

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

31

A bug's leaf | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

32

T-713: Blue Coat Reporter Directory Traversal Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Blue Coat Reporter Directory Traversal Flaw 3: Blue Coat Reporter Directory Traversal Flaw T-713: Blue Coat Reporter Directory Traversal Flaw September 9, 2011 - 10:47am Addthis PROBLEM: A vulnerability was reported in Blue Coat Reporter. A remote user can view files on the target system and gain full control of the target application. PLATFORM: All pre-9.3 versions of Reporter installed on a Windows server are vulnerable. ABSTRACT: Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. reference LINKS: Blue Coat Security Advisory ID: SA60 SecurityTracker Alert ID: 1026023 About Path Traversal IMPACT ASSESSMENT: High Discussion: Reporter installed on a Windows server is vulnerable to an HTTP directory traversal attack. An unauthenticated user can browse the file system and read any file. Data from these files can be used by an attacker to gain

33

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

34

Berkeley Lab Directory Services  

NLE Websites -- All DOE Office Websites (Extended Search)

How to use the LBNL directory search pages How to use the LBNL directory search pages How to search for people at LBNL Searching for two-letter names at LBNL Advanced search: how to search by office location, etc. Hostname/DNS lookup How to add a link to your website in your directory listing How to find people at LBNL If you enter a single word, the directory will search for one of the following: Partial first or last name. (e.g. Tony or Smith) E-mail address (e.g. JRSmith) The end of a phone number- usually the extension. (e.g. 6965) The employee ID # If you enter two words, the directory will search for: The combination of both the beginning of a FIRST name and the beginning of a LAST name. When BOTH first and second words are matched, the name is displayed. This is the prefered method of searching- fewer entries

35

NEPA Stakeholders Directory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Policy Act N E P A DIRECTORY of POTENTIAL STAKEHOLDERS for DOE ACTIONS under NEPA 28 th Edition July 2011 U.S. Department of Energy Office of NEPA Policy and Compliance United States Government Department of Energy memorandum DATE: July 28, 201 1 REPLY TO ATN OF: Office of NEPA Policy and Compliance (C. Chen, GC-54,202-586-0733) SUBJECT: Directory of Potential Stakeholders for DOE Actions under NEPA: 2gth Edition TO: DOE NEPA Community I am pleased to announce that the 2sth edition of the Directory of Potential Stakeholders for DOE Actions under NEPA, dated July 20 1 1, is now posted on the DOE NEPA website (http://ne-pa. enerm. gov/documents/StakeholdersDirectory. pdfl. The Directory is intended to supplement distribution lists that DOE Offices compile for particular projects or facilities

36

Annual Report Directory2009  

E-Print Network (OSTI)

09 Annual Report #12;Directory2009 Chancellor Rex Williams, BE(Hons) Pro-Chancellor L John Wood-Chancellor Ian Town, MBChB(Otago), DM(Soton) University Registrar Jeff Field, JP, MA, DipJ, Dip

Hickman, Mark

37

DIRECTORY OF HEALTH SERVICES  

E-Print Network (OSTI)

a centralized resource of regional health care services for persons with developmental disabilitiesDIRECTORY OF HEALTH SERVICES FOR BRONX RESIDENTS WITH DEVELOPMENTAL DISABILITIES 2012 Compiled Albert Einstein College of Medicine in collaboration with Health Services Committee, Bronx Developmental

Yates, Andrew

38

EIA publications directory 1996  

SciTech Connect

This edition of the EIA Publications Directory contains titles and abstracts of periodicals and one-time reports produced by the Energy Information Administration (EIA) from January through December 1996. The body of the Directory contains citations and abstracts arranged by broad subject categories; metadata, coal, oil and gas, nuclear, electricity, renewable and energy/alternative fuels, multifuel, end-use consumption, models, and forecasts.

NONE

1997-05-01T23:59:59.000Z

39

EIA publications directory 1997  

SciTech Connect

This edition of the EIA Publications Directory contains 68 titles and abstracts of periodicals and one time reports produced by EIA from January through December 1997. The body of the Directory contains citations and abstracts arranged by broad subject categories; (1) MetaData, (2) Coal, (3) Oil (4) Natural gas, (5) Nuclear, (6) Electricity, (7) Renewable energy and Alternative fuels, (8) Multifuel, (9) End use consumption, (10) Models, and (11) Forecasts.

NONE

1998-04-01T23:59:59.000Z

40

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

42

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

43

Directory | Princeton Plasma Physics Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement Division Technology Transfer Furth Plasma Physics Library Contact Us Lab Leadership Directory Careers Human Resources Environment, Safety & Health Procurement...

44

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Beamlines Directory ALS Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

45

EIA publications directory 1994  

SciTech Connect

Enacted in 1977, the Department of Energy (DOE) Organization Act established the Energy Information Administration (EIA) as the Department`s independent statistical and analytical agency, with a mandate to collect and publish data and prepare analyses on energy production, consumption, prices, resources, and projections of energy supply and demand. This edition of the EIA Publications Directory contains titles and abstracts of periodicals and one-time reports produced by EIA from January through December 1994. The body of the Directory contains citations and abstracts arranged by broad subject categories: metadata, coal, oil and gas, nuclear, electricity, renewable energy/alternative fuels, multifuel, end-use consumption, models, and forecasts.

NONE

1995-07-20T23:59:59.000Z

46

Better Buildings Neighborhood Program: Resource Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Tools & Resources Tools & Resources Printable Version Share this resource Send a link to Better Buildings Neighborhood Program: Resource Directory to someone by E-mail Share Better Buildings Neighborhood Program: Resource Directory on Facebook Tweet about Better Buildings Neighborhood Program: Resource Directory on Twitter Bookmark Better Buildings Neighborhood Program: Resource Directory on Google Bookmark Better Buildings Neighborhood Program: Resource Directory on Delicious Rank Better Buildings Neighborhood Program: Resource Directory on Digg Find More places to share Better Buildings Neighborhood Program: Resource Directory on AddThis.com... Case Studies Resource Directory Webcasts Workshops Grants Administration Resource Directory The guidance documents and reports below have been used by Better Buildings

47

Energy information directory 1995  

SciTech Connect

The National Energy Information Center provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. This Energy Information Directory is used to assist the Center staff as well as other DOE staff in directing inquires to the proper offices.

NONE

1995-10-01T23:59:59.000Z

48

Annual Report Directory2010  

E-Print Network (OSTI)

Annual Report 10 #12;Directory2010 Chancellor Rex Williams, BE(Hons) Pro-Chancellor L John Wood(Soton) University Registrar Jeff Field, JP, MA, DipJ, DipTColl(ChCh.TColl.), DipTchg(DeptEd), APR, MFINZ Assistant

Hickman, Mark

49

Annual Report. Directory2011  

E-Print Network (OSTI)

UC2011 Annual Report. #12;Directory2011 Chancellor Rex Williams, BE(Hons) Pro-Chancellor L John(Soton) University Registrar Jeff Field, JP, MA, DipJ, DipTColl(ChCh.TColl.), DipTchg(DeptEd), APR, MFINZ Assistant

Hickman, Mark

50

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Print Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

51

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS Beamlines Directory Print ALS Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

52

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS Beamlines Directory Print ALS Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

53

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Print Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

54

Energy information directory 1998  

SciTech Connect

The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists most Government offices and trade associations that are involved in energy matters.

NONE

1998-11-01T23:59:59.000Z

55

Energy information directory 1994  

SciTech Connect

The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information.

Not Available

1994-03-28T23:59:59.000Z

56

Chemistry Department Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemistry Staff Directory Chemistry Staff Directory Last Name, First Phone E-mail Note: All listed phone extensions are in the format of (631) 344-xxxx. Adzic, Radoslav 4522 adzic@bnl.gov Akimov, Alexey No Entry akimov@bnl.gov An, Wei 4317 weian@bnl.gov Anselmini, James 4399 anselmini@bnl.gov Baber, Ashleigh 4317 ababer@bnl.gov Badiei, Yosra 4360 ybadiei@bnl.gov Bak, Seong Min BAK 3663 smbak@bnl.gov Bakalis, Jin No Entry jbakalis@bnl.gov Bird, Matthew 4331 mbird@bnl.gov Cabelli, Diane 4361 cabelli@bnl.gov Camillone III, Nicholas 4412 nicholas@bnl.gov Chen, Jingguang 2655 jgchen@bnl.gov Chen, Wei-Fu 4360 wfchen@bnl.gov Concepcion, Javier 4369 jconcepc@bnl.gov Cook, Andrew 4782 acook@bnl.gov Cumming, James 4338 cumming@bnl.gov Duan, Lele 4357 lduan@bnl.gov Ertem, Mehmed No Entry mzertem@bnl.gov

57

Staff Directory | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Staff Directory Name Title E-mail Brewer-Jordan, Elizabeth Business Development Assistant ebrewer@anl.gov Claxton, Christopher Commercialization Associate cclaxton@anl.gov...

58

EIA Publications Directory 1995  

SciTech Connect

This directory contains abstracts and ordering information for individual issues of semiannual, annual, biennial, and triennial Energy Information Administration (EIA) periodicals, analysis reports, Service Reports, and model documentations. This edition covers periodicals and one-time reports produced by EIA from January through December 1995. The citations and abstracts are arranged by broad subject categories: metadata, coal, oil/gas, nuclear, electricity, renewable energy/alternative fuels, multifuel, end-use consumption, models, and forecasts. Indexes are provided.

NONE

1995-10-01T23:59:59.000Z

59

Staff Directory | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

About Overview History Staff Directory Our Teams User Advisory Council Careers Margaret Butler Fellowship Visiting Us Contact Us Staff Directory Yury Alekseev Yuri Alexeev...

60

DOE Contracting Offices Directory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Contracting Offices Directory DOE Contracting Offices Directory The Department of Energy has a decentralized procurement process for buying goods and services which is carried...

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

A community service directory for Yolo County.  

E-Print Network (OSTI)

??The problem this author has identified is that there is no printed community service directory for Yolo County. In order to provide a printed directory… (more)

Bennett, Amy Irene

2012-01-01T23:59:59.000Z

62

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

63

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

64

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

65

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

66

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

67

Energy information directory 1997  

SciTech Connect

The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, state, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists some of the Government offices and trade associations that are involved in energy matters. It includes those DOE offices which deal with the public or public information. For the purposes of this publication, each entry has been given a numeric identification symbol. The index found in the back of this publication uses these identification numbers to refer the reader to relevant entries.

NONE

1997-09-01T23:59:59.000Z

68

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

69

DOE Solar Decathlon: Product Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory Directory The U.S. Department of Energy Solar Decathlon 2009 Product Directory provides a complete listing of the products used in the solar-powered team houses. To find common household products, see the list below. You may also search for products by team or in the Product Directory spreadsheet Microsoft Excel . By Products By Team Advanced Search Household Products Bathroom Faucet Bathroom Sink Clothes Dryer Clothes Washer Clothes Washer/Dryer Cooktop Computer Desktop Laptop Decking Dishwasher Dishdrawer Under Counter Dishwasher Exhaust Hood Flooring Furniture Insulation Kitchen Cabinets Kitchen Countertops Kitchen Faucet Kitchen Sink Lighting Fixed Lighting (hardwired) Plug-In Lighting (lamps, plug-in fixtures) Sensors Oven Combination Microwave Steam Wall Photovoltaic Collectors

70

Chemical Sciences Division: Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

INTRODUCTION INTRODUCTION TO CSD NATIONAL FACILITIES & CENTERS RESEARCH STUDENT & POSTDOCTORAL OPPORTUNITIES NEWS & EVENTS CSD CONTACTS LBNL HOME Privacy & Security Notice DOE UC Berkeley CSD Directory A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Rebecca Abergel CSD Project Scientist; The Glenn T. Seaborg Center. Musahid Ahmed CSD Staff Scientist, Chemical Physics Program/Chemical Dynamics Beamline Publications Richard A. Andersen Professor of Chemistry, UC Berkeley; CSD Senior Faculty Scientist, The Glenn T. Seaborg Center Publications John Arnold Professor of Chemistry, UC Berkeley; CSD Faculty Scientist, Catalytic Science Program Publications B Ali Belkacem CSD Deputy and Senior Staff Scientist; Atomic, Molecular and Optical Sciences Program Leader

71

Directory Enabled Policy Based Networking  

SciTech Connect

This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking.

KELIIAA, CURTIS M.

2001-10-01T23:59:59.000Z

72

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

73

DOE Solar Decathlon: Product Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Andrea Argabright, a student decathlete, staining an exterior wall of the Solar Decathlon 2013 West Virginia University house. Andrea Argabright, a student decathlete, staining an exterior wall of the Solar Decathlon 2013 West Virginia University house. U.S. Department of Energy Solar Decathlon Bookmark and Share - Home About Competition Scores & Standings Teams News Photos Videos Product Directory Village Energy Balance Education Sponsors History FAQs Contacts Product Directory The U.S. Department of Energy Solar Decathlon 2013 product directory is a listing of products used in the solar-powered team houses. Find specific products in the table below by sorting or searching by description, manufacturer, model, or team. Brief Description Detailed Description Manufacturer Model Team Name Bathroom Faucet Wall mount two-handle lavatory faucet with solid brass fixtures Kohler K-T14412-4-BN Team Alberta

74

Chinch Bugs in St. Augustine Lawns  

E-Print Network (OSTI)

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

75

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

76

Tools & Resources: Resource Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Resource Directory Resource Directory The guidance documents and reports below have been used by Better Buildings Neighborhood Program partners to build their programs and guide them to early successes. The tools and calculators can be used by homeowners, business owners, and program designers to help determine energy savings and other benefits associated with energy efficiency upgrades. Guidance Documents and Reports Background Program Evaluation Program Updates and Lessons Learned Program Design Marketing and Driving Demand Financing and Incentives Workforce Development Partnering with Utilities Technical Resources Tools and Calculators For Homes For Commercial Buildings Emissions and Equivalency Calculators Guidance Documents and Reports Background Recovery Through Retrofit Report

77

Summary of Bugs Database Jeremy Kepner  

E-Print Network (OSTI)

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

78

University of Minnesota Morris 201113 Catalog Campus Directories and Map  

E-Print Network (OSTI)

..................................................................................................................198 UMM Web Directory-6386 Financial gifts to the college. #12;199University of Minnesota Morris 2011­13 Catalog UMM Web Directory The following UMM web directory should assist persons in locating Internet address information for Morris

Amin, S. Massoud

79

Beamlines Directory | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Beamlines Directory Filter by: L bracket Discipline: All Atomic Physics Chemistry Environmental Science GeoScience Life Sciences Materials Science Physics Polymer Science Technique: All Anomalous and resonant scattering (hard x-ray) Anomalous and resonant scattering (soft x-ray) Biohazards at the BSL2/3 level Coherent x-ray scattering Diffraction anomalous fine structure Diffuse x-ray scattering Energy dispersive X-ray diffraction Fiber diffraction Fluorescence spectroscopy General diffraction Grazing incidence diffraction Grazing incidence small-angle scattering High-energy x-ray diffraction High-pressure diamond anvil cell High-pressure multi-anvil press Inelastic x-ray scattering Inelastic x-ray scattering (1 eV resolution) Intensity fluctuation spectroscopy Large unit cell crystallography Laue

80

2011 October Center Directory.pub  

NLE Websites -- All DOE Office Websites (Extended Search)

DIRECTORY About CEN CEN is a Department of Energy, Office of Basic Energy Sciences, Energy Frontier Research Center (EFRC). CEN members are drawn from four major research...

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Directory of Energy Information Administration Models 1994  

SciTech Connect

This directory revises and updates the 1993 directory and includes 15 models of the National Energy Modeling System (NEMS). Three other new models in use by the Energy Information Administration (EIA) have also been included: the Motor Gasoline Market Model (MGMM), Distillate Market Model (DMM), and the Propane Market Model (PPMM). This directory contains descriptions about each model, including title, acronym, purpose, followed by more detailed information on characteristics, uses and requirements. Sources for additional information are identified. Included in this directory are 37 EIA models active as of February 1, 1994.

Not Available

1994-07-01T23:59:59.000Z

82

Daylighting directory 6/1980  

SciTech Connect

A renewed interest in the energy conservation potential of daylighting has generated new research, applications and demonstration activities over the last few years. It is apparent that even those people actively working in the field are frequently not aware of all of the ongoing projects and activities. At the same time, the total national effort to utilize daylighting effectively in buildings on a broad scale is still very small, thus making it important that current activities are crossfertilized. The intent of this directory is to provide current listings of individuals and organizations that are actively engaged in daylighting work and related publications and upcoming events of interest. This directory was compiled from information contained in the survey response forms which were filled out and returned to us over the last few months. Responsibility for the accuracy and completeness of each survey form lies entirely with the respondents. The directory is composed of five parts: (1) Participant Survey Response: contains the survey response forms as submitted to us, listed alphabetically by responding organization; (2) Activity Index: lists individual respondents alphabetically, showing the daylighting activities each has checked. Allows the reader to quickly identify the individuals working in a specific area. Once an individual is identified, turn to the Individual Index to find the page numbers where that individual may be located in other areas of the directory; (3) Individual Index: lists individual respondents alphabetically; (4) Daylighting publications: lists the publications by each respondent (authors listed alphabetically); and (5) Notes of Interest: contains a variety of information on meetings, conferences, new projects and publications, etc. This material was collected from a variety of sources in addition to the survey respondents.

Not Available

1980-06-01T23:59:59.000Z

83

Bureau of Indian Affairs Tribal Directory | Open Energy Information  

Open Energy Info (EERE)

Tribal Directory Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Bureau of Indian Affairs Tribal Directory Abstract This website contains a...

84

V-215: NetworkMiner Directory Traversal and Insecure Library...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

5: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities August 9, 2013...

85

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

86

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

87

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

88

Designing Directories in Distributed Systems: A Systematic Framework  

E-Print Network (OSTI)

Designing Directories in Distributed Systems: A Systematic Framework K. Mani Chandy and Eve M of directory­based distributed applications. We evaluate a space of directory designs using our frame­ work. We distributed applications, including directory design. We propose a weaker con­ cept: estimation. We define

89

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

90

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: Avaya IP Office Manager TFTP Server Lets Remote Users 48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Avaya IP Office Manager. A remote user can view files on the target system. PLATFORM: Versions 5.0.x - 6.1.x ABSTRACT: The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. reference LINKS: ASA-2011-156 SecurityTracker Alert ID: 1025664 Secunia Advisory: SA43884 Avaya Support IMPACT ASSESSMENT: Medium Discussion: Avaya IP Office Manager is an application for viewing and editing an IP Office system's configuration. It can be used to securely connect to and

91

Directory of Energy Information Administration models 1996  

SciTech Connect

This directory revises and updates the Directory of Energy Information Administration Models 1995, DOE/EIA-0293(95), Energy Information Administration (EIA), U.S. Department of Energy, July 1995. Four models have been deleted in this directory as they are no longer being used: (1) Market Penetration Model for Ground-Water Heat Pump Systems (MPGWHP); (2) Market Penetration Model for Residential Rooftop PV Systems (MPRESPV-PC); (3) Market Penetration Model for Active and Passive Solar Technologies (MPSOLARPC); and (4) Revenue Requirements Modeling System (RRMS).

NONE

1996-07-01T23:59:59.000Z

92

Detecting insider activity using enhanced directory virtualization.  

SciTech Connect

Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between data sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-07-01T23:59:59.000Z

93

Global Social Media Directory: A Resource Guide  

SciTech Connect

The Global Social Media Directory is a resource guide providing information on social networking services around the globe. This information changes rapidly, therefore, this document will be updated on a regular basis and as funding permits.

Noonan, Christine F.; Piatt, Andrew W.

2014-10-23T23:59:59.000Z

94

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive, Sample Requests in Progress, Swipe Results Folder Miscellaneous Folder Process Procedures Folder Project Plans Folder RAD Records Area Surveys, Completed RPR13...

95

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Daren Jensen Nuclear Energy University Programs NEUP Quality Assurance Daren Jensen NEUP Quality Engineer Val See... (Properties) 82211 12:59 PM 82211 12:59 PM Send Document...

96

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

INL.GOV Related Communities Home Subfolders in "INL.GOV" Go Up 1 Level Go Up 1 Level Up Folder CommunityPages Folder Feature Stories Folder Feature Story Files Folder News Releases...

97

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

17- Willardson 17- Willardson May 16, 2012 Tony Willardson, Executive Director Western States Water Council WSWC Organization We... (Properties) 82712 11:59 AM 82712...

98

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Sort items in descending order Object Created Object Last Modified Aquifer Impacts from Hydraulic Fracturing Aquifer Impacts from Hydraulic Fracturing Aquifer Impacts from...

99

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

AREVA Folder Argonne National Laboratory Folder Dominion Engineering, Inc Folder Entergy Folder General Atomics Folder Industry Alliance Folder Oak Ridge National Laboratory...

100

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

PM Send Document Link 15- Ehud Greenspan 15- Ehud Greenspan 1 of 1 Project Title Self-sustaining thorium boiling water reactors PI: Ehud Greenspan - UC Berkeley... (Properties)...

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

INL Audio 1 Your INL Update - Week of Jan. 4, 2010 This is Nicole Stricker with your INL Update. You... (Properties) 1510 2:04 PM 1510 2:41 PM Send Document...

102

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

15 6:20 PM Send Document Link News Release Details (11538) News Release Details (11538) IDAHO FALLS -- The Advanced Test Reactor National Scientific User Facility (ATR NSUF),...

103

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Collaboration Portal Subfolders in "Nuclear Collaboration Portal" Go Up 1 Level Go Up 1 Level Up This folder contains no subfolders. Documents in "Nuclear Collaboration...

104

Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

2010" Go Up 1 Level Go Up 1 Level Up Folder INLNGNP References Folder NGNP Industry Alliance Folder NON INLNGNP References Documents in "NEAC 2010" (1 - 20 of 24) View items: 21...

105

Georgia Biofuel Directory A directory of Georgia industries that use biofuels.  

E-Print Network (OSTI)

Georgia Biofuel Directory · A directory of Georgia industries that use biofuels. · Completed in May _________________________________________________________________ 3 Biofuels_____________________________________________________________________ 4 Biofuel Use in Georgia that Burn Self-Generated Biofuels as of May 2003__ 4 Chart 1.0 Biofuel Use from Contacted

106

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

107

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

108

Building Energy Tools Software Directory | Open Energy Information  

Open Energy Info (EERE)

Building Energy Tools Software Directory Building Energy Tools Software Directory Jump to: navigation, search Tool Summary Name: Building Energy Tools Software Directory Agency/Company /Organization: United States Department of Energy Sector: Energy Focus Area: Energy Efficiency, Buildings Phase: Create a Vision, Determine Baseline, Develop Goals Topics: Technology characterizations Resource Type: Dataset, Software/modeling tools User Interface: Website Website: apps1.eere.energy.gov/buildings/tools_directory/ References: http://apps1.eere.energy.gov/buildings/tools_directory/ Logo: Building Energy Tools Software Directory This directory provides information on 388 building software tools for evaluating energy efficiency, renewable energy, and sustainability in buildings. The energy tools listed in this directory include databases,

109

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

110

The 2010 ERC Directory of Waste-to-Energy Plants  

E-Print Network (OSTI)

1 The 2010 ERC Directory of Waste-to-Energy Plants By Ted Michaels The 2010 ERC Directory of Waste-to-Energy Plants provides current information about the waste-to-energy sector in the United States. Since this Directory was last published in 2007, waste-to-energy capacity has increased for the first time in many

Columbia University

111

Global Change Master Directory | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Change Master Directory Global Change Master Directory Energy Data Apps Maps Challenges Resources Blogs Let's Talk Energy Beta You are here Data.gov » Communities » Energy » Data Global Change Master Directory Dataset Summary Description The GCMD database holds more than 30,000 descriptions of Earth science data sets and services covering all aspects of Earth and environmental sciences. Tags {Agriculture,atmosphere,biosphere,bilogy,climate,cryosphere,"land surface",oceans,paleoclimate,"solid Earth",Sun,"terrestrial hydrosphere",NASA,GSFC,"Goddard Space Flight Center"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 01-Jan-2010 Publisher National Aeronautics and Space Administration

112

Directory of Energy Information Administration Models 1993  

SciTech Connect

This directory contains descriptions about each model, including the title, acronym, purpose, followed by more detailed information on characteristics, uses, and requirements. Sources for additional information are identified. Included in this directory are 35 EIA models active as of May 1, 1993. Models that run on personal computers are identified by ``PC`` as part of the acronym. EIA is developing new models, a National Energy Modeling System (NEMS), and is making changes to existing models to include new technologies, environmental issues, conservation, and renewables, as well as extend forecast horizon. Other parts of the Department are involved in this modeling effort. A fully operational model is planned which will integrate completed segments of NEMS for its first official application--preparation of EIA`s Annual Energy Outlook 1994. Abstracts for the new models will be included in next year`s version of this directory.

Not Available

1993-07-06T23:59:59.000Z

113

Directory of Energy Information Administration models, 1990  

SciTech Connect

This directory revises and updates the Directory of Energy Information Administration Models, DOE/EIA-0293(89), Energy Information Administration (EIA), US Department of Energy, May 1989. The major changes are the inclusion of the Building Energy End-Use Model (BEEM-PC), Residential Energy End-Use Model (REEM-PC), the Refinery Yield Model Spreadsheet System (RYMSS-PC), and the Capital Stock Model (CAPSTOCK-PC). Also, the following models have been inactivated: Energy Disaggregated Input-Output Model (EDIO), Household Model of Energy (HOME3-PC), Commercial Sector Energy Model (CSEM-PC), Outer Continental Shelf Oil and Gas Supply Model (OCSM), and the Stock Module of the Intermediate Future Forecasting System (STOCK). This directory contains descriptions about each basic and auxiliary model, including the title, acronym, purpose, and type, followed by more detailed information on characteristics, uses, and requirements. For developing models, limited information is provided. Sources for additional information are identified. Included in this directory are 38 EIA models active as of March 1, 1990, as well as the PC-AEO Forecasting Model Overview and the three Subsystems for the Short-Term Integrated Forecasting System (STIFS) Model. Models that run on personal computers are identified by PC'' as part of the acronym.

Not Available

1990-06-04T23:59:59.000Z

114

EIA Publications Directory, 1977--1989  

SciTech Connect

Enacted in 1977, the Department of Energy (DOE) Organization Act established the Energy Information Administration (EIA) as the Department's independent statistical and analytical agency, with a mandate to collect and publish data and prepare analyses on energy production, consumption, prices, and resources, and projections of energy supply and demand. This cumulative edition of the EIA Publications Directory (formerly entitled EIA Publications Directory: A User's Guide) contains titles and abstracts of periodicals and one-time reports produced by the EIA from October 1977 through December 1989. It supersedes all previous issues of the Directory. EIA publications have undergone a great many changes over the last decade. The EIA inherited periodicals from the Bureau of Mines, Federal Power Commission, and the Federal Energy Administration. Some of these periodicals have been retitled, consolidated, or discontinued. These changes are noted in the abstracts. The body of the Directory contains citations and abstracts arranged by broad subject categories, such as coal, petroleum, and natural gas and subcategories such as reserves, products and byproducts, and marketing and economics. All reports are indexed alphabetically by subject and title and numerically by report number. EIA appreciates the assistance of DOE's Office of Scientific and Technical Information in sharing portions of the Energy Data Base.

Not Available

1990-06-01T23:59:59.000Z

115

ESnet IPv6 Mirror Servers  

NLE Websites -- All DOE Office Websites (Extended Search)

Mirror Servers Engineering Services The Network OSCARS Fasterdata IPv6 Network IPv6 Implementation Checklist ESnet IPv6 Mirror Servers ESnet IPv6 History ESnet supports Sandia and...

116

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

117

Servers Made to Order  

SciTech Connect

Virtualization is a hot buzzword right now, and it’s no wonder federal agencies are coming around to the idea of consolidating their servers and storage. Traditional servers do nothing for about 80% of their lifecycle, yet use nearly half their peak energy consumption which wastes capacity and power. Server virtualization creates logical "machines" on a single physical server. At the Pacific Northwest National Laboratory in Richland, Washington, using virtualization technology is proving to be a cost-effective way to make better use of current server hardware resources while reducing hardware lifecycle costs and cooling demands, and saving precious data center space. And as an added bonus, virtualization also ties in with the Laboratory’s mission to be responsible stewards of the environment as well as the Department of Energy’s assets. This article explains why even the smallest IT shops can benefit from the Laboratory’s best practices.

Anderson, Daryl L.

2007-11-01T23:59:59.000Z

118

Directory of Potential Stakeholders for DOE Actions under NEPA | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Directory of Potential Stakeholders for DOE Actions under NEPA Directory of Potential Stakeholders for DOE Actions under NEPA Directory of Potential Stakeholders for DOE Actions under NEPA DOE Offices are encouraged to be inclusive in providing potentially interested parties with opportunities to review NEPA documents. This Directory of Potential Stakeholders for DOE Actions under NEPA is primarily intended to supplement lists that Departmental Offices compile for individual projects or facilities. It complements the EIS Distribution Guidance. The Office of NEPA Policy and Compliance updates this Directory annually in July and may issue revisions throughout the year as new information becomes available. NEPAStakeholdersDirectory_10_29_13.pdf More Documents & Publications Diversity Employment and Recruitment Sources

119

Directory of energy information administration models 1995  

SciTech Connect

This updated directory has been published annually; after this issue, it will be published only biennially. The Disruption Impact Simulator Model in use by EIA is included. Model descriptions have been updated according to revised documentation approved during the past year. This directory contains descriptions about each model, including title, acronym, purpose, followed by more detailed information on characteristics, uses, and requirements. Sources for additional information are identified. Included are 37 EIA models active as of February 1, 1995. The first group is the National Energy Modeling System (NEMS) models. The second group is all other EIA models that are not part of NEMS. Appendix A identifies major EIA modeling systems and the models within these systems. Appendix B is a summary of the `Annual Energy Outlook` Forecasting System.

NONE

1995-07-13T23:59:59.000Z

120

Directory of Standard, Optional and Other Agency Forms  

Directives, Delegations, and Requirements

The directive lists the Directory of Standard, Optional and Other Agency Forms and includes a list of Departmental reports and forms managers. Cancels DOE 1322.4A.

1989-12-12T23:59:59.000Z

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Bureau of Land Management - Washington Office Directories | Open...  

Open Energy Info (EERE)

p?titleBureauofLandManagement-WashingtonOfficeDirectories&oldid793278" Categories: References Geothermal References Solar References Utilities References Bulk Transmission...

122

Directory of contractors supported by Division of Nuclear Physics  

SciTech Connect

The directory includes the name of the institution, principal investigator, contract numbers, addresses, and phone numbers. Some contract titles are included. (WHK)

Not Available

1981-12-01T23:59:59.000Z

123

Directory of Small Business Program Managers (SBPMs)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

smallbusiness.energy.gov smallbusiness.energy.gov Office of Small and Disadvantaged Business Utilization (OSDBU) U.S. Department of Energy Office of Small and Disadvantaged Business Utilization 1000 Independence Ave., SW Washington, DC 20585 DIRECTORY OF SMALL BUSINESS PROGRAM MANAGERS (SBPMs) Section I CONTENTS Headquarters Program Elements/Offices ....................................................... Section I Contracting Activities/Offices ........................................................................ Section II Facility Management Contractors (FMCs) .................................................... Section III

124

Environmental/Radiological Assistance Directory (ERAD)  

Energy.gov (U.S. Department of Energy (DOE))

The Environmental Radiological Assistance Directory or ERAD, developed by HS-22, serves as an assistance tool to the DOE complex for protection of the public and environment from radiation. The ERAD is a combination webinar/conference call, designed to provide DOE and its contractors a forum to share information, lessons-learned, best practices, emerging trends, compliance issues, etc. in support of radiological protection programs developed in accordance with DOE O 458.1. ERAD Presentations, Questions and Answers ERAD

125

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

126

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

127

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

128

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

129

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

130

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

131

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

132

Hanford Site radioactive hazardous materials packaging directory  

SciTech Connect

The Hanford Site Radioactive Hazardous Materials Packaging Directory (RHMPD) provides information concerning packagings owned or routinely leased by Westinghouse Hanford Company (WHC) for offsite shipments or onsite transfers of hazardous materials. Specific information is provided for selected packagings including the following: general description; approval documents/specifications (Certificates of Compliance and Safety Analysis Reports for Packaging); technical information (drawing numbers and dimensions); approved contents; areas of operation; and general information. Packaging Operations & Development (PO&D) maintains the RHMPD and may be contacted for additional information or assistance in obtaining referenced documentation or assistance concerning packaging selection, availability, and usage.

McCarthy, T.L.

1995-12-01T23:59:59.000Z

133

Directory of RivDIS data  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory of RivDIS data Directory of RivDIS data The data consists of tabular data files, html summary tables, and gif images. The images summarize all existing data except for Discharge vs Year, which shows only 1960 - 1990. This index is organized by Country, River, and Station. Clicking on a letter link scrolls you to a country beginning with that letter. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The most recent update at 10:57:50 on 12/29/1999 included 1018 stations out of the total 1018 stations. See also the README file and the RivDIS Online Home Page for further information. Albania A B C D E F G H I J K L M N O P Q R S T U V W X Y Z (Devolli River) Kokel: Data Summary and Plots (Drini River) Kalimash: Data Summary and Plots (Drini i Zi River) Ura e Dodes: Data

134

Environment, Environmental Restoration, and Waste Management Field Organization Directory  

SciTech Connect

This directory was developed by the Office of Environmental Guidance, RCRA/CERCLA Division (EH-231) from an outgrowth of the Departments efforts to identify and establish the regulatory response lead persons in the Field Organizations. The directory was developed for intemal EH-231 use to identify both the DOE and DOE contractor Field Organizations in the Environment, Environmental Restoration and Waste Management areas. The Field Organization directory is divided into three substantive sections: (1) Environment; (2) Environmental Restoration; and (3) Waste Management which are organized to correspond to the management hierarchy at each Field Organization. The information provided includes the facility name and address, individual managers name, and telephone/fax numbers.

Not Available

1993-07-01T23:59:59.000Z

135

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

136

Office of NEPA Policy and Compliance, Staff Directory  

Energy.gov (U.S. Department of Energy (DOE))

Office of NEPA Policy and Compliance, Staff Directory including phone number and areas of responsibility for the  Energy and Waste Management Unit, Western Energy and Waste Management Unit, and the...

137

Directory of coal production ownership, 1979  

SciTech Connect

Ownership patterns in the coal industry are highly complex. Many producers are diversified into other lines of activity. The pattern and extent of this diversification has varied through time. In the past, steel and nonferrous metals companies had major coal industry involvement. This is still true today. However, other types of enterprises have entered the industry de novo or through merger. Those of greatest significance in recent times have involved petroleum and particularly public utility companies. This report attempts to identify, as accurately as possible, production ownership patterns in the coal industry. The audience for this Directory is anyone who is interested in accurately tracing the ownership of coal companies to parent companies, or who is concerned about the structure of ownership in the US coal industry. This audience includes coal industry specialists, coal industry policy analysts, economists, financial analysts, and members of the investment community.

Thompson, B.

1981-10-01T23:59:59.000Z

138

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

139

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

140

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

142

U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

143

Covered Product Category: Enterprise Servers  

Energy.gov (U.S. Department of Energy (DOE))

The Federal Energy Management Program (FEMP) provides acquisition guidance and Federal efficiency requirements for enterprise servers, which are covered by the ENERGY STAR program.

144

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

145

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

146

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

147

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers (EERE)

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

148

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

149

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

150

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

151

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

152

OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY Carol Borgstrom, Director 202-586-4600 Carol.Borgstrom@hq.doe.gov Lettie Wormley, Secretary 202-586-4610 Lettie.Wormley@hq.doe.gov Eastern Energy and Waste Management Unit Contact Program/Responsibility Special Projects or Topics Brian Costner Brian.Costner@hq.doe.gov 202-586-9924 Unit Leader Yardena Mansoor Yardena.Mansoor@hq.doe.gov 202-586-9326 Office of Environmental Management * Oak Ridge Office * Savannah River Operations Office Office of Fossil Energy * Strategic Reserves * Liquefied Natural Gas (LNG) Office of Electricity Delivery and Energy Reliability * Champlain Hudson Power Express Western Area Power Administration Bonneville Power Administration

153

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

154

Thode Library Directory http://library.mcmaster.ca  

E-Print Network (OSTI)

Thode Library Directory http://library.mcmaster.ca 2012/13 Lower Level Bookstacks ( QD- Z) Library Service Desk (Circulation, Reserve, ILL, Research Help, Short Term Loan Collection) Learning Interactive Knowledge (ThInK) Space (classroom) (301) iSci Student Study Space (303) iSci Faculty Work Room

Haykin, Simon

155

Faculty/Staff Directory 200 W. Kawili Street  

E-Print Network (OSTI)

;2 2011-12 HawCC STAFF DIRECTORY COMMUNITY COLLEGE GENERAL INFORMATION NUMBERS Honolulu Community College.......................................................................... Diesel Shop 324.................Machine, Welding & Industrial Mechanics Tech 330..............Architectural, Engineering & CAD Technologies/ Hawaiian Life Styles/I Ola Hloa/ OCET Computer Learning Center

Dong, Yingfei

156

Geriatric Health Speakers 2009 WVGEC Leadership Summit Directory  

E-Print Network (OSTI)

@marshall.edu End of Life Care Crystal Adkins MA, LSW UMWA Health and Retirement Funds, Box 850, Chapmanville, WV@mail.wvu.edu Get List from Organization for Speakers Megan Lasure New River Health-Living Well Elder Care Clinic, P WVGEC Leadership Summit Directory Page 3 Health Care Issues Sherry Kuhl MSW WVU Center on Aging, HSC

Mohaghegh, Shahab

157

1990 Washington State directory of biomass energy facilities  

SciTech Connect

This second edition is an update of biomass energy production and use in Washington State for 1989. The purpose of this directory is to provide a listing of known biomass users within the state and some basic information about their facilities. The data can be helpful to persons or organizations considering the use of biomass fuels. The directory is divided into three sections of biomass facilities with each section containing a map of locations and a data summary table. In addition, a conversion table, a glossary and an index are provided in the back of the directory. The first section deals with biogas production from wastewater treatment plants. The second section provides information on the wood combustion facilities in the state. This section is subdivided into two categories. The first is for facilities connected with the forest products industries. The second category include other facilities using wood for energy. The third section is composed of three different types of biomass facilities -- ethanol, municipal solid waste, and solid fuel processing. Biomass facilities included in this directory produce over 64 trillion Btu (British thermal units) per year. Wood combustion facilities account for 91 percent of the total. Biogas and ethanol facilities each produce close to 800 billion Btu per year, MSW facilities produce 1845 billion BTU, and solid fuel processing facilities produce 2321 billion Btu per year. To put these numbers in perspective, Washington's industrial section uses 200 trillion Btu of fuels per year. Therefore, biomass fuels used and/or produced by facilities listed in this directory account for nearly 32 percent of the state's total industrial fuel demand. This is a sizable contribution to the state's energy needs.

Deshaye, J.A.; Kerstetter, J.D.

1990-01-01T23:59:59.000Z

158

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network (OSTI)

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

159

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network (OSTI)

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

160

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 Directory of Potential Stakeholders for DOE Actions under NEPA 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued July 31, 2013 - 5:02pm Addthis 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued The Stakeholder Directory, now in its 30th edition, identifies contacts in federal agencies; states, territories, and state government associations; and nongovernmental organizations for reviewing environmental impact statements and environmental assessments, and for other NEPA public involvement and consultation activities. The Directory is primarily intended to supplement lists that Departmental Offices compile for individual projects or facilities. Addthis Related Articles Obama Officials Announce Steps to Promote the Clean Energy Potential of the

162

2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2013 Directory of Potential Stakeholders for DOE Actions under NEPA 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued July 31, 2013 - 5:02pm Addthis 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued The Stakeholder Directory, now in its 30th edition, identifies contacts in federal agencies; states, territories, and state government associations; and nongovernmental organizations for reviewing environmental impact statements and environmental assessments, and for other NEPA public involvement and consultation activities. The Directory is primarily intended to supplement lists that Departmental Offices compile for individual projects or facilities. Addthis Related Articles Secretary Chu Announces Efforts to Strengthen U.S. Electric Transmission

163

Hydrogen Visual CDP Directory (Sunburst) | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Hydrogen Visual CDP Directory (Sunburst) Jump to: navigation, search Ret Left click to go straight to a CDP. Right click to find more information. The interactive graphic on this page links to all of the Composite Data Products, organized by topic. You can find this complete listing on the Composite Data Products by Topic Web page. If you need additional assistance finding a Composite Data Product, please email us. rieved from "http://en.openei.org/w/index.php?title=Hydrogen_Visual_CDP_Directory_(Sunburst)&oldid=618100" What links here Related changes Special pages

164

Refrigerator/freezer directory: sorted by type and volume, based on 1979 standards  

SciTech Connect

This directory identifies refrigerators, freezers and combinations thereof, that have been certified as complying with the regulations that became effective on November 3, 1979.

Not Available

1980-02-29T23:59:59.000Z

165

Data Centers and Servers | Department of Energy  

Office of Environmental Management (EM)

Data Centers and Servers Data Centers and Servers Photo of the Green Data Center at the Research Support Facility. Data centers are one of the most energy-intensive building types,...

166

Fair capacity sharing of multiple aperiodic servers  

E-Print Network (OSTI)

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

167

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

168

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

169

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers (EERE)

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

170

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

171

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

172

Directory of Energy Data Collection Forms: Forms in use as of October 1993  

SciTech Connect

This is the seventeenth edition of the Directory of Energy Data Collection forms, an authoritative listing of selected public use forms currently used as basic energy information gathering tools by the Department of Energy (DOE). Originally entitled EIA Data Collection forms, this directory provides an overview of DOE`s energy information collection programs for decisionmakers in Government and industry.

Not Available

1993-12-28T23:59:59.000Z

173

Request to the Energy Commission for Designation as Approved Trade Association Directory  

E-Print Network (OSTI)

) publishes a paper or electronic directory; (C) is designated, under Sections 1602(a) and 1603(b) of Title 20 ENERGY COMMISSION APPLIANCE PROGRAM ­ SECTION 1606(h), TITLE 20, CALIFORNIA CODE OF REGULATIONS (1 in Section 1606(h) of Title 20 of the California Code of Regulations; and (B) the published directory

174

Cache directory look-up re-use as conflict check mechanism for speculative memory requests  

DOE Patents (OSTI)

In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

Ohmacht, Martin

2013-09-10T23:59:59.000Z

175

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Ruby Mail Gem Directory Traversal and Shell Command 57: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities April 27, 2012 - 7:00am Addthis PROBLEM: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities PLATFORM: Mail gem for Ruby 2.x ABSTRACT: Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system. Reference Links: Secunia Advisory SA48970 CVE-2012-2139 CVE-2012-2140 IMPACT ASSESSMENT: Medium Discussion: Input passed via the "to" parameter within the file delivery method is not properly verified before being used and can be exploited to modify arbitrary files via directory traversal attacks. Certain input passed to

176

An Information Services Algorithm to Heuristically Summarize IP Addresses for a Distributed, Hierarchical Directory Service  

NLE Websites -- All DOE Office Websites (Extended Search)

information services algorithm to heuristically summarize IP addresses for a information services algorithm to heuristically summarize IP addresses for a distributed, hierarchical directory service Marcos Portnoi, Martin Swany Department of Computer and Information Sciences University of Delaware Newark, DE 19716, U.S.A. {portnoi, swany}@cis.udel.edu Jason Zurawski Internet2 Washington, DC 20036, U.S.A. zurawski@internet2.edu Abstract- A distributed, hierarchical information service for computer networks might use several service instances, located in different layers. A distributed directory service, for example, might be comprised of upper level listings, and local directories. The upper level listings contain a compact version of the local directories. Clients desiring to access the information contained in local directories might first access the

177

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

178

EIA directory of electronic products, first quarter 1995  

SciTech Connect

The Energy Information Administration (EIA) makes available for public use a series of machine-readable data files and computer models. The data files and models are made available to the public on magnetic tapes. In addition, selected data files/models are available on diskette for IBM-compatible personal computers. EIA, as the independent statistical and analytical branch of the Department of Energy, provides assistance to the general public through the National Energy Information Center (NEIC). For each product listed in this directory, a detailed abstract is provided which describes the data published. Specific technical questions may be referred to the appropriate contact person.

NONE

1995-06-01T23:59:59.000Z

179

Energy-efficiency directory of refrigerators and refrigerator-freezers  

SciTech Connect

Information is presented about the energy costs of operating refrigerators and refrigerator-freezers and includes the type of refrigerator or refrigerator-freezer, the fresh food volume, the freezer volume, the total volume, and the yearly energy cost. The directory lists all currently marketed electric refrigerators and refrigerator-freezers that have Energy Guide labels. The Federal Trade Commission requires manufacturers who distribute refrigerators and refrigerator-freezers to attach Energy Guide labels to appliances manufactured on or after May 19, 1980. The data have been measured by manufacturers and/or their agents according to US Government standard test procedures.

Statt, T.G.; Coggins, J.L.

1981-06-01T23:59:59.000Z

180

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network (OSTI)

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

182

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

183

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

184

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

185

World Wide Web Information Servers  

NLE Websites -- All DOE Office Websites (Extended Search)

World Wide Web Information Servers World Wide Web Information Servers Lawrence Berkeley Laboratory recently announced a gopher and World Wide Web site. To get to the web site, telnet to www.lbl.gov, login: www. Access is provided to LBL's gopher, library catalog, and publication list. The Center is funding the implementation of a WWW network node for on-line access to publications, databases, and documents full of hypermedia links to other documents or information systems from the Energy & Environment Division. Full implementation is expected by May 1994, and will include access to a variety of information from all the research programs and centers. The technology transfer project calls for this newsletter to be published on WWW using the Mosaic interface under development at the National Center

186

V-055: Firefly Media Server Null Pointer Dereference Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference...

187

T-710: Apache HTTP Server Overlapping Ranges Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability September 6, 2011 - 3:09am...

188

U-094: EMC Documentum Content Server Lets Local Administrative...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated...

189

Directory of Energy Data Collection Forms: Forms in use as of October 1996  

SciTech Connect

This is the twentieth edition of the Directory of Energy Collection Data Forms, an authoritative listing of selected public use forms currently used as basic energy information gathering tools by the Department of Energy.

NONE

1996-12-01T23:59:59.000Z

190

Directory of energy data collection forms. Forms in use as of October 1995  

SciTech Connect

This is an authoritative listing of selected public use forms currently used as basic energy information gathering tools by the Department of Energy (DOE). This directory provides an overview of DOE`s energy information collection programs for decisionmakers in Government and industry. Forms designed to collect energy information and used by the Energy Information Administration (EIA) as of October 1995 are included in this directory. For each form listed in this directory, an abstract is included that describes the form`s uses, its respondents, and the data collected. For the reader`s convenience in finding specific types of collections, several indices have been provided in this directory. A listing of the forms grouped by energy source and function begins on page 26. Beginning on page 38 are the publications derived from the collections, and on page 50, are the forms linked to general respondent categories.

NONE

1996-01-01T23:59:59.000Z

191

Towards Semantic Web-Based Yellow Page Directory Services Mikko Laukkanen  

E-Print Network (OSTI)

Towards Semantic Web-Based Yellow Page Directory Services Mikko Laukkanen TeliaSonera Finland P.O. Box 970 (Teollisuuskatu 13), FIN-00051 Sonera, Finland mikko.laukkanen@teliasonera.com Kim Viljanen

Hyvönen, Eero

192

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

193

EIA directory of electronic products. Second quarter 1995  

SciTech Connect

The Energy Information Administration (EIA) makes available for public use a series of machine-readable data files and computer models. They are available to the public on magnetic tapes; selected data files/models are available on diskette for IBM-compatible personal computers. This directory first presents the on-line files and compact discs. This is followed by descriptions and technical contacts and ordering and other information on the data files and models. An index by energy source is included. Additional ordering information is in the preface. The data files cover petroleum, natural gas, electricity, coal, integrated statistics, and consumption; the models cover petroleum, natural gas, electricity, coal, nuclear, and multifuel.

NONE

1995-10-04T23:59:59.000Z

194

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2011 server contenuto nel cookie) Goy - a.a. 2011/2012 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita

Goy, Anna

195

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2012 server contenuto nel cookie) Goy - a.a. 2012/2013 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita

Goy, Anna

196

Dynamic, transparent Internet server replication using HYDRANET  

E-Print Network (OSTI)

) in the Internet. These agents will replicate the transport-level service access points of their origin servers and begin serving clients in the name of the origin server. A new protocol and application API was also developed that manages this service replication...

Dillon, Geoffrey A.

1998-01-01T23:59:59.000Z

197

Building Energy Software Tools Directory: Tools by Subject - Other  

NLE Websites -- All DOE Office Websites (Extended Search)

Multibuilding Facilities Multibuilding Facilities A B C E F G H I K L M N O P Q R T U V W Tool Applications Free Recently Updated AcousticCalc HVAC acoustics, sound level prediction, noise level Benchmata Automated Benchmarking System Automation Portfolio Manager Software has been updated. BuildingAdvice Whole building analysis, energy simulation, renewable energy, retrofit analysis, sustainability/green buildings Software has been updated. Carbon Estates Energy Benchmarking; Retrofitting Simulation; Energy Management; Carbon Management Software has been updated. Commodity Server energy database server, time series energy, portfolio management CONTAM airflow analysis; building controls; contaminant dispersal; indoor air quality, multizone analysis, smoke control, smoke management, ventilation Free software. Software has been updated.

198

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

199

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

200

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

202

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

203

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

204

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

205

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

206

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

207

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

208

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

209

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

210

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

211

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

212

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

213

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

214

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

215

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

216

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

217

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

218

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

219

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

220

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

222

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

223

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

224

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

225

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

226

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

227

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

228

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

229

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

230

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

231

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

232

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

233

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

234

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

235

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

236

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

237

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

238

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

239

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

240

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

242

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

243

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

244

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

245

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

246

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

247

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

248

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

249

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

250

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

251

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

252

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

253

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

254

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

255

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

256

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

257

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

258

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

259

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

260

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

262

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

263

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

264

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

265

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

266

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

267

Chapter 2 - Web Server Hacking  

Science Journals Connector (OSTI)

Abstract This chapter covers the fundamental process of hacking a web server by using several seminal network hacking tools. It is critical to understand what each of these tools is trying to accomplish and how to effectively use it yourself. The process is very structured with port scanning with Nmap, vulnerability scanning with Nesssus and Nikto, exploitation with Metasploit, and maintaining access (persistence) with Netcat. It introduces an easy-to-follow process for using each of these tools at the appropriate time with the appropriate technique to ensure high-quality results. This tool-driven approach is the same type of thinking that is used throughout the book on other targets such as the web application and web users.

Josh Pauli

2013-01-01T23:59:59.000Z

268

E-Print Network 3.0 - advanced server klasterdamise Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

server klasterdamise Search Powered by Explorit Topic List Advanced Search Sample search results for: advanced server klasterdamise Page: << < 1 2 3 4 5 > >> 1 Windows Server 2008...

269

Personnel involved in nuclear standards development: 1980 directory  

SciTech Connect

The development of nuclear standards is an active and necessary endeavor that is concerned with the safe, orderly, and economic development of nuclear potential. There are almost 4100 people from the teachnical community who are presently involved either in writing nuclear standards, including codes, or in the management and processing roles necessary for their approval and promulgation. This document identifies the current participation of each individual as member, chairman, cochairman (vice-chairman), or secretary of about 700 standards development committees and groups. The standards committees and groups are identified with the organizations that are responsible for the preparation, review, and maintenance of the standards and that provide support through supervisory committees and headquarters staff. This directory includes four major sections: personnel, employers, committees, and a Key-Word-in-Context (KWIC) Index of committee titles. It can also be used to identify the participation of employers as well as to recognize the contributions of individuals to the often interdisciplinary activity of standards development.

Carr, S.J. (ed.)

1980-03-01T23:59:59.000Z

270

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 9, 2011 September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 7, 2011 T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks. September 6, 2011 T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. September 2, 2011 T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed By Remote Users Mac OS X keychain certificate settings can be bypassed by remote users September 1, 2011 T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code Pidgin bugs let remote users deny service and potentially execute arbitrary

271

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network (OSTI)

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

272

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

273

Directory of Service and Product Providers | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory of Service and Product Providers Directory of Service and Product Providers Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories

274

Data sources directory for purchasing officials: Energy-efficient and environmentally preferred products  

SciTech Connect

This Directory, produced by the New York State Energy Research and Development Authority, is an introduction to organizations that provide information about energy-efficient and environmentally preferred equipment and products. It is intended to be a reference tool for purchasing officials in the public and private sectors. The New York State Energy Research and Development Authority does not endorse any particular vendor, organization, or technology. This list was prepared to provide information. The companies listed may provide additional products and/or services not mentioned in this directory.

NONE

1995-09-01T23:59:59.000Z

275

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

276

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

277

Building Energy Software Tools Directory: Data Center Efficiency Savings  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Center Efficiency Savings Calculator Data Center Efficiency Savings Calculator 42U's Data Center Efficiency Savings Calculator helps IT Professionals and C-level management understand the short- and long-term savings that can be achieved by improving the energy efficiency of their data center infrastructure. Efficiency savings are financial (Capital expense [CAPEX] and operating expense [OPEX]) and environmental because carbon dioxide (CO2) emissions are reduced. The calculator is designed to help determine savings for any size data center, computer room, server room, or wiring closet. Keywords Energy Efficiency Calculator for Data Centers. Validation/Testing Average retail commercial energy prices provided by the U.S. Energy Information Administration. Expertise Required Basic understanding of data center PUE and IT energy load helpful, but not

278

Building Energy Software Tools Directory: EnergyCAP Professional  

NLE Websites -- All DOE Office Websites (Extended Search)

Professional Professional EnergyCAP Professional logo. Online software for domestic public school districts (see EnergyCAP Enterprise and Express for other organizations) that need straightforward utility bill tracking, energy management reports and calculation of the cost avoidance attributable to energy management activities. A typical Professional client has 50–1,000 utility accounts and pays $500,000 to $10 million per year. Professional Online is primarily used from one energy management or utilities management office. It uses Microsoft's SQL Server database. Multiple users can access the data simultaneously. EnergyCAP Professional Online is perfect for school districts that need: Verification of utility bills. EnergyCAP's exclusive Bill Auditor checks each bill more than 50 ways for reasonableness.

279

U-181: IBM WebSphere Application Server Information Disclosure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere Application Server Information Disclosure 1: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information. Reference Links: Secunia Advisory 49352 CVE-2012-2170 Vendor Advisory IMPACT ASSESSMENT: High Discussion: WebSphere Application Server Administration Console is vulnerable to cross-site scripting, caused by improper validation of user-supplied input

280

Evaluation of data and request distribution policies in clustered servers  

E-Print Network (OSTI)

The popularity of the WWW has skyrocketed beyond all expectations and as a result the demands placed on traditional single machine servers has exceeded their original designs. Clustered-based servers are considered to be a viable alternative...

Khaleel, Adnan

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

282

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

283

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

284

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

285

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

286

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

287

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

288

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

289

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

290

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

291

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

292

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

293

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

294

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

295

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

296

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

297

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

298

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

299

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

300

Stochastic Models and Analysis for Resource Management in Server Farms  

E-Print Network (OSTI)

farms. State-of-the-art servers come with multiple knobs to control energy consumption, but traditionalStochastic Models and Analysis for Resource Management in Server Farms Varun Gupta CMU-CS-11, Multi-server systems, Load balancing, Scheduling, M/G/k, Time-varying load, Energy management

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Securing SQL Server: Protecting Your Database from Attackers, 2 edition  

Science Journals Connector (OSTI)

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server ...

Denny Cherry

2012-07-01T23:59:59.000Z

302

c 2013 Philbert R. Lin A LAZY DIRECTORY-BASED IMPLEMENTATION OF CONSISTENT  

E-Print Network (OSTI)

Introduction With the rise of big data and cloud computing the amount of information that backend of Science in Electrical and Computer Engineering in the Graduate College of the University of Illinois two directory-based data- stores which make strong application semantics a primary requirement based

Vaidya, Nitin

303

Cache directory lookup reader set encoding for partial cache line speculation support  

DOE Patents (OSTI)

In a multiprocessor system, with conflict checking implemented in a directory lookup of a shared cache memory, a reader set encoding permits dynamic recordation of read accesses. The reader set encoding includes an indication of a portion of a line read, for instance by indicating boundaries of read accesses. Different encodings may apply to different types of speculative execution.

Gara, Alan; Ohmacht, Martin

2014-10-21T23:59:59.000Z

304

The Impact of Dynamic Directories on Multicore Interconnects MATT SCHUCHHARDT, Northwestern University  

E-Print Network (OSTI)

consumption by up to 37.3% (22.9% on average for scientific workloads, and 8.0% for Map-Reduce). 1 Directories on the performance, power, and energy consumption of a multicore processor. We show its. This eliminates a large fraction of on-chip interconnect traversals, thus reducing interconnect power and energy

Kuzmanovic, Aleksandar

305

The Blue Book, 1933: the Directory and Handbook of the Electrical Engineering and Allied Trades  

Science Journals Connector (OSTI)

... is well known to the electrical engineering and allied trades as an excellent directory and handbook. It has now reached its fifty-first edition, so it started practically at the ... at the same time as the electrical industry. The matter is excellently arranged. All electricians and manufacturers are given individually. The latter are also arranged under the headings of ...

1933-08-12T23:59:59.000Z

306

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2010 contenuto nel cookie) Goy - a.a. 2010/2011 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita setcookie

Goy, Anna

307

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2009 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2009/2010 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

308

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2010 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2010/2011 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

309

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2009) Goy - a.a. 2009/2010 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita setcookie(...): nome del cookie

Goy, Anna

310

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2012 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2012/2013 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

311

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2011 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2011/2012 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

312

NEOS Server 4.0 Administrative Guide  

E-Print Network (OSTI)

May 30, 2002 ... automatically integrated into the NEOS Server. ... The user interfaces provided by NEOS are tailored to each particular ...... The manner in which an application reads options affects the amount of control users .... The remainder of this document is not intended for the casual reader interested only in the ...

2002-06-03T23:59:59.000Z

313

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

314

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

315

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

316

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

317

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

318

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

319

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

320

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

322

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

323

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

324

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

325

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

326

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

327

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

328

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

329

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network (OSTI)

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

330

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network (OSTI)

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

331

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

332

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

333

Directory -Division of Social Sciences June 2013 Dean's Office Jeff Elman (Dean) deansocsci@ucsd.edu x46073  

E-Print Network (OSTI)

June 20131 Directory - Division of Social Sciences ­ June 2013 Dean's Office Jeff Elman (Dean) Todd Williams (SSCF-S Network Manager) dbfink@ucsd.edu t1williams@ucsd.edu X42617 X48231 Development

Tsien, Roger Y.

334

T-710: Apache HTTP Server Overlapping Ranges Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Apache HTTP Server Overlapping Ranges Denial of Service 10: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability September 6, 2011 - 3:09am Addthis PROBLEM: Apache HTTP Server contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. PLATFORM: Apache HTTP Server versions 2.2.19 and prior ABSTRACT: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. reference LINKS: FreeBSD VuXML Document Advisory ID: cisco-sa-20110830-apache IBM Alert: swg21512087 Red Hat Advisory: RHSA-2011:1245-1 CVE-2011-3192 CVE-2011-3192 (Update2) IMPACT ASSESSMENT: High Discussion: The vulnerability is due to improper processing of certain user-supplied requests by the affected software. An unauthenticated, remote attacker

335

Fact Sheet: Improving Energy Efficiency for Server Rooms and Closets  

E-Print Network (OSTI)

block holes between servers in racks Airflow management iswithin and between the racks and the openings in the floorserver energy use. 10. Implement rack/infrastructure power

Cheung, Hoi Ying Iris

2014-01-01T23:59:59.000Z

336

2014-02-21 Issuance: Proposed Determination of Computer Servers...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

a Covered Consumer Product; Withdrawal 2014-02-21 Issuance: Proposed Determination of Computer Servers as a Covered Consumer Product; Withdrawal This document is a pre-publication...

337

XML and relational database management systems: inside Microsoft® SQL Server™ 2005  

Science Journals Connector (OSTI)

Microsoft® SQL Server™ has a long history of XML support dating back to 1999. While first concentrating on enabling the transport of relational data via XML with the SQL Server 2000 release, SQL Server 2005 now additionally provides native ...

Michael Rys

2005-06-01T23:59:59.000Z

338

DNS dispatching algorithms with state estimators for scalable Web-server clusters  

Science Journals Connector (OSTI)

Replication of information across a server cluster provides a promising way to support popular Web sites. However, a Web-server cluster requires some mechanism for the scheduling of requests to the most available server. One common approach ...

Valeria Cardellini; Michele Colajanni; Philip S. Yu

1999-03-01T23:59:59.000Z

339

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

340

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA,...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management...

342

V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

6: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30,...

343

V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Tivoli Monitoring Web Server HTTP TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-011: IBM Tivoli Monitoring Web Server HTTP TRACETRACK...

344

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Impact: A remote user can access internal servers. Solution: The vendor has issued a patch for version 2.2.21 Apache 2.2.21 (released 2011-09-13) Addthis Related Articles U-046:...

345

The YPA -An Assistant for Classi ed Directory Anne De Roeck 1 , Udo Kruschwitz 1 , Paul Scott 1 , Sam Steel 1 , Ray Turner 1 , and  

E-Print Network (OSTI)

The YPA - An Assistant for Classi#12;ed Directory Enquiries Anne De Roeck 1 , Udo Kruschwitz 1 , Paul Scott 1 , Sam Steel 1 , Ray Turner 1 , and Nick Webb 2 1 Department of Computer Science allows a user to access advertiser information in classi#12;ed directories [1]. It converts semi

Kruschwitz, Udo

346

Energy Consumption Characteriation of Heterogeneous Servers School of Computer Science  

E-Print Network (OSTI)

Energy Consumption Characteriation of Heterogeneous Servers Xiao Zhang School of Computer Science Machine between servers to save energy. An accurate energy consumption model is the basic of energy management. Most past studies show that energy consumption has linear relation with resource utilization. We

Qin, Xiao

347

Power and Energy Management for Server Systems Ricardo Bianchini  

E-Print Network (OSTI)

dictates its electricity costs. These costs are particularly high for a large and/or dense server cluster in cooling this server for the year. Assuming electricity costs of U$ 0.10/KWh, the total energy cost consumptions as in this example. Nevertheless, the cost of 1 #12;electricity is still significant

Bianchini, Ricardo

348

A Mathematical Programming Approach for Server Consolidation Problems  

E-Print Network (OSTI)

of energy and cooling, which sometimes account for 40-50 percent of the total data center operation costs [2 more space and consume more energy than can be justified by their workload. Server virtualization consolidation with dozens or hundreds of servers, which can be regularly found in enterprise data centers. Cost

Cengarle, María Victoria

349

XenoSite server: a web-available site of metabolism prediction tool  

Science Journals Connector (OSTI)

......research-article Applications Note XenoSite server: a web-available site of metabolism prediction...2013). This article reports a public web server that makes XenoSite available to...modified by P450s. Key features of this web server are as follows: The server computes......

Matthew K. Matlock; Tyler B. Hughes; S. Joshua Swamidass

2014-12-01T23:59:59.000Z

350

SP 800-44 Version 2. Guidelines on Securing Public Web Servers  

Science Journals Connector (OSTI)

Web servers are often the most targeted and attacked hosts on organizations' networks. As a result, it is essential to secure Web servers and the network infrastructure that supports them. This document is intended to assist organizations in installing, ... Keywords: Web server, Web server security

Miles Tracy; Wayne Jansen; Karen A. Scarfone; Theodore Winograd

2007-09-01T23:59:59.000Z

351

Appears in Computer Architecture Letters, Volume 12 (2010) SMT-Directory: Efficient Load-Load Ordering for SMT  

E-Print Network (OSTI)

-thread "read" bit to every data cache line. When a load executes, it sets the bit corresponding to its threadAppears in Computer Architecture Letters, Volume 12 (2010) SMT-Directory: Efficient Load-Load, TSO, and PC enforce load-load ordering, requiring that loads from any single thread appear to occur

Roth, Amir

352

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 24, 2011 February 24, 2011 T-564: Vulnerabilities in Citrix Licensing administration components The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. February 23, 2011 T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. February 22, 2011 T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow A vulnerability has been reported in Novell ZENworks Configuration

353

OSTI Establishes OAI Server, Achieves Broader Exposure for Records | OSTI,  

Office of Scientific and Technical Information (OSTI)

Establishes OAI Server, Achieves Broader Exposure for Records Establishes OAI Server, Achieves Broader Exposure for Records June 2005 Oak Ridge, TN - OSTI is pleased to announce the establishment of an Open Archives Initiative (OAI) server, which immediately opened more than 108,000 DOE scientific and technical reports for harvesting by the National Science Digital Library (NSDL) and other OAI users. Establishment of an OAI server achieves broader exposure of searchable science through OSTI's suite of R&D databases. By becoming a data provider adopting the OAI technical framework, OSTI took another step toward easing access and search of the deep Web. This is in keeping with OSTI's mission to advance science and sustain technological creativity by making R&D findings available and useful to DOE researchers and the American people.

354

Brillouin-zone database on the Bilbao Crystallographic Server  

Science Journals Connector (OSTI)

The Brillouin-zone database of the Bilbao Crystallographic Server (http://www.cryst.ehu.es ) is presented. Recent improvements and modifications of the database are discussed and illustrated by several examples.

Aroyo, M.I.

2014-02-12T23:59:59.000Z

355

Measuring the capacity of a Web server under realistic loads  

Science Journals Connector (OSTI)

The World Wide Web and its related applications place substantial performance demands on network servers. The ability to measure the effect of these demands is important for tuning and optimizing the various software components that make ...

Gaurav Banga; Peter Druschel

1999-01-01T23:59:59.000Z

356

On the Performance Regularity of Web Servers Yibei Ling+  

E-Print Network (OSTI)

of the system in the full spectrum of working area. Such a performance characteristic is generally overlooked and corporate intranet environment. A high-performance Web server is the key to the success of the Web

Chen, Shigang

357

A Scalable Video Server Using Intelligent Network Attached Storage  

Science Journals Connector (OSTI)

This paper proposes a new architecture, called intelligent network attached storage, for building a distributed video server. In this architecture, the data intensive and high overhead processing tasks such as data packaging and transmitting are handled ...

Guang Tan; Hai Jin; Liping Pang

2002-10-01T23:59:59.000Z

358

How to secure your servers, code and data  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. Advice and best practices regarding the security of your servers, code and data will be presented. We will also describe how the Computer Security Team can help you reduce the risks.

None

2011-10-06T23:59:59.000Z

359

Comparing Server Energy Use and Efficiency Using Small Sample Sizes  

SciTech Connect

This report documents a demonstration that compared the energy consumption and efficiency of a limited sample size of server-type IT equipment from different manufacturers by measuring power at the server power supply power cords. The results are specific to the equipment and methods used. However, it is hoped that those responsible for IT equipment selection can used the methods described to choose models that optimize energy use efficiency. The demonstration was conducted in a data center at Lawrence Berkeley National Laboratory in Berkeley, California. It was performed with five servers of similar mechanical and electronic specifications; three from Intel and one each from Dell and Supermicro. Server IT equipment is constructed using commodity components, server manufacturer-designed assemblies, and control systems. Server compute efficiency is constrained by the commodity component specifications and integration requirements. The design freedom, outside of the commodity component constraints, provides room for the manufacturer to offer a product with competitive efficiency that meets market needs at a compelling price. A goal of the demonstration was to compare and quantify the server efficiency for three different brands. The efficiency is defined as the average compute rate (computations per unit of time) divided by the average energy consumption rate. The research team used an industry standard benchmark software package to provide a repeatable software load to obtain the compute rate and provide a variety of power consumption levels. Energy use when the servers were in an idle state (not providing computing work) were also measured. At high server compute loads, all brands, using the same key components (processors and memory), had similar results; therefore, from these results, it could not be concluded that one brand is more efficient than the other brands. The test results show that the power consumption variability caused by the key components as a group is similar to all other components as a group. However, some differences were observed. The Supermicro server used 27 percent more power at idle compared to the other brands. The Intel server had a power supply control feature called cold redundancy, and the data suggest that cold redundancy can provide energy savings at low power levels. Test and evaluation methods that might be used by others having limited resources for IT equipment evaluation are explained in the report.

Coles, Henry C.; Qin, Yong; Price, Phillip N.

2014-11-01T23:59:59.000Z

360

U-253: Citrix XenServer Denial of Service and Privilege Escalation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

253: Citrix XenServer Denial of Service and Privilege Escalation 253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities U-253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities September 7, 2012 - 6:00am Addthis PROBLEM: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities PLATFORM: Citrix XenServer 5.0 Citrix XenServer 5.5 Citrix XenServer 5.6 Citrix XenServer 6.0 ABSTRACT: Citrix XenServer is prone to a local privilege-escalation vulnerability. reference LINKS: Citrix Document ID: CTX134708 Secunia Advisory SA50530 Bugtraq ID: 55432 CVE-2012-3432 CVE-2012-3433 CVE-2012-3494 CVE-2012-3495 CVE-2012-3496 CVE-2012-3498 CVE-2012-3515 CVE-2012-3516 CVE-2012-4606 IMPACT ASSESSMENT: High Discussion: A number of security vulnerabilities have been identified in Citrix

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

362

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

363

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

364

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

365

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

366

Directory of Points of Contact for the DOE Technical Standard Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-2002 2-2002 August 2002 Supersedes DOE-TSL-2-98 January 1998 DOE TECHNICAL STANDARDS LIST DIRECTORY OF POINTS OF CONTACT FOR THE DOE TECHNICAL STANDARDS PROGRAM U.S. Department of Energy AREA SDMP Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. TS NOT MEASUREMENT SENSITIVE DOE-TSL-2-2002 August 2002 Supersedes DOE-TSL-2-98 January 1998 DOE TECHNICAL STANDARDS LIST

367

Directory of energy data collection forms: Forms in use as of October 1994  

SciTech Connect

This 18th edition directory provides an overview of DOE`s energy information collection programs for decisionmakers in Government and industry; selected public use forms currently used as basic energy information gathering tools by DOE are covered. For each form, an abstract is included that describes the form`s uses, its respondents, and the data collected. Also shown are frequently requested items: energy sources and functions covered by the form, general categories of respondents, collection frequency, public laws and regulations, reporting requirement, name and phone number of the data collection manager, and the publications resulting from the data collection. Indexes, arranged according to energy source/function, publications, respondent categories, former EIA form number designations, and collection authorities, are provided.

Not Available

1994-12-15T23:59:59.000Z

368

DISTRIBUTOR DIRECTORY:  

Science Journals Connector (OSTI)

......GHANA) LTD. P.O. BOXM14 Corner Liberty, AW Derby Avenue Accra, Ghana GREECE...LEBANON Chromatlx Inc. Represented by: PROJECTS SAL P.O. Box 11-5281 Beirut, Lebanon...Applied Research Corp. Represented by: PROJECTS SAL P.O. Box 11-5281 Beirut, Lebanon......

Distributor Directory

1979-02-01T23:59:59.000Z

369

DISTRIBUTOR DIRECTORY:  

Science Journals Connector (OSTI)

......Represented by: MR. R. CUMARASAMY 21-A Liat Towers Orchard Road, Singapore-9 375148 Metrohm...Singapore 21 674977 VARIAN SEA 410 Orchard Towers 400 Orchard Road, Singapore 9 379-239...Ltd. Represented by: PHILIPS IBERICA SAE Martinez Villergas 2 Madrid 27, Spain......

Distributor Directory

1979-02-01T23:59:59.000Z

370

COMPANY DIRECTORY:  

Science Journals Connector (OSTI)

......Baker Chemical Company 222 Red School Lane Phillipsburg...Electronics, Inc. West Woods Rd. Sharon, CT 06069 203...271 Neville Road Forest Gate, London, England Ellison-Dieterich...Scientific Instruments Inc. 9147 Red Branch Road Columbia, MD......

Company Directory

1977-03-01T23:59:59.000Z

371

MU INTERNATIONAL DIRECTORY International Directory  

E-Print Network (OSTI)

of Ag., Food & Natural Resources International Programs http://students.missouri.edu/~asa Association of Malaysian Students http://www.missouri.edu/~ctl2m5/index.html Bangladesh Student Association

Taylor, Jerry

372

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

373

Numerical Simulation of Heat Transfer and Fluid Flow Characteristics of Server Rack in Datacenter  

Science Journals Connector (OSTI)

This chapter is studying the fluid mechanics and heat transfer of single server rack using the computational fluid dynamics software. The ... effect of the different structure parameters of server rack in datacen...

Jianfei Zhang; Donghao Liu; Xiping Qiao…

2014-01-01T23:59:59.000Z

374

T-621: Citrix XenServer Lets Local Administrative Users on the...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

375

T-692: VMware vFabric tc Server Lets Remote Users Login Using...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

376

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability...

377

GenomeCons: a web server for manipulating multiple genome sequence alignments and their consensus sequences  

Science Journals Connector (OSTI)

......December 2014 brief-report Applications Note GenomeCons: a web server for manipulating multiple genome sequence alignments and...molecular biological processes. In this study, we developed a web server, GenomeCons, for manipulating multiple genome sequence......

Tetsuya Sato; Mikita Suyama

2014-12-01T23:59:59.000Z

378

On improving performance and conserving power in cluster-based web servers  

E-Print Network (OSTI)

. Existing research separately addresses server performance and power conservation. The locality-aware request distribution (LARD) scheme improves the system response time by having the requests served by web servers which have the data in their cache...

Vageesan, Gopinath

2007-04-25T23:59:59.000Z

379

E-Print Network 3.0 - atlas web server Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

atlas web server Search Powered by Explorit Topic List Advanced Search Sample search results for: atlas web server Page: << < 1 2 3 4 5 > >> 1 A Portable Image Annotation Tool for...

380

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

T-602: BlackBerry Enterprise Server Input Validation Flaw in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

382

T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: Avaya Aura Application Server Buffer Overflow in 95: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code August 17, 2011 - 3:23pm Addthis PROBLEM: A vulnerability was reported in Avaya Aura Application Server (Nortel Media Application Server). PLATFORM: Avaya Aura Application Server 5300 version(s): 1.0, 2.0 ABSTRACT: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code. reference LINKS: Avaya Advisory: 100146108 Security Tracker Alert ID: 1025942 IMPACT ASSESSMENT: Medium Discussion: A flaw was found in one of the Media Application Server listening processes. If a remote attacker was able to successfully establish a

383

V-194: Citrix XenServer Memory Management Error Lets Local Administrat...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local...

384

Price Server System for Automated Critical Peak Pricing  

NLE Websites -- All DOE Office Websites (Extended Search)

Price Server System for Automated Critical Peak Pricing Price Server System for Automated Critical Peak Pricing Speaker(s): David S. Watson Date: June 3, 2005 - 12:00pm Location: 90-3148 Overview of current California Energy Commission (CEC)/Demand Response Research Center (DRRC) Auto-CPP project: This summer, some select commercial CPP customers of PG&E will have the option of joining the Automated Critical Peak Pricing pilot. The pilot will have the same tariffs as standard CPP programs, but will include an added feature: automated shedding of electric loads. Through use of the Price Server System, day-ahead CPP event signals initiated by PG&E will ultimately cause electric loads to be automatically curtailed on commercial customer sites. These optional predetermined shed strategies will occur without

385

On Evaluating Request-Distribution Schemes for Saving Energy in Server Clusters  

E-Print Network (OSTI)

On Evaluating Request-Distribution Schemes for Saving Energy in Server Clusters Karthick Rajamani- saving schemes. 1 Introduction Energy efficiency for servers has recently become an impor- tant concern and evalua- tion of request distribution schemes targeting energy savings in server clusters

Lu, Jiaheng

386

Why Blow Away Heat? Harvest Server's Heat Using Ther-moelectric Generators  

E-Print Network (OSTI)

Why Blow Away Heat? Harvest Server's Heat Using Ther- moelectric Generators Ted Tsung-Te Lai, Wei ABSTRACT This paper argues for harvesting energy from servers' wasted heat in data centers. Our approach is to distribute a large number of thermoelectric generators (TEGs) on or nearby server hotspot components whose

Huang, Polly

387

CREATING SPECIFICATION TEMPLATES FOR CLIENT-SERVER FAMILIES IN SERVICE ORIENTED ARCHITECTURE  

E-Print Network (OSTI)

CREATING SPECIFICATION TEMPLATES FOR CLIENT-SERVER FAMILIES IN SERVICE ORIENTED ARCHITECTURE-SERVER FAMILIES IN SERVICE ORIENTED ARCHITECTURE by Jaya Bansal has been approved July 2009 Graduate Supervisory-Server Based Service Oriented Architecture...............................9 2.4 Multi-tier Service Oriented

388

Optimization of Electricity and Server Maintenance Costs in Hybrid Cooling Data Centers  

Science Journals Connector (OSTI)

The electricity cost of data centers dominated by server power and cooling power is growing rapidly. To tackle this problem, inlet air with moderate temperature and server consolidation are widely adopted. However, the benefit of these two methods is ... Keywords: Data centers, electricity cost, server maintenance cost, joint optimization

Shaoming Chen; Yue Hu; Lu Peng

2013-06-01T23:59:59.000Z

389

Video Server on an ATM Connected Cluster of Workstations Olav Sandsta, Stein Langrgen, and Roger Midtstraum  

E-Print Network (OSTI)

Video Server on an ATM Connected Cluster of Workstations Olav Sandst°a, Stein Langørgen, and Roger-7034 Trondheim, Norway folavsa, steinl, rogerg@idi.ntnu.no Abstract Video servers are important for applicationswhich make use of digital video. The video servers should provide better functionality than most

390

Rclick: A web server for comparison of RNA 3D structures  

Science Journals Connector (OSTI)

......brief-report Applications Note Rclick: A web server for comparison of RNA 3D structures...this study, we have developed Rclick, a web server that is capable of superimposing...Various examples showcase the utility of our web server for comparison of RNA, RNA-protein......

Minh N. Nguyen; Chandra Verma

2014-11-01T23:59:59.000Z

391

WebPSN: a web server for high-throughput investigation of structural communication in biomacromolecules  

Science Journals Connector (OSTI)

......brief-report Applications Note WebPSN: a web server for high-throughput investigation...implemented WebPSN, a freely available web server that allows the user to easily setup...the method was therefore implemented in a web server (WebPSN) that provides the user......

Michele Seeber; Angelo Felline; Francesco Raimondi; Simona Mariani; Francesca Fanelli

2014-11-01T23:59:59.000Z

392

Energy-aware Job Assignment in Server Farms with Setup Delays under LCFS and PS  

E-Print Network (OSTI)

Energy-aware Job Assignment in Server Farms with Setup Delays under LCFS and PS Esa Hyytiä of Communications and Networking Aalto University, Finland Abstract--We consider the job (or task) assignment problem to heterogeneous parallel servers, where servers can be switched off to save energy. However

Hyytiä, Esa

393

Mercury and Freon: Temperature Emulation and Management for Server Systems  

E-Print Network (OSTI)

Mercury and Freon: Temperature Emulation and Management for Server Systems Taliver Heath Dept by simulators and real measurements. In this paper, we introduce Mercury, a soft- ware suite that avoids data. Most importantly, Mercury runs the entire software stack natively, enables repeatable experiments

Bianchini, Ricardo

394

The PDB_REDO server for macromolecular structure model optimization  

Science Journals Connector (OSTI)

The PDB_REDO pipeline aims to improve macromolecular structures by optimizing the crystallographic refinement parameters and performing partial model building. Here, algorithms are presented that allowed a web-server implementation of PDB_REDO, and the first user results are discussed.

Joosten, R.P.

2014-05-30T23:59:59.000Z

395

Computer/Server Backup Policy 1.0 Purpose  

E-Print Network (OSTI)

servers are included in the nightly backups. 3.0 Policy The College of Engineering's backup services the replicated storage back to provide for business continuity. The College of Engineering #12;· The services with an overview of backup services offered by Electronic and Computer Services (ECS). Backup services provide

Demirel, Melik C.

396

SCRATCH: a protein structure and structural feature prediction server  

E-Print Network (OSTI)

SCRATCH: a protein structure and structural feature prediction server J. Cheng, A. Z. Randall, M. J protein tertiary structure and structural features. The SCRATCH soft- ware suite includes predictors for secondary structure, relative solvent accessibility, disordered regions, domains, disulfide bridges, single

Cheng, Jianlin Jack

397

Profit-Aware Server Allocation for Green Internet Services  

E-Print Network (OSTI)

to build data centers, or server farms, purpose-built facilities providing storage and computing services and responsiveness have markedly grown. For example, Google reports that an extra 0.5 seconds in search page of `green' data centers, i.e., data centers that are energy efficient, is a challenging problem for service

Pallis, George

398

Server-side Tracking of New Documents Fred Douglis  

E-Print Network (OSTI)

Server-side Tracking of New Documents Fred Douglis douglis@research.att.com AT&T Labs that is already common for other purposes, to identify a particular user across visits and to track the versions. Indeed, Chen and Koutsofios's Website News system [3], which tracks changes recursively from a site

Douglis, Fred

399

Microsoft SQL Server 6.0{reg_sign} Workbook  

SciTech Connect

This workbook was prepared for introductory training in the use of Microsoft SQL Server Version 6.0. The examples are all taken from the PUBS database that Microsoft distributes for training purposes or from the Microsoft Online Documentation. The merits of the relational database are presented.

Augustenborg, E.C.

1996-09-01T23:59:59.000Z

400

On Secure and Pseudonymous Client-Relationships with Multiple Servers  

E-Print Network (OSTI)

. Gibbons, David M. Kristol, Yossi Matias, and Alain Mayer Bell Labs, Lucent Technologies This paper subnet (e.g., corporate intranet, ISP) and the servers reside any- where on the Internet. The Janus, pseudonym A liation: Bell Labs, Lucent Technologies Address: 600 Mountain Ave., Murray Hill, NJ 07974 E

Gibbons, Phillip B.

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Performance of a Multiprocessor Multidisk CD-ROM Image Server  

E-Print Network (OSTI)

Performance of a Multiprocessor Multidisk CD-ROM Image Server Rolf Muralt, Benoit A. Gennart and unlimited, inexpensive mass storage capacities through the use of removable CD-ROM medium. Reading uncompressed or lossless compressed image data striped across multi- ple CD-ROM disks yields sustained

Hersch, Roger D.

402

Queueing systems subject to random server failures: an approximation  

E-Print Network (OSTI)

In the traditional study of queueing theory, a typical ics. assumption is that the server is not subject to failures. This assumption, however, is not realistic for modeling many queueing systems in practice. Since the late 1950's, there has been...

Matis, Timothy

1998-01-01T23:59:59.000Z

403

Task Assignment in a Server Farm with Switching Delays and  

E-Print Network (OSTI)

costs Holding costs (per job) Objective to balance between Energy consumption Performance (e.g., latency Energy- and Delay-aware cost structure Switching costs Running costs Holding costs (per job) Objective to balance between Energy consumption Performance (e.g., latency) Heterogeneous servers, job-specific costs

Hyytiä, Esa

404

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

405

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

406

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

407

T-682:Double free vulnerability in MapServer | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2:Double free vulnerability in MapServer 2:Double free vulnerability in MapServer T-682:Double free vulnerability in MapServer August 2, 2011 - 4:08pm Addthis PROBLEM: Double free vulnerability in MapServer PLATFORM: All versions may be susceptible to SQL injection under certain circumstances ABSTRACT: MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases. reference LINKS: Double-free in msAddImageSymbol() when filename is a http resource

408

V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie 6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30, 2013 - 4:33am Addthis PROBLEM: Two vulnerabilities have been reported in Apache HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information and compromise a vulnerable system. PLATFORM: Apache 2.0.x Apache HTTP Server 2.x ABSTRACT: Two vulnerabilities have been reported in Apache HTTP Server REFERENCE LINKS: CVE-2012-0053 CVE-2013-1862 http://secunia.com/advisories/54320/ IMPACT ASSESSMENT: Medium DISCUSSION: protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400)

409

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

410

U-094: EMC Documentum Content Server Lets Local Administrative Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC Documentum Content Server Lets Local Administrative 4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges February 2, 2012 - 9:15am Addthis PROBLEM: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges PLATFORM: EMC Documentum Content Server 6.0, 6.5, 6.6 ABSTRACT: EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. reference LINKS: SecurityTracker Alert ID: 1026624 EMC Resource Library CVE-2011-4144 bugtraq ESA-2012-009 IMPACT ASSESSMENT: Medium Discussion: EMC Documentum Content Server contains a security vulnerability that may allow a system administrator to elevate their or other users privileges to

411

Efficient Virtual Memory for Big Memory Servers Our analysis shows that many "big-memory" server workloads,  

E-Print Network (OSTI)

-memory" server workloads, such as databases, in-memory caches, and graph analytics, pay a high cost for page introduced [13]. In contrast, virtual memory usage has changed dramatically in recent years. For example-negligible energy [5, 41] To reevaluate the cost and benefit of decades-old page-based vir- tual memory in today

Hill, Mark D.

412

"Zombie" Servers and Inefficiency Drive Energy Waste at Data Centers1 U.S. server facilities are riddled with underused machines, report says.2  

E-Print Network (OSTI)

progress in this area, some using upgraded systems that can generate power from waste heat or use outside"Zombie" Servers and Inefficiency Drive Energy Waste at Data Centers1 U.S. server facilities waste documented in a report about U.S. data centers released Tuesday by the Natural8 Resources Defense

South Bohemia, University of

413

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

414

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

415

T-668: Vulnerability in a BlackBerry Enterprise Server component could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Vulnerability in a BlackBerry Enterprise Server component 8: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service July 14, 2011 - 7:20am Addthis PROBLEM: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service PLATFORM: Affected Software >> BlackBerry Enterprise Server (BES) version(s) 5.0.0 for API/MS Exchange (Admin API Option Only), BES/Express version 5.0.2 & 5.0.3 IBM Lotus Domino , BES 5.0.1, 5.0.2 & 5.0.3 for MS Exchange, IBM Lotus Domino, BlackBerry Enterprise Server versions 5.0.1 for GroupWise ABSTRACT: This advisory describes a security issue in the BlackBerry Administration

416

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

417

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

418

Server Consolidation: An Approach to make Data Centers Energy Efficient and Green  

E-Print Network (OSTI)

Data centers are the building blocks of IT business organizations providing the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous increase in the demand for energy consumption. These data centers not only consume a tremendous amount of energy but are riddled with IT inefficiencies. All data center are plagued with thousands of servers as major components. These servers consume huge energy without performing useful work. In an average server environment, 30% of the servers are "dead" only consuming energy, without being properly utilized. Their utilization ratio is only 5 to 10 percent. This paper focuses on the use of an emerging technology called virtualization to achieve energy efficient data centers by providing a solution called server consolidation. It increases the utilization ratio up to 50% saving huge amount of energy. Server consolidation helps in implementing g...

Uddin, Mueen

2010-01-01T23:59:59.000Z

419

Asynchronous data change notification between database server and accelerator controls system  

SciTech Connect

Database data change notification (DCN) is a commonly used feature. Not all database management systems (DBMS) provide an explicit DCN mechanism. Even for those DBMS's which support DCN (such as Oracle and MS SQL server), some server side and/or client side programming may be required to make the DCN system work. This makes the setup of DCN between database server and interested clients tedious and time consuming. In accelerator control systems, there are many well established software client/server architectures (such as CDEV, EPICS, and ADO) that can be used to implement data reflection servers that transfer data asynchronously to any client using the standard SET/GET API. This paper describes a method for using such a data reflection server to set up asynchronous DCN (ADCN) between a DBMS and clients. This method works well for all DBMS systems which provide database trigger functionality. Asynchronous data change notification (ADCN) between database server and clients can be realized by combining the use of a database trigger mechanism, which is supported by major DBMS systems, with server processes that use client/server software architectures that are familiar in the accelerator controls community (such as EPICS, CDEV or ADO). This approach makes the ADCN system easy to set up and integrate into an accelerator controls system. Several ADCN systems have been set up and used in the RHIC-AGS controls system.

Fu, W.; Morris, J.; Nemesure, S.

2011-10-10T23:59:59.000Z

420

Created 2/16/2012 SLC; Updated 3/5/2012 slc; Updated 7/1/2014 slf TTU Directory of Consumer Information OFA Internal Reference  

E-Print Network (OSTI)

Created 2/16/2012 SLC; Updated 3/5/2012 slc; Updated 7/1/2014 slf TTU Directory of Consumer Financial Aid #12;Created 2/16/2012 SLC; Updated 3/5/2012 slc; Updated 7/1/2014 slf Disclosure Disclosure

Zhang, Yuanlin

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Dynamic Scheduling of a Parallel Server System in Heavy Traffic with Complete Resource Pooling: Asymptotic Optimality of a  

E-Print Network (OSTI)

as the optimal cost in the Brownian control problem. Short title: Dynamic Scheduling of Parallel Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3 Scheduling Control and Performance Measures . . . . . . . . . . . . . . . . . . . . . . . . 7Dynamic Scheduling of a Parallel Server System in Heavy Traffic with Complete Resource Pooling

422

Stochastic Dynamic Programming and Stochastic Fluid-Flow Models in the Design and Analysis of Web-Server Farms  

E-Print Network (OSTI)

A Web-server farm is a specialized facility designed specifically for housing Web servers catering to one or more Internet facing Web sites. In this dissertation, stochastic dynamic programming technique is used to obtain the optimal admission...

Goel, Piyush

2010-10-12T23:59:59.000Z

423

Mission-Critical Platform for Online Transaction Processing (OLTP) SQL Server 2008 Mission-Critical Platform for OLTP Data Solutions  

E-Print Network (OSTI)

Mission-Critical Platform for Online Transaction Processing (OLTP) SQL Server 2008 Mission Data Collector to troubleshoot and tune SQL Server 2008 instances. Help ensure compliance 2008 high- performance query processing engine for industry leading performance and scalability. Define

Bernstein, Phil

424

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

425

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network (OSTI)

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

426

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cédric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Hervé Darbon

2001-10-02T23:59:59.000Z

427

Deploying Server-side File System Monitoring at NERSC  

SciTech Connect

The Franklin Cray XT4 at the NERSC center was equipped with the server-side I/O monitoring infrastructure Cerebro/LMT, which is described here in detail. Insights gained from the data produced include a better understanding of instantaneous data rates during file system testing, file system behavior during regular production time, and long-term average behaviors. Information and insights gleaned from this monitoring support efforts to proactively manage the I/O infrastructure on Franklin. A simple model for I/O transactions is introduced and compared with the 250 million observations sent to the LMT database from August 2008 to February 2009.

Uselton, Andrew

2009-05-01T23:59:59.000Z

428

Sun Fire X4800 Server View DetailsHide Details  

E-Print Network (OSTI)

$9,999.00 $10.00 $2,999.00 $9,999.00 $1,079.00 $0.00 $689.00 $0.00 $6,899.00 $576.00 $0.00 Sun Fire-SAS6-R-REM-Z Sun Storage SAS RAID Host Bus Adapter, 8 Ports of 6 Gb/sec and 512 MB Memory, Factory Integration 2 4460A-N Sun Blade Server Module Slot Filler Panel for Sun Blade Modular System Chassis, Factory

Stein, William

429

DRPM: Dynamic Speed Control for Power Management in Server Class Disks Sudhanva Gurumurthi  

E-Print Network (OSTI)

[5] that power densities of data centers could grow to over 100 Watts per square foot and that the caDRPM: Dynamic Speed Control for Power Management in Server Class Disks Sudhanva Gurumurthi portion of the power budget in server environ- ments goes into the I/O subsystem - the disk array in par

Sivasubramaniam, Anand

430

DupliPHY-Web: a web server for DupliPHY and DupliPHY-ML  

Science Journals Connector (OSTI)

......provided the original work is properly cited. DupliPHY-Web: a web server for DupliPHY and DupliPHY-ML Ryan M. Ames * Simon...parsimony and maximum likelihood. Here, we present DupliPHY-Web a web server for DupliPHY that implements additional maximum......

Ryan M. Ames; Simon C. Lovell

2014-10-01T23:59:59.000Z

431

On Optimal Policies for Energy-Aware Servers Vincent J. Maccio  

E-Print Network (OSTI)

or lower energy state as turning the server on or off, respectively. Jobs arrive to the system accordingOn Optimal Policies for Energy-Aware Servers Vincent J. Maccio Department of Computing and Software of Computing and Software McMaster University Hamilton, Ontario Email downd@mcmaster.ca Abstract--As energy

Down, Doug

432

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks  

E-Print Network (OSTI)

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks ad hoc networks. In this paper, we study the important problem of joint routing and server selection for MD video in ad hoc networks. We take a cross-layer approach to formulate the task as a combinatorial

Hou, Y. Thomas

433

Power Containers: An OS Facility for Fine-Grained Power and Energy Management on Multicore Servers  

E-Print Network (OSTI)

@google.com Abstract Energy efficiency and power capping are critical concerns in server and cloud computing systems and server systems place high priority on improving energy efficiency, controlling peak power draw, requires prior specific permission and/or a fee. ASPLOS'13, March 16­20, 2013, Houston, Texas, USA

Shriraman, Arrvindh

434

Power Containers: An OS Facility for FineGrained Power and Energy Management on Multicore Servers  

E-Print Network (OSTI)

@cs.sfu.ca xiaozhang@google.com Abstract Energy efficiency and power capping are critical concerns in server and cloud centers and server systems place high priority on improving energy efficiency, controlling peak power draw to lists, requires prior specific permission and/or a fee. ASPLOS'13, March 16--20, 2013, Houston, Texas

Shen, Kai

435

Power and Energy Management for Server Systems Ricardo Bianchini + and Ram Rajamony #  

E-Print Network (OSTI)

dictates its electricity costs. These costs are particularly high for a large and/or dense server cluster in cooling this server for the year. Assuming electricity costs of U$ 0.10/KWh, the total energy cost consumptions as in this example. Nevertheless, the cost of 1 #12; electricity is still significant

Bianchini, Ricardo

436

High performance digital video servers: storage and retrieval of compressed scalable video  

E-Print Network (OSTI)

High performance digital video servers: storage and retrieval of compressed scalable video Seungyup compressiontechnologyhave ledto the emergence ofunprecedented forms of video communications. In the future, it is envisioned that users will be able to connect to a massive number of distributed video servers, from which users

Chang, Shih-Fu

437

IntSide: a web server for the chemical and biological examination of drug side effects  

Science Journals Connector (OSTI)

......brief-report Applications Note IntSide: a web server for the chemical and biological examination...remains. Here, we present IntSide, a web server that integrates chemical and biological...Availability and implementation: Our data and web resource are available online ( http......

Teresa Juan-Blanco; Miquel Duran-Frigola; Patrick Aloy

2014-11-01T23:59:59.000Z

438

The ProxyGator Server-side Wireless Toolkit Dushiant Kochhar and Abdelsalam (Sumi) Helal  

E-Print Network (OSTI)

The ProxyGator ­ Server-side Wireless Toolkit Dushiant Kochhar and Abdelsalam (Sumi) Helal Computer significantly. To reduce the development time, we are introducing the ProxyGator toolkit. It is a server infrastructure is built within Visual C++ 6.0 IDE. We present the ProxyGator Toolkit and give an analysis to show

Helal, Abdelsalam

439

An Approach to Select a Best Suitable Video Server Falko Dressler  

E-Print Network (OSTI)

on the availability and the achieved transmission quality are very high. Therefore, multiple video servers called client, is requested to choose one of these servers for the particular transmission. Several transmission. New approaches are in progress, which allow a more meaningful selection. For example

Breu, Ruth

440

JETC: Joint Energy Thermal and Cooling Management for Memory and CPU Subsystems in Servers  

E-Print Network (OSTI)

JETC: Joint Energy Thermal and Cooling Management for Memory and CPU Subsystems in Servers Raid In this work we propose a joint energy, thermal and cooling management technique (JETC) that significantly re- duces per server cooling and memory energy costs. Our analysis shows that decoupling the optimization

Simunic, Tajana

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Content Description Servers for Networked Video Surveillance Jeffrey E. Boyd Maxwell Sayles Luke Olsen  

E-Print Network (OSTI)

Content Description Servers for Networked Video Surveillance Jeffrey E. Boyd Maxwell Sayles Luke Olsen Paul Tarjan Department of Computer Science, University of Calgary boyd@cpsc.ucalgary.ca Abstract Servers Boyd et al. [3] describe a video surveillance system that assimilates information extracted from

Boyd, Jeffrey E.

442

DOE Technical Standards List: Directory of DOE and Contractor Personnel Involved in Non-Government Standards Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4-99 4-99 May 1999 Superseding DOE-TSL-4-98 May 1998 DOE TECHNICAL STANDARDS LIST DIRECTORY OF DOE AND CONTRACTOR PERSONNEL INVOLVED IN NON- GOVERNMENT STANDARDS ACTIVITIES U.S. Department of Energy AREA SDMP Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. DOE-TSL-4-99 iii 1. GENERAL GUIDANCE 1.1 Purpose. Public Law (PL) 104-113 [15 USC 272(b), March 7, 1996], The

443

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

444

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

445

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Stack-based buffer overflow in oninit in IBM Informix 9: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution February 17, 2011 - 7:00am Addthis PROBLEM: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution. PLATFORM: IBM Informix Dynamic Server (IDS) 11.50 ABSTRACT: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement. reference LINKS: Security Database - Reference - CVE-2011-1033 CVE Details - Reference - CVE-2011-1033

446

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

447

T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Citrix XenServer Lets Local Administrative Users on the 21: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 - 3:00pm Addthis PROBLEM: A vulnerability was reported in Citrix XenServer. A local administrative user on the guest operating system can cause denial of service conditions. PLATFORM: Citrix XenServer 5.6 Feature Pack 1 and prior ABSTRACT: A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor. reference LINKS: Document ID: CTX129208 SecurityTracker Alert ID: 1025524 Document ID: CTX129103 Document ID: CTX129102 Document ID: CTX128844 Document ID: CTX129101 Document ID: CTX129100 Citrix Support IMPACT ASSESSMENT Medium Discussion:

448

CFD modelling of thermal distribution in industrial server centres for configuration optimisation and energy efficiency  

Science Journals Connector (OSTI)

The use of servers for computational and communication control tasks is becoming more and more frequent in industries and institutions. Ever increasing computational power and data storage combined with reduction in chipsets size resulted in the increased heat density and need for proper configurations of the server racks to enhance cooling and energy efficiency. While different methods can be used to model and design new server centres and optimise their configuration, there is no clear guideline in the literature on the best way to design them and how to increase energy efficiency of existing server centres. This paper presents a simplified yet reliable computational fluid dynamics (CFD) model used to qualitatively evaluate different cooling solutions of a data centre and proposes guidelines to improve its energy efficiency. The influence of different parameters and configurations on the cooling load of the server room is then analysed.

Pierre-Luc Paradis; Drishtysingh Ramdenee; Adrian Ilinca; Hussein Ibrahim

2014-01-01T23:59:59.000Z

449

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

450

mimicMe: a web server for prediction and analysis of host-like proteins in microbial pathogens  

Science Journals Connector (OSTI)

......research-article Applications Note mimicMe: a web server for prediction and analysis of host-like...Editor: Burkhard Rost Summary: mimicMe is a web server for prediction and analysis of host-like...identified. Here, we report mimicMe, a web server for exploration of host-like proteins......

Pavel Petrenko; Andrew C. Doxey

2014-11-01T23:59:59.000Z

451

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7, 2011 7, 2011 U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. October 6, 2011 U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers A remote user can access internal servers. October 5, 2011 U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. October 4, 2011 U-003:RPM Package Manager security update RPM Package Manager Header Validation Flaws Let Remote Users Execute

452

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249–261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

453

Microsoft Word - SmallServerRoomEfficiencyFactSheet.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

5E 5E Fact Sheet: Improving Energy Efficiency for Server Rooms and Closets Hoi Ying (Iris) Cheung, Rod Mahdavi, Steve Greenberg, Rich Brown and William Tschudi, Lawrence Berkeley National Laboratory (LBNL) Pierre Delforge, National Resources Defense Council (NRDC) Joyce Dickerson, Google Environmental Energy Technologies Division September 2012 DISCLAIMER This document was prepared as an account of work sponsored by the United States Government. While this document is believed to contain correct information, neither the United States Government nor any agency thereof, nor The Regents of the University of California, nor any of their employees, makes any warranty, express or implied, or assumes any legal responsibility for the accuracy, completeness, or usefulness of any information,

454

MultiS: A Context-Server for Pervasive Computing  

Science Journals Connector (OSTI)

Context-aware applications are capable of recognizing environmental changes and adapting their behavior to the new context. This process can be divided into three stages: monitoring, context recognition and adaptation. On the monitoring layer, raw information about the environment is collected from sensors. The context recognition layer processes the data acquired from the context and transforms it into information which can be useful for the adaptation process. With this information, the adaptation system can determine what behavior is correct for the application in each different context. This paper proposes a context server called MultiS, which has the goal of solving the problems arising from the context recognition layer, and which includes the following advantages: a) the production of new context data based on the information of several sensors and an ability to react to changes in the environment; b) definition of a composed language for the context data called CD-XML; c) support for mobility.

Felipe Weber Fehlberg; Carlos O. Rolim; Valderi R.Q. Leithardt; Claudio F.R. Geyer; Luciano C. Silva; Anubis G.M. Rossetto

2013-01-01T23:59:59.000Z

455

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

456

Property:Building/SPBreakdownOfElctrcityUseKwhM2LargeComputersServers |  

Open Energy Info (EERE)

LargeComputersServers LargeComputersServers Jump to: navigation, search This is a property of type String. Large computers / servers Pages using the property "Building/SPBreakdownOfElctrcityUseKwhM2LargeComputersServers" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 2.88701226026 + Sweden Building 05K0002 + 0.0 + Sweden Building 05K0003 + 0.0 + Sweden Building 05K0004 + 3.90838206628 + Sweden Building 05K0005 + 0.697674418605 + Sweden Building 05K0006 + 1.18332311465 + Sweden Building 05K0007 + 11.4098804421 + Sweden Building 05K0008 + 0.0 + Sweden Building 05K0009 + 0.556088941246 + Sweden Building 05K0010 + 10.0228832952 + Sweden Building 05K0011 + 0.471022727273 + Sweden Building 05K0012 + 0.774049003718 + Sweden Building 05K0013 + 0.0 +

457

V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Network Satellite Server Inter-Satellite Sync Remote 3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May 24, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server PLATFORM: Red Hat Network Satellite (v. 5.3 for RHEL 5) Red Hat Network Satellite (v. 5.4 for RHEL 5) Red Hat Network Satellite (v. 5.4 for RHEL 6) Red Hat Network Satellite (v. 5.5 for RHEL 5) Red Hat Network Satellite (v. 5.5 for RHEL 6) ABSTRACT: The system does not properly validate all Inter-Satellite Sync operations REFERENCE LINKS: SecurityTracker Alert ID: 1028587 RHSA-2013:0848-1 CVE-2013-2056 IMPACT ASSESSMENT: Medium DISCUSSION: It was discovered that Red Hat Network Satellite did not fully check the

458

V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support 1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information October 26, 2012 - 6:00am Addthis PROBLEM: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Software version: 6.2.3, 6.2.3.1 ABSTRACT: A vulnerability was reported in IBM Tivoli Monitoring. REFERENCE LINKS: IBM Support Document: 1614003 IBM Support Portal SecurityTracker Alert ID: 1027692 IMPACT ASSESSMENT: High DISCUSSION: A remote user may be able to conduct HTTP TRACE and HTTP TRACK attacks to access sensitive information from the HTTP headers.

459

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

460

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

On Dynamic Scheduling of a Parallel Server System with Partial Pooling  

E-Print Network (OSTI)

proposed and refined by Harrison et al., we approximate the scheduling control problem for this parallel Scheduling of Parallel Servers. Keywords and phrases: Stochastic networks, dynamic control, resource pooling.3 Scheduling Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3 Sequence

462

LigDig: a web server for querying ligand-protein interactions  

Science Journals Connector (OSTI)

......unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. LigDig: a web server for querying ligand-protein interactions Jonathan C. Fuller 1 * Michael Martinez 1 Stefan Henrich 1 Antonia Stank 1......

Jonathan C. Fuller; Michael Martinez; Stefan Henrich; Antonia Stank; Stefan Richter; Rebecca C. Wade

2014-11-01T23:59:59.000Z

463

2014-02-21 Issuance: Proposed Determination of Computer Servers as a Covered Consumer Product; Withdrawal  

Energy.gov (U.S. Department of Energy (DOE))

This document is a pre-publication Federal Register notice withdrawing the previously proposed determination that computer servers qualify as a covered product, as issued by the Deputy Assistant Secretary for Energy Efficiency on February 21, 2014.

464

Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431  

E-Print Network (OSTI)

to the steady power and cooling loads of data centers. Cleanto the steady power and cooling loads of data centers. ForThe peak load on the power grid from these servers and data

Brown, Richard; Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency

2008-01-01T23:59:59.000Z

465

T-668: Vulnerability in a BlackBerry Enterprise Server component...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PLATFORM: Affected Software >> BlackBerry Enterprise Server (BES) version(s) 5.0.0 for APIMS Exchange (Admin API Option Only), BESExpress version 5.0.2 & 5.0.3 IBM Lotus Domino...

466

Distributing proprietary geographic data on the World Wide Web — UCLA GIS Database and Map Server  

Science Journals Connector (OSTI)

The University of California, Los Angeles (UCLA) GIS Database and Map Server project is a cooperative effort of GIS-interested-parties on the UCLA campus, to deliver centrally-stored geographic data via the World Wide Web (WWW). Both geographic data and geo-referenced remotely sensed image data are served from this site. The main objective of this project is to serve gigabytes of data using limited online disk space, used to store the most-recently-requested data units, and a large tape robot for the offline storage of all the data in the central database. ArcView Internet Map Server (IMS) is employed as the interactive GIS mapping server and visual interface for downloading the data from the central database. The server design, database design and web client interface were developed to incorporate a visual interface, to distribute proprietary geo-data and to provide GIS capabilities.

Yafang Su; Joan Slottow; Avi Mozes

2000-01-01T23:59:59.000Z

467

CASL L3 Report: Tally Server implementation in OpenMC  

NLE Websites -- All DOE Office Websites (Extended Search)

Tally Server implementation in OpenMC Paul K. Romano and B.Forget October 24, 2013 Abstract As part of POR-6, an L3 milestone was completed on the implementation of tally...

468

Property:Building/SPElectrtyUsePercLargeComputersServers | Open Energy  

Open Energy Info (EERE)

SPElectrtyUsePercLargeComputersServers SPElectrtyUsePercLargeComputersServers Jump to: navigation, search This is a property of type String. Large computers / servers Pages using the property "Building/SPElectrtyUsePercLargeComputersServers" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 4.04016909393 + Sweden Building 05K0002 + 0.0 + Sweden Building 05K0003 + 0.0 + Sweden Building 05K0004 + 5.91955840631 + Sweden Building 05K0005 + 1.27160904517 + Sweden Building 05K0006 + 1.81235608552 + Sweden Building 05K0007 + 17.4089448462 + Sweden Building 05K0008 + 0.0 + Sweden Building 05K0009 + 0.983508828426 + Sweden Building 05K0010 + 6.66995976895 + Sweden Building 05K0011 + 1.71269481591 + Sweden Building 05K0012 + 2.03730351612 + Sweden Building 05K0013 + 0.0 +

469

A simulation model of a multi-server EJB system David Mc Guinness,  

E-Print Network (OSTI)

A simulation model of a multi-server EJB system David Mc Guinness, Performance Engineering sparse. This paper will describe how WorkbenchTM , an advanced simulation modelling tool, can be used

470

Article DirectoryArticle Directory Free Online Article Directory  

E-Print Network (OSTI)

utilised inside construction practice. Clean Coal Technology AmericasPower.org Advancing coal methods

471

Process Development and Analysis of SHA and Procurement of Servers for XYZ Organization  

E-Print Network (OSTI)

– Operating System PXE – Pre-boot Execution Environment RFP – Request for Proposal RFQ – Request for Quote SAN – Storage Area Network SHA – Server Hosting Agreement SLA – Service Level Agreement SME – Subject Matter Expert USC – Unified Server... of creating an efficient reference process is to quickly react to any RFP (Request for Proposal) by the client in the least amount of time. This project serves as a standardized process that keeps the business objectives and goals in mind and creates a...

Mehta, Abhijit D.

2010-12-17T23:59:59.000Z

472

T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: VMware vFabric tc Server Lets Remote Users Login Using 2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords. reference LINKS: SecurityTracker Alert ID: 1025923 VMware VFabric Download CVE-2011-0527 IMPACT ASSESSMENT: Medium Discussion: If the system stores passwords used for JMX authentication in an obfuscated form, a remote user can use the password in obfuscated form (or in plain

473

Cooperative Server Clustering for a Scalable GAS Model on petascale cray XT5 Systems  

SciTech Connect

Global Address Space (GAS) programming models are attractive because they retain the easy-to-use addressing model that is the characteristic of shared-memory style load and store operations. The scalability of GAS models depends directly on the design and implementation of runtime libraries on the targeted platforms. In this paper, we examine the memory requirement of a popular GAS runtime library, Aggregate Remote Memory Copy Interface (ARMCI) on petascale Cray XT 5 systems. Then we describe a new technique cooperative server clustering that enhances the memory scalability of ARMCI communication servers. In cooperative server clustering, ARMCI servers are organized into clusters, and cooperatively process incoming communication requests among them. A request intervention scheme is also designed to expedite the return of responses to the initiating processes. Our experimental results demonstrate that, with very little impact on ARMCI communication latency and bandwidth, cooperative server clustering is able to significantly reduce the memory requirement of ARMCI communication servers, thereby enabling highly scalable scientific applications. In particular, it dramatically reduces the total execution time of a scientific application, NWChem, by 45% on 2400 processes.

Yu, Weikuan [ORNL; Que, Xinyu [ORNL; Graham, Richard L [ORNL; Vetter, Jeffrey S [ORNL

2010-01-01T23:59:59.000Z

474

Cooperative Server Clustering for a Scalable GAS Model on Petascale Cray XT5 Systems  

SciTech Connect

Global Address Space (GAS) programming models are attractive because they retain the easy-to-use addressing model that is the characteristic of shared-memory style load and store operations. The scalability of GAS models depends directly on the design and implementation of runtime libraries on the targeted platforms. In this paper, we examine the memory requirement of a popular GAS run-time library, Aggregate Remote Memory Copy Interface (ARMCI) on petascale Cray XT 5 systems. Then we describe a new technique, cooperative server clustering, that enhances the memory scalability of ARMCI communication servers. In cooperative server clustering, ARMCI servers are organized into clusters, and cooperatively process incoming communication requests among them. A request intervention scheme is also designed to expedite the return of responses to the initiating processes. Our experimental results demonstrate that, with very little impact on ARMCI communication latency and bandwidth, cooperative server clustering is able to significantly reduce the memory requirement of ARMCI communication servers, thereby enabling highly scalable scientific applications. In particular, it dramatically reduces the total execution time of a scientific application, NWChem, by 45% on 2400 processes.

Yu, Weikuan [ORNL; Que, Xinyu [ORNL; Tipparaju, Vinod [ORNL; Graham, Richard L [ORNL; Vetter, Jeffrey S [ORNL

2010-05-01T23:59:59.000Z

475

Performance of a Rack of Liquid-Cooled Servers  

SciTech Connect

Electronics densification is continuing at an unrelenting pace at the server, rack, and facility level. With increasing facility density levels, air flow management has become a major challenge and concern. In an effort to deal with the resulting thermal management challenges, manufacturers are increasingly turning to liquid-cooling as a practical solution. The majority of manufacturers have turned to liquid-cooled enclosed racks, or rear door heat exchangers, in which chilled water is delivered to the racks. Some manufacturers are now looking to cold plate cooling solutions that take the heat directly off problem components such as the CPUs, and to get it directly out of the facility. The current paper describes work done at the Pacific Northwest National Labs (PNNL) under a Department of Energy funded program entitled “Energy Smart Data Center”. An 8.2 kW rack of HP rx2600 2U servers has been converted from air-cooling to liquid spray cooling (CPUs only). The rack has been integrated into PNNL’s main cluster and subjected to a suite of acceptance tests. Under the testing, the spray cooled CPUs ran an average of 10C cooler than the air-cooled CPUs. Other peripheral devices such as the memory DIMMs ran an average of 8C cooler, and the power pod board was measured at 15C cooler. Since installation in July, 2005, the rack has been undergoing a one year uptime and reliability investigation. As part of the investigation, the rack has been subjected to monthly robustness testing and ongoing performance evaluation while running applications such as High Performance Linpack, parts of the NASA NPB-2 Benchmark Suite, and NWChem. The rack has undergone 3 months’ worth of robustness testing with no major events. Including the robustness testing, the rack uptime is at 95.54% over 299 days. While undergoing application testing, no computational performance differences have been observed between the liquid-cooled and standard air-cooled racks. A miniature Spray Cooled Energy Smart Data Center is now being designed as a final step to demonstrate the feasibility of scaling liquid-cooling at the single rack up to an entire facility.

Cader, Tahir; Westra, Levi J.; Marquez, Andres; Mcallister, Harley J.; Regimbal, Kevin M.

2007-07-30T23:59:59.000Z

476

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

477

Rolling Debian 6 Updates for Interactive Machines and Web Servers 11/2 -  

NLE Websites -- All DOE Office Websites (Extended Search)

Rolling Debian 6 Updates for Interactive Rolling Debian 6 Updates for Interactive Machines and Web Servers 11/2 - 11/9 Rolling Debian 6 Updates for Interactive Machines and Web Servers 11/2 - 11/9 November 7, 2012 (0 Comments) The JGI computational resources are being updated to Debian 6 this week and next. Because of the staff-intensive work required to update the login nodes, interactive nodes, and the web servers, these machines will be updated between 11/02 and 11/09. The genepool cluster nodes will be updated during the scheduled quarterly maintenance on 11/13 between 7:00AM and 7:00PM. The work on the interactive nodes will begin each day at 9:00AM, and should conclude by 5:00PM. Debian6 Update Schedule 11/02/2012 - 11/09/2012 Friday, 2012-11-02 gpint01 - Previously down for hardware maintenance *complete

478

SENVM: Server Environment Monitoring and Controlling System for a Small Data Center Using Wireless Sensor Network  

E-Print Network (OSTI)

In recent years, efficient energy utilization becomes an essential requirement for data centers, especially in data centers of world-leading companies, where "Green Data Center" defines a new term for an environment-concerned data center. Solutions to change existing a data center to the green one may vary. In the big company, high-cost approaches including re-planning server rooms, changing air-conditioners, buying low-powered servers, and equipping sophisticating environmental control equipments are possible, but not for small to medium enterprises (SMEs) and academic sectors which have limited budget. In this paper, we propose a novel system, SENVM, used to monitor and control air temperature in a server room to be in appropriate condition, not too cold, where very unnecessary cooling leads to unnecessary extra electricity expenses, and also inefficient in energy utilization. With implementing on an emerging technology, Wireless Sensor Network (WSN), Green Data Center is feasible to every small data center...

Choochaisri, Supasate; Jenjaturong, Saran; Intanagonwiwat, Chalermek; Ratanamahatana, Chotirat Ann

2011-01-01T23:59:59.000Z

479

An integrated medical image database and retrieval system using a web application server  

Science Journals Connector (OSTI)

We developed an Integrated Medical Image Database and Retrieval System (INIS) for easy access by medical staff. The INIS mainly consisted of four parts: specific servers to save medical images from multi-vendor modalities of CT, MRI, CR, ECG and endoscopy; an integrated image database (DB) server to save various kinds of images in a DICOM format; a Web application server to connect clients to the integrated image DB and the Web browser terminals connected to an HIS system. The INIS provided a common screen design to retrieve CT, MRI, CR, endoscopic and ECG images, and radiological reports, which would allow doctors to retrieve radiological images and corresponding reports, or ECG images of a patient simultaneously on a screen. Doctors working in internal medicine on average accessed information 492 times a month. Doctors working in cardiological and gastroenterological accessed information 308 times a month. Using the INIS, medical staff could browse all or parts of a patient's medical images and reports.

Pengyu Cao; Masao Hashiba; Kouhei Akazawa; Tomoko Yamakawa; Takayuki Matsuto

2003-01-01T23:59:59.000Z

480

DelPhi web server v2: incorporating atomic-style geometrical figures into the computational protocol  

Science Journals Connector (OSTI)

......without having a computational infrastructure in place (Sarkar et al...frequently aim at modeling hybrid systems comprised of nano-objects...server capable of modeling such hybrid systems [a web server utilizing...Rocchia W. , et al. Rapid grid-based construction of the......

Nicholas Smith; Shawn Witham; Subhra Sarkar; Jie Zhang; Lin Li; Chuan Li; Emil Alexov

2012-06-15T23:59:59.000Z

Note: This page contains sample records for the topic "directory server bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

FuncPatch: a web server for the fast Bayesian inference of conserved functional patches in protein 3D structures  

Science Journals Connector (OSTI)

......research-article Original Paper FuncPatch: a web server for the fast Bayesian inference of...computationally slow. Here, we present an intuitive web server, FuncPatch, to perform a fast approximate...software FuncPatch is freely available at the web site, http://info.mcmaster.ca......

Yi-Fei Huang; G. Brian Golding

2014-11-01T23:59:59.000Z

482

Static and dynamic relationships in WebSphere Process Server and WebSphere ESB V7  

E-Print Network (OSTI)

Static and dynamic relationships in WebSphere Process Server and WebSphere ESB V7 Using@uk.ibm.com) z/OS SVT Team Lead IBM 15 Sep 2010 Learn how to build mediation flows containing static and dynamic. Example scenario Static and dynamic relationships in WebSphere Process Server and WebSphere ESB V7

483

Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431: Appendices  

SciTech Connect

This report is the appendices to a companion report, prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

2007-08-02T23:59:59.000Z

484

Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431  

SciTech Connect

This report was prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

2007-08-02T23:59:59.000Z

485

Dynamic Speed Control for Server Class Disks Sudhanva Gurumurthi Anand Sivasubramaniam Mahmut Kandemir  

E-Print Network (OSTI)

been observed [5] that power densities of data centers could grow to over 100 Watts per square foot Abstract A large portion of the power budget in server environments goes into the I/O subsystem - the disk array in particular. Traditional approaches to disk power management involve completely stopping

Gurumurthi, Sudhanva

486

Upgrading LDM Server and Archive Systems to support Atmospheric Sciences at Texas A&M University  

E-Print Network (OSTI)

purchased for other projects or experiments. Virtually all of the hardware has passed its useful life. Most of the servers have been "refreshed" with refurbished hardware merely 4-5 years old, although some remain that are, at best, outdated. Of the RAID hardware, while disk replacement has occurred within the last 2

487

Client/server technology: Is it beneficial in the engineering information and information technology environment?  

SciTech Connect

Client/server systems have been touted as the next step in the advance of the computer into modern, computer-aided drafting (CAD), computer-aided engineering (CAE), geographical information systems (GIS), engineering information (EI) technology, and information technology (IT) society, but they are not a solution to every organizations problems when it comes to advanced computer technology. Some of the ideas that are presented here are {open_quotes}old hat.{close_quotes} Then I ask you, why don`t we follow there {open_quotes}old hat{close_quotes} principles? This paper attempts and explores the advantages and disadvantages of these popular systems. The client/server architecture, apart from its ability to manage CAD/CAE/GIS and EI/IT and deliver it to decision makers in a timely fashion, offers many compelling advantages. There is, however, a downside to the widespread acceptance of the client/server environment. Users who expect to save money may be very disappointed. This paper provides a set of guidelines to help senior managers determine whether client/server computing is right for their CAD/CAE/GIS and IT organizations. From this point on, the abbreviations, CAD/CAE/GIS and EI/IT will be jointly referred to as {open_quotes}EI/IT{close_quotes} systems.

Norton, F.J.

1996-06-10T23:59:59.000Z

488

An Empirical Investigation of the Impact of Server Virtualization on Energy Efficiency for Green Data Center  

Science Journals Connector (OSTI)

......energy consumption in the ICT sector. It was estimated that data...by infrastructure (e.g. heating, ventilation, air-conditioning...100 to 139 is for the user space. The smaller the priority...physical servers, is under construction at Nanyang Technological University......

Yichao Jin; Yonggang Wen; Qinghua Chen; Zuqing Zhu

2013-08-01T23:59:59.000Z

489

Performance Analysis of the Sporadic Server Implementation in Real-Time Specification for Java  

Science Journals Connector (OSTI)

In this paper, we introduce the implementation ofthe Sporadic Server algorithm at the user level in Real TimeJava. That is, we do not modify the specification of the JavaVirtual Machine (JVM) so our proposal runs without problemson every JVM with support ... Keywords: real time java, aperiodic handling

Carlos M. Tripode; Rodrigo Santos; Javier Orozco

2011-11-01T23:59:59.000Z

490

Measuring the Cost of Scalability and Reliability for Internet-based, server-centered applications  

E-Print Network (OSTI)

1 Measuring the Cost of Scalability and Reliability for Internet-based, server- centered, a centralized approach to Internet-based application development is not scalable and also not dependable. This paper presents a decentralized approach to dependable Internet based application development, consisting

Newcastle upon Tyne, University of

491

Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multicore Server  

E-Print Network (OSTI)

Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multicore Server clouds and data centers, the aggregated performance of the cloud of clouds can be optimized by load of performance and energy efficiency. The present paper aims to develop power and performance constrained load

Stojmenovic, Ivan

492

XenoSite-Server: A Web-Available Site of Metabolism Prediction Tool  

Science Journals Connector (OSTI)

......Permissions, please email: journals.permissions@oup.com November 2014 brief-report Applications Note XenoSite-Server: A Web-Available Site of Metabolism Prediction Tool Matt K. Matlock 2 Tyler B. Hughes 2 S. Joshua Swamidass 1 * *to whom correspondence......

Matt K. Matlock; Tyler B. Hughes; S. Joshua Swamidass

2014-11-01T23:59:59.000Z

493

Dynamic Voltage Scaling in Multitier Web Servers with End-to-End Delay Control  

E-Print Network (OSTI)

-to-end delay constraints. The service is shown to consume as much as 30 percent less energy compared. The energy (and cooling) costs of large server farms are reported to be a significant part of their total for minimizing the total energy expenditure of the multistage pipeline subject to soft end-to-end response

Skadron, Kevin

494

Fuel cells as a backup energy source for high availability network servers  

E-Print Network (OSTI)

This thesis proposes an uninterruptible power supply, UPS for high availability servers with fuel cells as its back up energy source. The system comprises a DC to DC converter designed to accommodate the fuel cellâ s wide output voltage range. A...

Humphrey, Daniel Alan

2008-10-10T23:59:59.000Z

495

More on Random Walks, Electrical Networks, and the Harmonic k-Server Algorithm  

E-Print Network (OSTI)

of electrical networks. We can think of G as an electrical network in which each edge (u; v) has resistance d uMore on Random Walks, Electrical Networks, and the Harmonic k-Server Algorithm Yair Bartal #3; Marek Chrobak y John Noga z Prabhakar Raghavan x August 13, 2003 Abstract Techniques from electrical

Chrobak, Marek

496

More on Random Walks, Electrical Networks and the Harmonic k-Server Algorithm  

E-Print Network (OSTI)

of electrical networks. We can think of G as an electrical network in which each edge (u; v) has resistance d uMore on Random Walks, Electrical Networks and the Harmonic k-Server Algorithm Yair Bartal #3; Marek Chrobak y John Noga z Prabhakar Raghavan x October 6, 2001 Abstract Techniques from electrical network

Bartal, Yair

497

RspSim A Simulation Model of the Reliable Server Pooling Framework  

E-Print Network (OSTI)

RspSim ­ A Simulation Model of the Reliable Server Pooling Framework Thomas Dreibholz, Martin Becke--This code contribution paper provides an overview of the RSPSIM model, which is a simulation model. Clearly, in order to evaluate RSerPool, an OMNET++-based simulation model ­ called RSPSIM ­ had been

Dreibholz, Thomas

498

Faculty & Staff Telephone Directory  

E-Print Network (OSTI)

....................................................................2 Research & Graduate Services..........................................3 Biomedical Engineering...................................1 External Services ...............................................................1 Finance .....................................................3 Undergraduate Services ....................................................4 University Machine

Sinnamon, Gordon J.

499

Directory | The Ames Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

294-4360 Director's Office 311 TASF 294-2770 Documents and Records 151 TASF 294-9972 Engineering Services 158 Metals Development 294-3757 Environment, Safety, Health &...

500

facets and dispatches a system mobile agent to carry them with it and extract the user agents at idle servers.  

E-Print Network (OSTI)

at idle servers. 6 Conclusions In this paper we have focused on small scale inter­cluster job coordination­ dination work and upgrade the features of remote clusters using mobile agents. We have implemented

Fukuda, Munehiro