Powered by Deep Web Technologies
Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

2

T-713: Blue Coat Reporter Directory Traversal Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Blue Coat Reporter Directory Traversal Flaw 3: Blue Coat Reporter Directory Traversal Flaw T-713: Blue Coat Reporter Directory Traversal Flaw September 9, 2011 - 10:47am Addthis PROBLEM: A vulnerability was reported in Blue Coat Reporter. A remote user can view files on the target system and gain full control of the target application. PLATFORM: All pre-9.3 versions of Reporter installed on a Windows server are vulnerable. ABSTRACT: Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. reference LINKS: Blue Coat Security Advisory ID: SA60 SecurityTracker Alert ID: 1026023 About Path Traversal IMPACT ASSESSMENT: High Discussion: Reporter installed on a Windows server is vulnerable to an HTTP directory traversal attack. An unauthenticated user can browse the file system and read any file. Data from these files can be used by an attacker to gain

3

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

4

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities April 27,...

5

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server...

6

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Ruby Mail Gem Directory Traversal and Shell Command 57: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities April 27, 2012 - 7:00am Addthis PROBLEM: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities PLATFORM: Mail gem for Ruby 2.x ABSTRACT: Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system. Reference Links: Secunia Advisory SA48970 CVE-2012-2139 CVE-2012-2140 IMPACT ASSESSMENT: Medium Discussion: Input passed via the "to" parameter within the file delivery method is not properly verified before being used and can be exploited to modify arbitrary files via directory traversal attacks. Certain input passed to

7

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

8

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

9

Resource Directory  

Science Conference Proceedings (OSTI)

Online search and networking tool that connects AOCS members with their peers who share a common technical interest, geographic location, or affinity. Resource Directory Membership Information achievement application award Awards distinguished div

10

JGI - Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

JGI Directory Search for a Staff Member The search string was empty. Please try again. Enter a name, email address, or phone number for a JGI staff member. (* is a wildcard.) Home...

11

Simplified parallel domain traversal  

Science Conference Proceedings (OSTI)

Many data-intensive scientific analysis techniques require global domain traversal, which over the years has been a bottleneck for efficient parallelization across distributed-memory architectures. Inspired by MapReduce and other simplified parallel ... Keywords: atmospheric ensemble analysis, data-intensive analysis, parallel particle tracing, parallel processing

Wesley Kendall; Jingyuan Wang; Melissa Allen; Tom Peterka; Jian Huang; David Erickson

2011-11-01T23:59:59.000Z

12

Berkeley Lab Directory Services: Offsite Directory Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Offsite Directories Offsite Directories Directories for Organizations Related to the Lab Berkeley Lab Directory Services DOE Labs and Sites DOE National Telephone Directory EPA ESnet Contacts Federal Telephone Directories Lawrence Livermore National Laboratory National Institute of Standards and Technology (NIST) National Institutes of Health (NIH) Directory National Science Foundation (NSF) SLAC Directories, Including High Energy Physics (HEP Names) UC Berkeley Directory (all current faculty, staff, and students) University of California Campuses and Offices General Online Directories AT&T directory services All-In-One HotBot Internet Address Finder WhoWhere? People Search Yellowbook Yahoo People Search International Country Codes for Email Addresses Official USPS Abbreviations (States, Street Suffixes, Secondary Unit

13

Flaw detection and evaluation  

DOE Patents (OSTI)

The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

Wilks, Robert S. (Plum, PA); Sturges, Jr., Robert H. (Plum, PA)

1983-01-01T23:59:59.000Z

14

Fellows Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory Directory Fellows Directory Complete listing of senior, active, and retired Laboratory Fellows. Senior, active, and retired Laboratory Fellows Senior Fellows Mark Bitensky, retired Gregory H. Canavan Stirling A. Colgate, retired Harry Dreicer, retired Hans Frauenfelder Gerald T. Garvey, retired Houston T. Hawkins Siegfried S. Hecker, retired Alan S. Perelson William H. Press A. P. Sattelberger, retired Benno P. Schoenborn, retired Geoffrey B. West, retired Stephen M. Younger, retired Deceased Fellows Herbert L. Anderson Aloysius Arko George I. Bell Peter A. Carruthers Edward Cashwell George A. Cowan Arthur N. Cox Keith H. Despain Clarence Max Fowler Walter B. Goad Gordon E. Hansen P. O'Dean Judd Robert G. Keepin Edward A. Knapp Jere D. Knight H. Ralph Lewis John Marshall Nicholas Metropolis

15

PNNL: Contacts: Staff Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Staff Directory Name: Search Search the PNNL staff directory. Information returned includes staff name and telephone number. Enter the full or partial name you would like to search...

16

DOE Directory – Contents  

U.S. Energy Information Administration (EIA)

Directory of EIA Models 2001. This directory was prepared by the Energy Information Administration, National Energy Information Center, by Mary Ellen ...

17

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

18

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: Avaya IP Office Manager TFTP Server Lets Remote Users 48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Avaya IP Office Manager. A remote user can view files on the target system. PLATFORM: Versions 5.0.x - 6.1.x ABSTRACT: The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. reference LINKS: ASA-2011-156 SecurityTracker Alert ID: 1025664 Secunia Advisory: SA43884 Avaya Support IMPACT ASSESSMENT: Medium Discussion: Avaya IP Office Manager is an application for viewing and editing an IP Office system's configuration. It can be used to securely connect to and

19

Flaw Detection and Evaluation  

Science Conference Proceedings (OSTI)

Table 2   Planar flaw classification and NDE detection methods...Lack of bonding Forging or rolling lap Casting cold shut Heat treatment cracks Grinding cracks Plating cracks Fatigue cracks Stress-corrosion cracks Welding cracks Lack of fusion Incomplete penetration Brazing debond NDE detection methods Visual Replication microscopy Magnetic particle Magnetic...

20

Directory Listings | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Organization Chart Offices Budget & Performance Web Policies Open Government Contact Us Phonebook Directory Listings History There are three DOE Directory Listings: An...

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

MSED Staff Directory  

Science Conference Proceedings (OSTI)

MSED Staff Directory. ... The search box will accept either a name, organizational name, or email address. Related Links: MML Organization. Contact. ...

2013-03-12T23:59:59.000Z

22

NERSC HPSS Project Directories  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Directory Request Form Storing and Retrieving Data Advanced Usage Examples Charging Storage Statistics Troubleshooting Optimizing IO performance on the Lustre file system...

23

Offsite Directory Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Offsite Directories A-Z Index Search Phone Book Comments Ernest Orlando Lawrence Berkeley National Laboratory International country codes for email addresses International Standard...

24

NEPA Stakeholders Directory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Policy Act N E P A DIRECTORY of POTENTIAL STAKEHOLDERS for DOE ACTIONS under NEPA 28 th Edition July 2011 U.S. Department of Energy Office of NEPA Policy and Compliance United States Government Department of Energy memorandum DATE: July 28, 201 1 REPLY TO ATN OF: Office of NEPA Policy and Compliance (C. Chen, GC-54,202-586-0733) SUBJECT: Directory of Potential Stakeholders for DOE Actions under NEPA: 2gth Edition TO: DOE NEPA Community I am pleased to announce that the 2sth edition of the Directory of Potential Stakeholders for DOE Actions under NEPA, dated July 20 1 1, is now posted on the DOE NEPA website (http://ne-pa. enerm. gov/documents/StakeholdersDirectory. pdfl. The Directory is intended to supplement distribution lists that DOE Offices compile for particular projects or facilities

25

Berkeley Lab Directory Services  

NLE Websites -- All DOE Office Websites (Extended Search)

How to use the LBNL directory search pages How to use the LBNL directory search pages How to search for people at LBNL Searching for two-letter names at LBNL Advanced search: how to search by office location, etc. Hostname/DNS lookup How to add a link to your website in your directory listing How to find people at LBNL If you enter a single word, the directory will search for one of the following: Partial first or last name. (e.g. Tony or Smith) E-mail address (e.g. JRSmith) The end of a phone number- usually the extension. (e.g. 6965) The employee ID # If you enter two words, the directory will search for: The combination of both the beginning of a FIRST name and the beginning of a LAST name. When BOTH first and second words are matched, the name is displayed. This is the prefered method of searching- fewer entries

26

Illinois solar energy directory  

SciTech Connect

This Directory contains a listing of Illinois solar energy equipment manufacturers, distributors, installers, consultants, home builders, and alternative energy organizations. Discussions of consumer protection, tax credits, and Illinois solar law are included.

1980-01-01T23:59:59.000Z

27

EIA publications directory, 1991  

SciTech Connect

Enacted in 1977, the Department of Energy (DOE) Organization Act established the Energy Information Administration (EIA) as the Department`s independent statistical and analytical agency, with a mandate to collect and publish data and prepare analyses on energy production, consumption, prices, and resources, and projections of energy supply and demand. This edition of the EIA Publications Directory contains titles and abstracts of periodicals and one-time reports produced by the EIA from January through December 1991. This edition supplements EIA Publications Directory 1977--1989 and EIA Publications Directory 1990. The body of the Directory contains citations and abstracts arranged by broad subject categories, such as coal, petroleum, and natural gas and subcategories such as reserves, produces and byproducts, and marketing and economics. All reports are indexed alphabetically by subject and title and numerically by report number.

Not Available

1992-05-19T23:59:59.000Z

28

EIA publications directory, 1991  

SciTech Connect

Enacted in 1977, the Department of Energy (DOE) Organization Act established the Energy Information Administration (EIA) as the Department's independent statistical and analytical agency, with a mandate to collect and publish data and prepare analyses on energy production, consumption, prices, and resources, and projections of energy supply and demand. This edition of the EIA Publications Directory contains titles and abstracts of periodicals and one-time reports produced by the EIA from January through December 1991. This edition supplements EIA Publications Directory 1977--1989 and EIA Publications Directory 1990. The body of the Directory contains citations and abstracts arranged by broad subject categories, such as coal, petroleum, and natural gas and subcategories such as reserves, produces and byproducts, and marketing and economics. All reports are indexed alphabetically by subject and title and numerically by report number.

Not Available

1992-05-19T23:59:59.000Z

29

MIDC: Site Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory MIDC Station Data Availability Matrix: Station SRRL BMS SRRL BSRN SRRL AOCS SRRL TSR SRRL RSP2 SRRL RSP SRRL ATI NWTC M2 ARM RCS NPCS UNLV PFCI LLLJP SPMD SCID BSC ECSU...

30

Energy Information Directory 1996  

SciTech Connect

This directory lists most government offices and trade associations that are involved in energy matters. It does not include DOE offices which do not deal with the public or public information.

1997-01-01T23:59:59.000Z

31

EIA publications directory 1997  

SciTech Connect

This edition of the EIA Publications Directory contains 68 titles and abstracts of periodicals and one time reports produced by EIA from January through December 1997. The body of the Directory contains citations and abstracts arranged by broad subject categories; (1) MetaData, (2) Coal, (3) Oil (4) Natural gas, (5) Nuclear, (6) Electricity, (7) Renewable energy and Alternative fuels, (8) Multifuel, (9) End use consumption, (10) Models, and (11) Forecasts.

NONE

1998-04-01T23:59:59.000Z

32

EIA publications directory 1996  

DOE Green Energy (OSTI)

This edition of the EIA Publications Directory contains titles and abstracts of periodicals and one-time reports produced by the Energy Information Administration (EIA) from January through December 1996. The body of the Directory contains citations and abstracts arranged by broad subject categories; metadata, coal, oil and gas, nuclear, electricity, renewable and energy/alternative fuels, multifuel, end-use consumption, models, and forecasts.

NONE

1997-05-01T23:59:59.000Z

33

Restart trail for stackless BVH traversal  

Science Conference Proceedings (OSTI)

A ray cast algorithm utilizing a hierarchical acceleration structure needs to perform a tree traversal in the hierarchy. In its basic form, executing the traversal requires a stack that holds the nodes that are still to be processed. In some cases, such ...

Samuli Laine

2010-06-01T23:59:59.000Z

34

DIRECTORY OF ACCREDITED NORTH AMERICAN ...  

Science Conference Proceedings (OSTI)

... The directory also includes ... Operates in Houston, TX (Headquarters); River Edge, NJ ... de Normalisation) AIDMO (Arab Organization for Industrial ...

2011-08-22T23:59:59.000Z

35

Hollings Marine Laboratory Staff Directory  

Science Conference Proceedings (OSTI)

Hollings Marine Laboratory Staff Directory. ... The Search box will accept a name, phone number, organization name, email address, etc. Contact. ...

2013-08-15T23:59:59.000Z

36

NIST Laser Applications Staff Directory  

Science Conference Proceedings (OSTI)

Laser Applications Staff Directory. Staff. Name, Position, Office Phone. ... Contact. Laser Applications Group Keith Lykke, Group Leader. ...

2012-11-26T23:59:59.000Z

37

Chemical Sciences Division - Staff Directory  

Science Conference Proceedings (OSTI)

Chemical Sciences Division. Carlos A. Gonzalez (Division Chief) Carol A. Driver (Office Manager) Division Office Staff Directory. ...

2013-08-15T23:59:59.000Z

38

NIST Optical Radiation Staff Directory  

Science Conference Proceedings (OSTI)

Optical Radiation Staff Directory. Staff. Name, Position, Office Phone. ... Contact. Optical Radiation Group Eric Shirley, Group Leader. ...

2013-08-02T23:59:59.000Z

39

Better Buildings Neighborhood Program: Resource Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Tools & Resources Tools & Resources Printable Version Share this resource Send a link to Better Buildings Neighborhood Program: Resource Directory to someone by E-mail Share Better Buildings Neighborhood Program: Resource Directory on Facebook Tweet about Better Buildings Neighborhood Program: Resource Directory on Twitter Bookmark Better Buildings Neighborhood Program: Resource Directory on Google Bookmark Better Buildings Neighborhood Program: Resource Directory on Delicious Rank Better Buildings Neighborhood Program: Resource Directory on Digg Find More places to share Better Buildings Neighborhood Program: Resource Directory on AddThis.com... Case Studies Resource Directory Webcasts Workshops Grants Administration Resource Directory The guidance documents and reports below have been used by Better Buildings

40

NIST Engineers Discover Fundamental Flaw in Transistor ...  

Science Conference Proceedings (OSTI)

NIST Engineers Discover Fundamental Flaw in Transistor Noise Theory. For Immediate Release: May 20, 2009. ...

2012-11-02T23:59:59.000Z

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Beamlines Directory ALS Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

42

EIA publications directory, 1990  

Science Conference Proceedings (OSTI)

Enacted in 1977, the Department of Energy (DOE) Organization Act established the Energy Information Administration (EIA) as the Department's independent statistical and analytical agency, with a mandate to collect and publish data and prepare analyses on energy production, consumption, prices, and resources, and projections of energy supply and demand. This edition of the EIA Publications Directory contains titles and abstracts of periodicals and one-time reports produced by the EIA from January through December 1990. This edition supplements EIA Publications Directory 1977--1989. The body of the Directory contains citations and abstracts arranged by broad subject categories, such as coal, petroleum, and natural gas and subcategories such as reserves, products and byproducts, and marketing and economics. All reports are indexed alphabetically by subject and title and numerically by report number.

Not Available

1991-06-10T23:59:59.000Z

43

EIA publications directory 1994  

Science Conference Proceedings (OSTI)

Enacted in 1977, the Department of Energy (DOE) Organization Act established the Energy Information Administration (EIA) as the Department`s independent statistical and analytical agency, with a mandate to collect and publish data and prepare analyses on energy production, consumption, prices, resources, and projections of energy supply and demand. This edition of the EIA Publications Directory contains titles and abstracts of periodicals and one-time reports produced by EIA from January through December 1994. The body of the Directory contains citations and abstracts arranged by broad subject categories: metadata, coal, oil and gas, nuclear, electricity, renewable energy/alternative fuels, multifuel, end-use consumption, models, and forecasts.

NONE

1995-07-20T23:59:59.000Z

44

Natural gas industry directory  

SciTech Connect

This directory has information on the following: associations and organizations; exploration and production; gas compression; gas processors; gathering and transmission companies; liquefied natural gas; local distribution companies; marketing firms; regulatory agencies; service companies; suppliers and manufacturers; and regional buyer`s guide.

NONE

1999-11-01T23:59:59.000Z

45

Plasma technology directory  

SciTech Connect

The Plasma Technology Directory has two main goals: (1) promote, coordinate, and share plasma technology experience and equipment within the Department of Energy; and (2) facilitate technology transfer to the commercial sector where appropriate. Personnel are averaged first by Laboratory and next by technology area. The technology areas are accelerators, cleaning and etching deposition, diagnostics, and modeling.

Ward, P.P.; Dybwad, G.L.

1995-03-01T23:59:59.000Z

46

Energy information directory 1995  

Science Conference Proceedings (OSTI)

The National Energy Information Center provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. This Energy Information Directory is used to assist the Center staff as well as other DOE staff in directing inquires to the proper offices.

NONE

1995-10-01T23:59:59.000Z

47

EIA Publications Directory 1993  

SciTech Connect

This directory contains abstracts and ordering information for EIA publications released in the above time period. The abstracts are arranged by broad subject category such as coal, petroleum, natural gas, and electric power. A comprehensive subject index, a title index, and a report number index are included. Each entry gives the title, report number, publication frequency, date, number of pages, and ordering information.

Not Available

1994-07-18T23:59:59.000Z

48

Illinois solar energy directory  

SciTech Connect

This Directory contains a listing of Illinois and nationwide solar energy equipment manufacturers, distributors, installers, and consultants. Discussions of consumer protection and solar law in Illinois are included. A bibliography and listing of available resources and a catalogue of Illinois solar installations are included.

Green, B.D.; Pogany, D.Z.

1978-11-01T23:59:59.000Z

49

Latin America petroleum directory  

SciTech Connect

This directory contains information on the following: associations/government agencies; drilling/exploration/production; engineering and construction; exploration and production; financial/engineering/management/legal consultants; gas processing and distribution companies; general transportation; geological and geophysical; service contractors; petrochemicals and specialty chemicals; pipeline contractors; pipelines; refining and marketing; service companies; suppliers and manufacturers; and regional buyer`s guide.

NONE

1999-11-01T23:59:59.000Z

50

EIA publications directory, 1992  

DOE Green Energy (OSTI)

This directory contains abstracts and ordering information for EIA publications. The abstracts are arranged by broad subject category such as coal, petroleum, natural gas, and electric power. A comprehensive subject index, a title index, and a report number index are included. Each entry gives the title, report number, publication frequency, date, number of pages, and ordering information. Publication began with the 1979 edition.

Not Available

1993-06-24T23:59:59.000Z

51

Building Energy Software Tools Directory: ISOVER Energi  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Software Tools Directory Printable Version Share this resource Home About the Directory Tools by Subject Tools Listed Alphabetically Tools by Platform PC...

52

Building Energy Software Tools Directory: Solar Tool  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Software Tools Directory EERE Building Technologies Office Building Energy Software Tools Directory Printable Version Share this resource Home About the...

53

Building Energy Software Tools Directory: Cake Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Software Tools Directory EERE Building Technologies Office Building Energy Software Tools Directory Printable Version Share this resource Home About the...

54

Building Energy Software Tools Directory: Acoustics Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Software Tools Directory EERE Building Technologies Office Building Energy Software Tools Directory Printable Version Share this resource Home About the...

55

Building Energy Software Tools Directory : Engineering Toolbox  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Software Tools Directory EERE Building Technologies Office Building Energy Software Tools Directory Printable Version Share this resource Home About the...

56

Building Energy Software Tools Directory: Engineering Toolbox  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Software Tools Directory EERE Building Technologies Office Building Energy Software Tools Directory Printable Version Share this resource Home About the...

57

Building Energy Software Tools Directory: Energy Expert  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

58

Building Energy Software Tools Directory: SUNREL  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

59

Building Energy Software Tools Directory: RIUSKA  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

60

Building Energy Software Tools Directory: TOP Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Building Energy Software Tools Directory: BESTEST  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

62

Building Energy Software Tools Directory: SMILE  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

63

Building Energy Software Tools Directory: TRACE 700  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

64

Building Energy Software Tools Directory: ADELINE  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

65

Building Energy Software Tools Directory: TRNSYS  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

66

Building Energy Software Tools Directory: Cepenergy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

67

Building Energy Software Tools Directory: Recurve  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

68

Engines, turbines and compressors directory  

SciTech Connect

This book is a directory of engines, turbines and compressors. It adds and deletes compressor engines in use by the gas industry.

1989-01-01T23:59:59.000Z

69

NIST Sensor Science Staff Directory  

Science Conference Proceedings (OSTI)

... Ultraviolet Radiation Staff Directory. Search for a Staff Member. The Search box will accept a name, organization name or email address. ...

2013-12-26T23:59:59.000Z

70

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Print Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

71

Chemistry Department Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemistry Staff Directory Chemistry Staff Directory Last Name, First Phone E-mail Note: All listed phone extensions are in the format of (631) 344-xxxx. Adzic, Radoslav 4522 adzic@bnl.gov Akimov, Alexey No Entry akimov@bnl.gov An, Wei 4317 weian@bnl.gov Anselmini, James 4399 anselmini@bnl.gov Baber, Ashleigh 4317 ababer@bnl.gov Badiei, Yosra 4360 ybadiei@bnl.gov Bak, Seong Min BAK 3663 smbak@bnl.gov Bakalis, Jin No Entry jbakalis@bnl.gov Bird, Matthew 4331 mbird@bnl.gov Cabelli, Diane 4361 cabelli@bnl.gov Camillone III, Nicholas 4412 nicholas@bnl.gov Chen, Jingguang 2655 jgchen@bnl.gov Chen, Wei-Fu 4360 wfchen@bnl.gov Concepcion, Javier 4369 jconcepc@bnl.gov Cook, Andrew 4782 acook@bnl.gov Cumming, James 4338 cumming@bnl.gov Duan, Lele 4357 lduan@bnl.gov Ertem, Mehmed No Entry mzertem@bnl.gov

72

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Print Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

73

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS Beamlines Directory Print ALS Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

74

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS Beamlines Directory Print ALS Beamlines Directory Print Beamlines, Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline Parameters Beamline and endstation technical information is available through the links below. Unless otherwise noted, all beamlines are currently operational. Individual beamline schedules are posted when available. Please contact the responsible beamline scientist for additional schedule information. When calling from off-site, all beamline (BL) phone numbers that begin with a "2" are preceded by 495- (i.e., 495-2014); all others are preceded by 486-. Beamline Number Source Technique/ Group Name Energy Range Beamline Contact Schedule/BL Phone

75

Energy information directory 1994  

Science Conference Proceedings (OSTI)

The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information.

Not Available

1994-03-28T23:59:59.000Z

76

Energy information directory 1998  

SciTech Connect

The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists most Government offices and trade associations that are involved in energy matters.

1998-11-01T23:59:59.000Z

77

EIA Publications Directory 1995  

SciTech Connect

This directory contains abstracts and ordering information for individual issues of semiannual, annual, biennial, and triennial Energy Information Administration (EIA) periodicals, analysis reports, Service Reports, and model documentations. This edition covers periodicals and one-time reports produced by EIA from January through December 1995. The citations and abstracts are arranged by broad subject categories: metadata, coal, oil/gas, nuclear, electricity, renewable energy/alternative fuels, multifuel, end-use consumption, models, and forecasts. Indexes are provided.

1995-10-01T23:59:59.000Z

78

Directory of Federal Government Certification Programs  

Science Conference Proceedings (OSTI)

Page 1. NBS Special Publication 739 Directory of Federal Government Certification Programs Maureen Breitenberg, Editor ...

2011-07-29T23:59:59.000Z

79

Message passing with parallel queue traversal  

SciTech Connect

In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

Underwood, Keith D. (Albuquerque, NM); Brightwell, Ronald B. (Albuquerque, NM); Hemmert, K. Scott (Albuquerque, NM)

2012-05-01T23:59:59.000Z

80

Directorio de Profesionales Indigenas/Directory of Indigenous Professionals: Sobre el Directorio/About the Directory  

E-Print Network (OSTI)

are printed as directories of organizations, bulletins, andDirectory is constituted by indigenous people's organizationsorganizations and institutions will provide us with feed back on the accuracy of the Directory

Varese, Stefano; Gonzalez, Tirso

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Category:Traverse City, MI | Open Energy Information  

Open Energy Info (EERE)

City, MI" City, MI" The following 16 files are in this category, out of 16 total. SVFullServiceRestaurant Traverse City MI Detroit Edison Co.png SVFullServiceRestauran... 64 KB SVHospital Traverse City MI Detroit Edison Co.png SVHospital Traverse Ci... 63 KB SVLargeHotel Traverse City MI Detroit Edison Co.png SVLargeHotel Traverse ... 61 KB SVLargeOffice Traverse City MI Detroit Edison Co.png SVLargeOffice Traverse... 64 KB SVMediumOffice Traverse City MI Detroit Edison Co.png SVMediumOffice Travers... 59 KB SVMidriseApartment Traverse City MI Detroit Edison Co.png SVMidriseApartment Tra... 64 KB SVOutPatient Traverse City MI Detroit Edison Co.png SVOutPatient Traverse ... 64 KB SVPrimarySchool Traverse City MI Detroit Edison Co.png SVPrimarySchool Traver... 65 KB SVQuickServiceRestaurant Traverse City MI Detroit Edison Co.png

82

Wind energy information directory  

DOE Green Energy (OSTI)

Wind Energy Information has been prepared to provide researchers, designers, manufacturers, distributors, dealers, and users of wind energy conversion systems with easy access to technical information. This directory lists organizations and publications which have the main objective of promoting the use of wind energy conversion systems, some organizations that can respond to requests for information on wind energy or make referrals to other sources of information, and some publications that occasionally include information on wind energy. The bibliography contains references to information for both the neophyte and the expert.

None

1979-10-01T23:59:59.000Z

83

Energy conditions, traversable wormholes and dust shells  

E-Print Network (OSTI)

Firstly, we review the pointwise and averaged energy conditions, the quantum inequality and the notion of the ``volume integral quantifier'', which provides a measure of the ``total amount'' of energy condition violating matter. Secondly, we present a specific metric of a spherically symmetric traversable wormhole in the presence of a generic cosmological constant, verifying that the null and the averaged null energy conditions are violated, as was to be expected. Thirdly, a pressureless dust shell is constructed around the interior wormhole spacetime by matching the latter geometry to a unique vacuum exterior solution. In order to further minimize the usage of exotic matter, we then find regions where the surface energy density is positive, thereby satisfying all of the energy conditions at the junction surface. An equation governing the behavior of the radial pressure across the junction surface is also deduced. Lastly, taking advantage of the construction, specific dimensions of the wormhole, namely, the throat radius and the junction interface radius, and estimates of the total traversal time and maximum velocity of an observer journeying through the wormhole, are also found by imposing the traversability conditions.

Francisco S. N. Lobo

2004-10-18T23:59:59.000Z

84

Information Services Directory  

SciTech Connect

Congress passed the Nuclear Waste Policy Act of 1982 (NWPA) and its amendments establishing the national policy for safely storing, transporting and disposing of spent nuclear fuel and high-level radioactive waste in a geologic repository. This legislation created the Office of Civilian Radioactive Waste Management (OCRWM) within the US Department of Energy (DOE) to develop an integrated system for the safe and efficient disposal of high-level radioactive waste. The NWPA, as amended, directs DOE to study in detail the Yucca Mountain site in Nevada as the only candidate site for the Nation`s geologic repository. This Information Services Directory is intended to facilitate dissemination of information. The Directory is produced by the Education and Information Division of OCRWM`s Office of External Relations and will be updated periodically. This is the third such update since its issuance in August 1986. It is a reference document that lists the sources of program information available to states, Indian tribes, and the public.

NONE

1991-03-01T23:59:59.000Z

85

Directory of awardee names  

Science Conference Proceedings (OSTI)

Standardization of grant and contract awardee names has been an area of concern since the development of the Department`s Procurement and Assistance Data System (PADS). A joint effort was begun in 1983 by the Office of Scientific and Technical Information (OSTI) and the Office of Procurement and Assistance Management/Information Systems and Analysis Division to develop a means for providing uniformity of awardee names. As a result of this effort, a method of assigning vendor identification codes to each unique awardee name, division, city, and state combination was developed and is maintained by OSTI. Changes to vendor identification codes or awardee names contained in PADS can be made only by OSTI. Awardee names in the Directory indicate that the awardee has had a prime contract (excluding purchase orders of $10,000 or less) with, or a financial assistance award from, the Department. Award status--active, inactive, or retired--is not shown. The Directory is in alphabetic sequence based on awardee name and reflects the OSTI-assigned vendor identification code to the right of the name. A vendor identification code is assigned to each unique awardee name, division, city, and state (for place of performance). The same vendor identification code is used for awards throughout the Department.

Not Available

1999-07-01T23:59:59.000Z

86

Energy information directory 1997  

SciTech Connect

The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, state, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists some of the Government offices and trade associations that are involved in energy matters. It includes those DOE offices which deal with the public or public information. For the purposes of this publication, each entry has been given a numeric identification symbol. The index found in the back of this publication uses these identification numbers to refer the reader to relevant entries.

1997-09-01T23:59:59.000Z

87

Information services directory  

SciTech Connect

Congress passed the Nuclear Waste Policy Act of 1982 (NWPA) and its amendments establishing the National policy for safely storing, transporting and disposing of spent nuclear fuel and high-level radioactive waste in a geologic repository. This legislation created the Office of Civilian Radioactive Waste Management (OCRWM) within the US Department of Energy (DOE) to develop an integrated system for the safe and efficient disposal of high-level radioactive waste. The NWPA, as amended, directs DOE to study in detail the Yucca Mountain site in Nevada as the only candidate site for the Nation`s geologic repository. In Nevada, the DOE/OCRWM Yucca Mountain Site Characterization Project Office (YMPO) manages scientific investigations to determine the suitability of Yucca Mountain for effectively isolating radioactive waste from the public and the environment. This Information Services Directory is intended to facilitate dissemination of information. The Directory is produced by the Education and Information Division of OCRWM`s Office of External Relations and will be updated periodically. This is the third such update since its issuance in August 1986. It is a reference document that lists the sources of program information available to States, Indian Tribes and the public.

1991-01-01T23:59:59.000Z

88

DOE Solar Decathlon: Product Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory Directory The U.S. Department of Energy Solar Decathlon 2009 Product Directory provides a complete listing of the products used in the solar-powered team houses. To find common household products, see the list below. You may also search for products by team or in the Product Directory spreadsheet Microsoft Excel . By Products By Team Advanced Search Household Products Bathroom Faucet Bathroom Sink Clothes Dryer Clothes Washer Clothes Washer/Dryer Cooktop Computer Desktop Laptop Decking Dishwasher Dishdrawer Under Counter Dishwasher Exhaust Hood Flooring Furniture Insulation Kitchen Cabinets Kitchen Countertops Kitchen Faucet Kitchen Sink Lighting Fixed Lighting (hardwired) Plug-In Lighting (lamps, plug-in fixtures) Sensors Oven Combination Microwave Steam Wall Photovoltaic Collectors

89

Chemical Sciences Division: Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

INTRODUCTION INTRODUCTION TO CSD NATIONAL FACILITIES & CENTERS RESEARCH STUDENT & POSTDOCTORAL OPPORTUNITIES NEWS & EVENTS CSD CONTACTS LBNL HOME Privacy & Security Notice DOE UC Berkeley CSD Directory A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Rebecca Abergel CSD Project Scientist; The Glenn T. Seaborg Center. Musahid Ahmed CSD Staff Scientist, Chemical Physics Program/Chemical Dynamics Beamline Publications Richard A. Andersen Professor of Chemistry, UC Berkeley; CSD Senior Faculty Scientist, The Glenn T. Seaborg Center Publications John Arnold Professor of Chemistry, UC Berkeley; CSD Faculty Scientist, Catalytic Science Program Publications B Ali Belkacem CSD Deputy and Senior Staff Scientist; Atomic, Molecular and Optical Sciences Program Leader

90

Neutron Condensed Matter Science Staff Directory  

Science Conference Proceedings (OSTI)

Neutron Condensed Matter Science Staff Directory. Dr. Dan Neumann, Group Leader, 301-975-5252. ... Macromolecular and Microstructural Sciences. ...

2013-04-01T23:59:59.000Z

91

Applied Chemicals and Materials Staff Directory  

Science Conference Proceedings (OSTI)

Applied Chemicals and Materials Staff Directory. ... accept either a name, organizational name, or ... MML Organization. Contact. Material Measurement ...

2012-10-12T23:59:59.000Z

92

NREL: Technology Transfer - Clean Energy Investors Directory  

National Renewable Energy Laboratory Technology Transfer NREL is no longer maintaining the Clean Energy Investors Directory due to widely accessible ...

93

NIST Radiation and Biomolecular Physics Staff Directory  

Science Conference Proceedings (OSTI)

Radiation and Biomolecular Physics Staff Directory. Browse Staff by Group. Dosimetry. Neutron Physics. Radioactivity. Search for Staff Member. ...

2013-07-03T23:59:59.000Z

94

A scalable organization for distributed directories  

Science Conference Proceedings (OSTI)

Although directory-based cache-coherence protocols are the best choice when designing chip multiprocessors with tens of cores on-chip, the memory overhead introduced by the directory structure may not scale gracefully with the number of cores. Many approaches ... Keywords: Cache coherence, Chip multiprocessors, Distributed directory, Duplicate tags, Implicit replacements, Many-core CMPs, Scalability

Alberto Ros; Manuel E. Acacio; José M. García

2010-02-01T23:59:59.000Z

95

Windows Enterprise Design Master Directory Sources  

E-Print Network (OSTI)

Windows Enterprise Design Master Directory Sources September 29, 2003 Active Directory information for Windows users contains several pieces of information to identify the person associated with a Windows in Windows Active Directory. It is important the information correctly reflects your current name

Simpkins, William W.

96

The HMDS Coating Flaw Removal Tool  

Science Conference Proceedings (OSTI)

In many high energy laser systems, optics with HMDS sol gel antireflective coatings are placed in close proximity to each other making them particularly susceptible to certain types of strong optical interactions. During the coating process, halo shaped coating flaws develop around surface digs and particles. Depending on the shape and size of the flaw, the extent of laser light intensity modulation and consequent probability of damaging downstream optics may increase significantly. To prevent these defects from causing damage, a coating flaw removal tool was developed that deploys a spot of decane with a syringe and dissolves away the coating flaw. The residual liquid is evacuated leaving an uncoated circular spot approximately 1mm in diameter. The resulting uncoated region causes little light intensity modulation and thus has a low probability of causing damage in optics downstream from the mitigated flaw site.

Monticelli, M V; Nostrand, M C; Mehta, N; Kegelmeyer, L; Johnson, M A; Fair, J; Widmayer, C

2008-10-24T23:59:59.000Z

97

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

98

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

99

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

100

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System Multiple Vulnerabilities U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

102

Energy conditions, traversable wormholes and dust shells  

E-Print Network (OSTI)

Firstly, we review the pointwise and averaged energy conditions, the quantum inequality and the notion of the ``volume integral quantifier'', which provides a measure of the ``total amount'' of energy condition violating matter. Secondly, we present a specific metric of a spherically symmetric traversable wormhole in the presence of a generic cosmological constant, verifying that the null and the averaged null energy conditions are violated, as was to be expected. Thirdly, a pressureless dust shell is constructed around the interior wormhole spacetime by matching the latter geometry to a unique vacuum exterior solution. In order to further minimize the usage of exotic matter, we then find regions where the surface energy density is positive, thereby satisfying all of the energy conditions at the junction surface. An equation governing the behavior of the radial pressure across the junction surface is also deduced. Lastly, taking advantage of the construction, specific dimensions of the wormhole, namely, the t...

Lobo, F S N

2004-01-01T23:59:59.000Z

103

DOE Solar Decathlon: Product Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Andrea Argabright, a student decathlete, staining an exterior wall of the Solar Decathlon 2013 West Virginia University house. Andrea Argabright, a student decathlete, staining an exterior wall of the Solar Decathlon 2013 West Virginia University house. U.S. Department of Energy Solar Decathlon Bookmark and Share - Home About Competition Scores & Standings Teams News Photos Videos Product Directory Village Energy Balance Education Sponsors History FAQs Contacts Product Directory The U.S. Department of Energy Solar Decathlon 2013 product directory is a listing of products used in the solar-powered team houses. Find specific products in the table below by sorting or searching by description, manufacturer, model, or team. Brief Description Detailed Description Manufacturer Model Team Name Bathroom Faucet Wall mount two-handle lavatory faucet with solid brass fixtures Kohler K-T14412-4-BN Team Alberta

104

Tools & Resources: Resource Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Resource Directory Resource Directory The guidance documents and reports below have been used by Better Buildings Neighborhood Program partners to build their programs and guide them to early successes. The tools and calculators can be used by homeowners, business owners, and program designers to help determine energy savings and other benefits associated with energy efficiency upgrades. Guidance Documents and Reports Background Program Evaluation Program Updates and Lessons Learned Program Design Marketing and Driving Demand Financing and Incentives Workforce Development Partnering with Utilities Technical Resources Tools and Calculators For Homes For Commercial Buildings Emissions and Equivalency Calculators Guidance Documents and Reports Background Recovery Through Retrofit Report

105

NON-DESTRUCTIVE FLAW DETECTION APPARATUS  

DOE Patents (OSTI)

An apparatus is described for the non-destructive detection of flaws in electrical conducting articles. The particular feature of the detection apparatus is that a flaw in the front or back of the test article will not be masked by signals caused by the passage of the end and front of the article through the detection apparatus. The present invention alleviates the above problem by mounting detection coils on directly opposite sides of the test passageway so that the axes of the pickup coils are perpendicular to the axis of an energizing coil through which the article is passed. A flaw in the article will cause a change in the voltage induced in one pickup coil, but passage of the end or front of the article will not produce unequal signals. The signals are compared in appropriate electrical circuitry to actuate a recorder only when unequal signals are present, indicating the presence of a flaw.

Stateman, M.J.; Holloway, H.R.

1957-12-17T23:59:59.000Z

106

Steam Generator Management Program: Flaw Handbook Calculator  

Science Conference Proceedings (OSTI)

The EPRI Steam Generator Management Program: Steam Generator Degradation Specific Flaw Handbook v1.0 defines burst pressure equations for steam generator tubes with various degradation morphologies, and the EPRI Steam Generator Management Program: Steam Generator Integrity Assessment Guidelines (1019038) describes a probabilistic evaluation process which can be used to account for key input parameter uncertainties. The Flaw Handbook Calculator software is an automated Microsoft Excelspreadsheet which cal...

2010-04-20T23:59:59.000Z

107

Traverse City Light & Power Wind Farm | Open Energy Information  

Open Energy Info (EERE)

Traverse City Light & Power Wind Farm Traverse City Light & Power Wind Farm Jump to: navigation, search Name Traverse City Light & Power Wind Farm Facility Traverse City Light & Power Sector Wind energy Facility Type Community Wind Facility Status In Service Owner Traverse City Light & Power Developer Traverse City Light & Power Energy Purchaser Traverse City Light & Power Location Traverse City MI Coordinates 44.777032°, -85.689917° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":44.777032,"lon":-85.689917,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

108

EMERGENCY CONTACT CAMPUS DIRECTORY INFORMATION  

E-Print Network (OSTI)

EMERGENCY CONTACT and CAMPUS DIRECTORY INFORMATION Please complete this form so that we have a record of whom to contact should an emergency situation arise. Also, take this opportunity to tell us: University location: EMERGENCY CONTACT INFORMATION Name: Relationship: Home Address: Work/daytime phone

Roy, Subrata

109

Building Energy Software Tools Directory: Construction R-value...  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Software Tools Directory Printable Version Share this resource Home About the Directory Tools by Subject Tools Listed Alphabetically Tools by Platform PC...

110

Building Energy Software Tools Directory: EE4 CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

111

Building Energy Software Tools Directory: ModEn  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

112

Building Energy Software Tools Directory: Energy Demand Modeling  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

113

Building Energy Software Tools Directory: TRACE Load 700  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

114

Building Energy Software Tools Directory: EA-QUIP  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

115

Building Energy Software Tools Directory: Autodesk Green Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

116

Building Energy Software Tools Directory: Building Energy Modelling...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

117

Building Energy Software Tools Directory: UrbaWind  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

118

Building Energy Software Tools Directory: AkWarm  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

119

Building Energy Software Tools Directory: EnergyGauge Summit...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

120

Building Energy Software Tools Directory: RadTherm  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Building Energy Software Tools Directory: VisualDOE  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory Search Search Help Building Energy Software Tools Directory...

122

Farmers Market directory | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Farmers Market directory Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov Communities Data.gov ...

123

Building Energy Software Tools Directory: Solar Tool  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory...

124

Biosystems and Biomaterials Division Staff Directory  

Science Conference Proceedings (OSTI)

Biosystems and Biomaterials Division Staff Directory. ... a Staff Member The Search box will accept a name, phone number, organization name, email ...

2013-11-05T23:59:59.000Z

125

NREL: Technology Transfer - Clean Energy Investors Directory  

NREL is no longer maintaining the Clean Energy Investors Directory due to widely accessible online information and financing resources. For a list of ...

126

Directory of Energy Information Administration Models 1994  

SciTech Connect

This directory revises and updates the 1993 directory and includes 15 models of the National Energy Modeling System (NEMS). Three other new models in use by the Energy Information Administration (EIA) have also been included: the Motor Gasoline Market Model (MGMM), Distillate Market Model (DMM), and the Propane Market Model (PPMM). This directory contains descriptions about each model, including title, acronym, purpose, followed by more detailed information on characteristics, uses and requirements. Sources for additional information are identified. Included in this directory are 37 EIA models active as of February 1, 1994.

Not Available

1994-07-01T23:59:59.000Z

127

Building Energy Software Tools Directory: Cake Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Printable Version Share this resource Home About the Directory Tools by Subject Whole Building Analysis Codes & Standards Materials, Components, Equipment, & Systems Other...

128

Building Energy Software Tools Directory: Acoustics Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Printable Version Share this resource Home About the Directory Tools by Subject Whole Building Analysis Codes & Standards Materials, Components, Equipment, & Systems Envelope...

129

Directory of Federal Government Certification and Related ...  

Science Conference Proceedings (OSTI)

... 1 .;.', J NIST Special Publication 739 1999 Edition Directory of Federal Government ... Page 4. Page 5. NIST Special Publication 739 1999 Edition ...

2011-07-22T23:59:59.000Z

130

Building Energy Software Tools Directory: Engineering Toolbox  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory...

131

Beamlines Directory | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamlines Directory Beamlines Directory Filter by: L bracket Discipline: All Atomic Physics Chemistry Environmental Science GeoScience Life Sciences Materials Science Physics Polymer Science Technique: All Anomalous and resonant scattering (hard x-ray) Anomalous and resonant scattering (soft x-ray) Biohazards at the BSL2/3 level Coherent x-ray scattering Diffraction anomalous fine structure Diffuse x-ray scattering Energy dispersive X-ray diffraction Fiber diffraction Fluorescence spectroscopy General diffraction Grazing incidence diffraction Grazing incidence small-angle scattering High-energy x-ray diffraction High-pressure diamond anvil cell High-pressure multi-anvil press Inelastic x-ray scattering Inelastic x-ray scattering (1 eV resolution) Intensity fluctuation spectroscopy Large unit cell crystallography Laue

132

Remedial Action Contacts Directory - 1997  

SciTech Connect

This document, which was prepared for the US Department of Energy (DOE) Office of Environmental Restoration (ER), is a directory of 2628 individuals interested or involved in environmental restoration and/or remedial actions at radioactively contaminated sites. This directory contains a list of mailing addresses and phone numbers of DOE operations, area, site, project, and contractor offices; an index of DOE operations, area, site, project, and contractor office sorted by state; a list of individuals, presented by last name, facsimile number, and e-mail address; an index of affiliations presented alphabetically, with individual contacts appearing below each affiliation name; and an index of foreign contacta sorted by country and affiliation. This document was generated from the Remedial Action Contacts Database, which is maintained by the Remedial Action Program Information Center (RAPIC).

1997-05-01T23:59:59.000Z

133

Daylighting directory 6/1980  

SciTech Connect

A renewed interest in the energy conservation potential of daylighting has generated new research, applications and demonstration activities over the last few years. It is apparent that even those people actively working in the field are frequently not aware of all of the ongoing projects and activities. At the same time, the total national effort to utilize daylighting effectively in buildings on a broad scale is still very small, thus making it important that current activities are crossfertilized. The intent of this directory is to provide current listings of individuals and organizations that are actively engaged in daylighting work and related publications and upcoming events of interest. This directory was compiled from information contained in the survey response forms which were filled out and returned to us over the last few months. Responsibility for the accuracy and completeness of each survey form lies entirely with the respondents. The directory is composed of five parts: (1) Participant Survey Response: contains the survey response forms as submitted to us, listed alphabetically by responding organization; (2) Activity Index: lists individual respondents alphabetically, showing the daylighting activities each has checked. Allows the reader to quickly identify the individuals working in a specific area. Once an individual is identified, turn to the Individual Index to find the page numbers where that individual may be located in other areas of the directory; (3) Individual Index: lists individual respondents alphabetically; (4) Daylighting publications: lists the publications by each respondent (authors listed alphabetically); and (5) Notes of Interest: contains a variety of information on meetings, conferences, new projects and publications, etc. This material was collected from a variety of sources in addition to the survey respondents.

Not Available

1980-06-01T23:59:59.000Z

134

Traversable wormholes supported by cosmic accelerated expanding equations of state  

E-Print Network (OSTI)

We explore the possibility that traversable wormholes be supported by specific equations of state responsible for the present accelerated expansion of the Universe, namely, phantom energy, the generalized Chaplygin gas, and the van der Waals quintessence equation of state.

Francisco S. N. Lobo

2006-11-29T23:59:59.000Z

135

An Integrated Traverse Planner and Analysis Tool for Planetary Exploration  

E-Print Network (OSTI)

Future planetary explorations will require surface traverses of unprecedented frequency, length, and duration. As a result, there is need for exploration support tools to maximize productivity, scientific return, and safety. ...

Johnson, Aaron William

136

T-574: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

137

Apparatus and method for detecting flaws in conductive material  

Science Conference Proceedings (OSTI)

The present invention is an improved sensing unit for detecting flaws in conductive material wherein the sensing coil is positioned away from a datum of either the datum point, the datum orientation, or a combination thereof. Position of the sensing coil away from a datum increases sensitivity for detecting flaws having a characteristic volume less than about 1 mm{sup 3}, and further permits detection of subsurface flaws. Use of multiple sensing coils permits quantification of flaw area or volume.

Hockey, R.L.; Riechers, D.M.

1999-11-16T23:59:59.000Z

138

Apparatus and method for detecting flaws in conductive material  

DOE Patents (OSTI)

The present invention is an improved sensing unit for detecting flaws in conductive material wherein the sensing coil is positioned away from a datum of either the datum point, the datum orientation, or a combination thereof. Position of the sensing coil away from a datum increases sensitivity for detecting flaws having a characteristic volume less than about 1 mm.sup.3, and further permits detection of subsurface flaws. Use of multiple sensing coils permits quantification of flaw area or volume.

Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

1999-01-01T23:59:59.000Z

139

Directory of Energy Information Administration models 1996  

SciTech Connect

This directory revises and updates the Directory of Energy Information Administration Models 1995, DOE/EIA-0293(95), Energy Information Administration (EIA), U.S. Department of Energy, July 1995. Four models have been deleted in this directory as they are no longer being used: (1) Market Penetration Model for Ground-Water Heat Pump Systems (MPGWHP); (2) Market Penetration Model for Residential Rooftop PV Systems (MPRESPV-PC); (3) Market Penetration Model for Active and Passive Solar Technologies (MPSOLARPC); and (4) Revenue Requirements Modeling System (RRMS).

NONE

1996-07-01T23:59:59.000Z

140

Georgia Biofuel Directory A directory of Georgia industries that use biofuels.  

E-Print Network (OSTI)

Georgia Biofuel Directory · A directory of Georgia industries that use biofuels. · Completed in May _________________________________________________________________ 3 Biofuels_____________________________________________________________________ 4 Biofuel Use in Georgia that Burn Self-Generated Biofuels as of May 2003__ 4 Chart 1.0 Biofuel Use from Contacted

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Building Energy Tools Software Directory | Open Energy Information  

Open Energy Info (EERE)

Building Energy Tools Software Directory Building Energy Tools Software Directory Jump to: navigation, search Tool Summary Name: Building Energy Tools Software Directory Agency/Company /Organization: United States Department of Energy Sector: Energy Focus Area: Energy Efficiency, Buildings Phase: Create a Vision, Determine Baseline, Develop Goals Topics: Technology characterizations Resource Type: Dataset, Software/modeling tools User Interface: Website Website: apps1.eere.energy.gov/buildings/tools_directory/ References: http://apps1.eere.energy.gov/buildings/tools_directory/ Logo: Building Energy Tools Software Directory This directory provides information on 388 building software tools for evaluating energy efficiency, renewable energy, and sustainability in buildings. The energy tools listed in this directory include databases,

142

Building an X.500 Directory Service in the US  

Science Conference Proceedings (OSTI)

This document provides definition and recommends considerations that must be undertaken to operate a X.500 Directory Service in the United States. This project is the work performed for the Integrated Directory Services Working Group within the Internet ...

B. Jennings

1996-05-01T23:59:59.000Z

143

Energy Information Directory of the Energy Information Administration  

U.S. Energy Information Administration (EIA)

Page of Energy Information Directory provided by the Energy ... Home > Publications & Reports > Energy ... Hydroelectric industry; Hydrogen Technology;

144

Energy Information Directory of the Energy Information Administration  

U.S. Energy Information Administration (EIA)

Page of Energy Information Directory provided by the Energy Information Administration, other DOE Offices, ... Federal Energy Management Program;

145

Energy Information Directory of the Energy Information Administration  

U.S. Energy Information Administration (EIA)

Page of Energy Information Directory provided by the Energy Information Administration, ... Civilian Radioactive Waste Management; Clean Air Markets Division;

146

Energy Information Directory of the Energy Information Administration  

U.S. Energy Information Administration (EIA)

Publications & Reports > Energy Information Directory: Subject Index. K-M. Labor Department; Land drilling contractors; Lighting (#1, #2)

147

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

148

Procedure for flaw detection in cast stainless steel  

DOE Patents (OSTI)

This paper describes a method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic means independent of the component thickness at the site. Then, choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined is discussed. The detection of flaws by means of the chosen technique is then detailed.

Kupperman, D.S.

1986-08-29T23:59:59.000Z

149

Directory  

Science Conference Proceedings (OSTI)

... DEPARTMENT OF ENERGY (DOE) ... Improve efficiency in buying and selling produce based on ... and enhance the orderly and efficient marketing of ...

2011-07-22T23:59:59.000Z

150

City of Traverse City, Michigan (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Traverse City Traverse City Place Michigan Utility Id 19125 Utility Location Yes Ownership M NERC Location RFC NERC RFC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png General Secondary Service (Large Business Rate) Commercial General Secondary Service (Small Business Rate) Commercial Primary Service-High Load Factor Commercial Commercial Primary Service-High Load Factor Industrial Industrial Residential Rates Residential Residential Senior Citizen Rate Residential

151

Dynamic Pointer Allocation for Scalable Cache Coherence Directories  

E-Print Network (OSTI)

one of the primary challenges in building shared memory multiprocessors with hundreds or thousands of processors. While directory-based coherency schemes are promising because they rely on point-to-point messages rather than a network broadcast mechanism, traditional directory organizations would use a prohibitive amount of memory in a large-scale machine. In this paper we introduce a dynamic pointer allocation directory that exploits reference behavior characteristics of large-scale parallel programs to reduce directory storage requirements to manageable levels while maintaining performance comparable to traditional directory organizations.

Richard Simoni; Mark Horowitz

1991-01-01T23:59:59.000Z

152

Footprint traversal by ATP-dependent chromatin remodeler motor  

E-Print Network (OSTI)

ATP-dependent chromatin remodeling enzymes (CRE) are bio-molecular motors in eukaryotic cells. These are driven by a chemical fuel, namely, adenosine triphosphate (ATP). CREs actively participate in many cellular processes that require accessibility of specific segments of DNA which are packaged as chromatin. The basic unit of chromatin is a nucleosome where 146 bp $\\sim$ 50 nm of a double stranded DNA (dsDNA) is wrapped around a spool formed by histone proteins. The helical path of histone-DNA contact on a nucleosome is also called "footprint". We investigate the mechanism of footprint traversal by a CRE that translocates along the dsDNA. Our two-state model of a CRE captures effectively two distinct chemical (or conformational) states in the mechano-chemical cycle of each ATP-dependent CRE. We calculate the mean time of traversal. Our predictions on the ATP-dependence of the mean traversal time can be tested by carrying out {\\it in-vitro} experiments on mono-nucleosomes.

Ashok Garai; Jesrael Mani; Debashish Chowdhury

2011-07-07T23:59:59.000Z

153

Grand Traverse Band Renewable Energy Feasibility Study in Wind, Biomass and Solar  

DOE Green Energy (OSTI)

Renewable Energy Feasibility Study for wind, biomass, solar on the Grand Traverse Band tribal lands from 2005 - 2008

Suzanne McSawby, Project Director

2008-12-31T23:59:59.000Z

154

Detection of Subsurface Flaws in Metals with GMR Sensors  

Science Conference Proceedings (OSTI)

Cracks and flaws in multilayered nonferrous metal structure may be quantified by using Giant Magnetoresistive (GMR) sensor based eddy current technique. This noncontact method includes a lift-off distance as great as 3 mm. Aluminum and titanium alloy plates greater than 3 mm thick are successfully inspected. Hidden flaws in second plate down are clearly detected.

Na, J.K.; Franklin, M.A. [Advanced Nondestructive Inspection, General Dynamics, 2700 Indian Ripple Road, Dayton, Ohio 45440 (United States)

2005-04-09T23:59:59.000Z

155

Integrating multiple internet directories by instance-based learning  

E-Print Network (OSTI)

Finding desired information on the Internet is becoming increasingly difficult. Internet directories such as Yahoo!, which organize web pages into hierarchical categories, provide one solution to this problem; however, such directories are of limited use because some bias is applied both in the collection and categorization of pages. We propose a method for integrating multiple Internet directories by instance-based learning. Our method provides the mapping of categories in order to transfer documents from one directory to another, instead of simply merging two directories into one. We present herein an effective algorithm for determining similar categories between two directories via a statistical method called the k-statistic. In order to evaluate the proposed method, we conducted experiments using two actual Internet directories, Yahoo! and Google. The results show that the proposed method achieves extensive improvements relative to both the Naive Bayes and Enhanced Naive Bayes approaches, without any text analysis on documents. 1

Ryutaro Ichise; Hiedeaki Takeda; Shinichi Honiden

2003-01-01T23:59:59.000Z

156

A New Scalable Directory Architecture for Large-Scale Multiprocessors  

E-Print Network (OSTI)

The memory overhead introduced by directories constitutes a major hurdle in the scalability of cc-NUMA architectures, which makes the shared-memory paradigm unfeasible for very large-scale systems. This work is focused on improving the scalability of shared-memory multiprocessors by significantly reducing the size of the directory. We propose multilayer clustering as an effective approach to reduce the directory-entry width. Detailed evaluation for 64 processors shows that using this approach we can drastically reduce the memory overhead, while suffering a performance degradation very similar to previous compressed schemes (such as Coarse Vector). In addition, a novel two-level directory architecture is proposed in order to eliminate the penalty caused by these compressed directories. This organization consists of a small Full-Map firstlevel directory (which provides precise information for the most recently referenced lines) and a compressed secondlevel directory (which provides in-ex...

Manuel E. Acacio; José González; José M. García; José Duato

2001-01-01T23:59:59.000Z

157

Global Change Master Directory | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Change Master Directory Global Change Master Directory Energy Data Apps Maps Challenges Resources Blogs Let's Talk Energy Beta You are here Data.gov » Communities » Energy » Data Global Change Master Directory Dataset Summary Description The GCMD database holds more than 30,000 descriptions of Earth science data sets and services covering all aspects of Earth and environmental sciences. Tags {Agriculture,atmosphere,biosphere,bilogy,climate,cryosphere,"land surface",oceans,paleoclimate,"solid Earth",Sun,"terrestrial hydrosphere",NASA,GSFC,"Goddard Space Flight Center"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 01-Jan-2010 Publisher National Aeronautics and Space Administration

158

National Solar Energy Education Directory. First edition  

DOE Green Energy (OSTI)

The directory lists institutions alphabetically by institution type within a state. A complete alphabetical index of institutions is found in the back of the Directory along with a cross reference to program and curriculum titles. Within each institution, programs and curricula offered, if any, are listed following the institution name, ID number (found in parentheses to the right of the institution name), address and phone number. All solar-related courses are then listed alphabetically by course title. If a course is offered within a program or curriculum, the program or curriculum name with which it is associated is printed. The Directory contains entries for nearly 700 post-secondary education institutions in the 50 states, the District of Columbia, Guam, and Puerto Rico.

O'Connor, K; Corcoleotes, G; Silversmith, J A; Kramer, K A

1979-01-01T23:59:59.000Z

159

Conservation and renewable energy resource directory  

DOE Green Energy (OSTI)

The Directory facilitates quick access to DOE offices responsible for conservation and renewable energy activities. Because several offices in DOE may have responsibility for various phases of a technology or service (i.e., research, development, demonstration, commercialization, information, education, etc.) the Directory lists the key contacts from the various phases by category. The Directory is organized in five main categories plus an index and relevant appendices. The categories are: revewable energy technologies (thermal and electric solar, wind energy systems, small scale hydroelectric, biomass, ocean systems); complementary technologies (appropriate technology, advanced engine design, cogeneration, energy storage, total energy systems); conservation technologies (buildings and community systems, transportation, industrial and agricultural energy conservation, state and local programs); environment; and support services (information, outreach, education, small business support, basic research, data and analysis, publication, films, Solar Energy Research Institute, regional offices laboratories, and information centers).

Not Available

1979-01-01T23:59:59.000Z

160

Directory of Energy Information Administration Models 1993  

SciTech Connect

This directory contains descriptions about each model, including the title, acronym, purpose, followed by more detailed information on characteristics, uses, and requirements. Sources for additional information are identified. Included in this directory are 35 EIA models active as of May 1, 1993. Models that run on personal computers are identified by ``PC`` as part of the acronym. EIA is developing new models, a National Energy Modeling System (NEMS), and is making changes to existing models to include new technologies, environmental issues, conservation, and renewables, as well as extend forecast horizon. Other parts of the Department are involved in this modeling effort. A fully operational model is planned which will integrate completed segments of NEMS for its first official application--preparation of EIA`s Annual Energy Outlook 1994. Abstracts for the new models will be included in next year`s version of this directory.

Not Available

1993-07-06T23:59:59.000Z

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

National solar energy education directory. Second edition  

DOE Green Energy (OSTI)

The information contained in this directory is derived from responses to a national survey of educational institutions and organizations involved in solar energy educational activities beyond the secondary school level. Phone calls and follow-up mail requests were used to gather additional information when necessary. Every survey instrument was read, coded, and edited before entry into the data base from which this directory was produced. The Directory is organized alphabetically by state. Institutions and organizations within each state are categorized according to type (Colleges and Universities, Junior/Community Colleges, Vocational/Technical Schools, and Other Educational Institutions and Organizations) and listed alphabetically within these categories. Within each institutional listing the amount of information provided will vary according to the completeness of the survey response received from that institution. (MHR)

Corcoleotes, G; Cronin, S; Kramer, K; O'Connor, K

1980-01-01T23:59:59.000Z

162

The Design for Warp Knitting Machine Traversing Control System Based on DSP  

Science Conference Proceedings (OSTI)

On the basis of in-depth study of warp knitting machine traversing control system, this paper designs a warp knitting machine traversing electronic control system based on digital signal processor (DSP). This system takes a three-phase permanent magnet ... Keywords: warp knitting machine, traversing motion, linear motor, DSP

De-Jun Li; Le-Ping Xu

2009-12-01T23:59:59.000Z

163

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

164

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

165

Indigenous People Professionals Directory/Directorio de Profesionales Indígenas de Latino América  

E-Print Network (OSTI)

are printed as directories of organizations, bulletins, andDirectory is constituted by indigenous people's organizationsorganizations and institutions will provide us with feed back on the accuracy of the Directory

Varese, Stefano; Gonzalez, Tirso

1998-01-01T23:59:59.000Z

166

Resource directory of DOE information organizations  

SciTech Connect

This Directory is the 1987 update of DOE/TIC-4616. It is a guide to information components of the Department of Energy (DOE) and is arranged by organization. When applicable, individual offices are listed hierarchically. Organization and personal name indexes are included.

Jared, M. (ed.)

1987-01-01T23:59:59.000Z

167

EIA Publications Directory, 1977--1989  

SciTech Connect

Enacted in 1977, the Department of Energy (DOE) Organization Act established the Energy Information Administration (EIA) as the Department's independent statistical and analytical agency, with a mandate to collect and publish data and prepare analyses on energy production, consumption, prices, and resources, and projections of energy supply and demand. This cumulative edition of the EIA Publications Directory (formerly entitled EIA Publications Directory: A User's Guide) contains titles and abstracts of periodicals and one-time reports produced by the EIA from October 1977 through December 1989. It supersedes all previous issues of the Directory. EIA publications have undergone a great many changes over the last decade. The EIA inherited periodicals from the Bureau of Mines, Federal Power Commission, and the Federal Energy Administration. Some of these periodicals have been retitled, consolidated, or discontinued. These changes are noted in the abstracts. The body of the Directory contains citations and abstracts arranged by broad subject categories, such as coal, petroleum, and natural gas and subcategories such as reserves, products and byproducts, and marketing and economics. All reports are indexed alphabetically by subject and title and numerically by report number. EIA appreciates the assistance of DOE's Office of Scientific and Technical Information in sharing portions of the Energy Data Base.

Not Available

1990-06-01T23:59:59.000Z

168

International photovoltaic products and manufacturers directory, 1995  

DOE Green Energy (OSTI)

This international directory of more than 500 photovoltaic-related manufacturers is intended to guide potential users of photovoltaics to sources for systems and their components. Two indexes help the user to locate firms and materials. A glossary describes equipment and terminology commonly used in the photovoltaic industry.

Shepperd, L.W. [ed.] [Florida Solar Energy Center, Cocoa, FL (United States)] [ed.; Florida Solar Energy Center, Cocoa, FL (United States)

1995-11-01T23:59:59.000Z

169

Directory of Energy Information Administration models, 1990  

Science Conference Proceedings (OSTI)

This directory revises and updates the Directory of Energy Information Administration Models, DOE/EIA-0293(89), Energy Information Administration (EIA), US Department of Energy, May 1989. The major changes are the inclusion of the Building Energy End-Use Model (BEEM-PC), Residential Energy End-Use Model (REEM-PC), the Refinery Yield Model Spreadsheet System (RYMSS-PC), and the Capital Stock Model (CAPSTOCK-PC). Also, the following models have been inactivated: Energy Disaggregated Input-Output Model (EDIO), Household Model of Energy (HOME3-PC), Commercial Sector Energy Model (CSEM-PC), Outer Continental Shelf Oil and Gas Supply Model (OCSM), and the Stock Module of the Intermediate Future Forecasting System (STOCK). This directory contains descriptions about each basic and auxiliary model, including the title, acronym, purpose, and type, followed by more detailed information on characteristics, uses, and requirements. For developing models, limited information is provided. Sources for additional information are identified. Included in this directory are 38 EIA models active as of March 1, 1990, as well as the PC-AEO Forecasting Model Overview and the three Subsystems for the Short-Term Integrated Forecasting System (STIFS) Model. Models that run on personal computers are identified by PC'' as part of the acronym.

Not Available

1990-06-04T23:59:59.000Z

170

Directory of Potential Stakeholders for DOE Actions under NEPA | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Directory of Potential Stakeholders for DOE Actions under NEPA Directory of Potential Stakeholders for DOE Actions under NEPA Directory of Potential Stakeholders for DOE Actions under NEPA DOE Offices are encouraged to be inclusive in providing potentially interested parties with opportunities to review NEPA documents. This Directory of Potential Stakeholders for DOE Actions under NEPA is primarily intended to supplement lists that Departmental Offices compile for individual projects or facilities. It complements the EIS Distribution Guidance. The Office of NEPA Policy and Compliance updates this Directory annually in July and may issue revisions throughout the year as new information becomes available. NEPAStakeholdersDirectory_10_29_13.pdf More Documents & Publications Diversity Employment and Recruitment Sources

171

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

172

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

173

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service V-065: Adobe Flash Player Buffer Overflow...

174

V-139: Cisco Network Admission Control Input Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common Services Home...

175

Directory ofState and Local Government Laboratory ...  

Science Conference Proceedings (OSTI)

Page 1. PB2003-103342 IIImlllllllllllllllllllllllllill NIST Special Publication 815, 2003 Edition Directory ofState and Local Government Laboratory ...

2011-07-22T23:59:59.000Z

176

Building Energy Software Tools Directory: Construction R-value...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory...

177

Alliance Donates Health IT Standards Directory to NIST  

Science Conference Proceedings (OSTI)

... The alliance's directory contains more than 2,100 listings for health IT standards and links and information for the 430 organizations that created ...

2011-05-25T23:59:59.000Z

178

A comparative study of six French-language Web directories  

E-Print Network (OSTI)

Abstract: This paper presents a comparative study of six French-language Web directories (MSN, Nomade, Open Directory, Voila, Voila Pages Perso and Yahoo). The study focuses on the quantitative and qualitative aspects of the organization of these directories, and on the way in which they describe sites. It reveals a wide variety of structures, content and organizational principles. In this respect, Web directories do not correspond to classic theories of classification. They highlight the difficulty of proposing a structured representation of the heterogeneous content of the Web. 1.

Houssem Assadi; Thomas Beauvisage

2002-01-01T23:59:59.000Z

179

A New Scalable Directory Architecture for Large-Scale Multiprocessors  

E-Print Network (OSTI)

The memory overhead introduced by directories constitutes a major hurdle in the scalability of cc-NUMA architectures, which makes the shared-memory paradigm unfeasible for very large-scale systems. This work is focused on improving the scalability of shared-memory multiprocessors by significantly reducing the size of the directory. We propose multilayer clustering as an effective approach to reduce the directory-entry width. Detailed evaluation for 64 processors shows that using this approach we can drastically reduce the memory overhead, while suffering a performance degradation very similar to previous compressed schemes (such as Coarse Vector). In addition, a novel two-level directory architecture is proposed in order to eliminate the penalty caused by these compressed directories. This organization consists of a small Full-Map firstlevel directory (which provides precise information for the most recently referenced lines) and a compressed secondlevel directory (which provides in-excess information). Results show that a system with this directory architecture can achieve the same performance as a multiprocessor with a big and non-scalable Full-Map directory, with a very significant reduction of the memory overhead.

Manuel Acacio Jos; José González; José M. García

2001-01-01T23:59:59.000Z

180

Directory of energy efficiency programs leveraging ENERGY STAR...  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory of energy efficiency programs leveraging ENERGY STAR Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings...

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

DIRECTORY OF ENERGY EFFICIENCY PROGRAMS LEVERAGING ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

DIRECTORY OF ENERGY EFFICIENCY PROGRAMS LEVERAGING ENERGY STAR (UPDATED JANUARY 20, 2012) Utilities and state program sponsors across the country are incorporating benchmarking...

182

Directory of Operable Petroleum Refineries on Tables 38 and 39  

U.S. Energy Information Administration (EIA)

Directory of Operable Petroleum Refineries on Tables 38 and 39 Refiner State(s)aRefiner State(s)a.....Age Refining Inc ...

183

Building Energy Software Tools Directory: Tools by Platform ...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory...

184

Building Energy Software Tools Directory: Tools by Subject -...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Building Energy Software Tools Directory...

185

Directory of US Private Sector Product Certification Programs  

Science Conference Proceedings (OSTI)

Page 1. i NIST Special Publication 903, 2001 Edition Directory of US Private Sector Product Certification Programs Charles W. Hyer, Editor ...

2010-04-28T23:59:59.000Z

186

Energy Information Directory of the Energy Information Administration  

U.S. Energy Information Administration (EIA)

Page of Energy Information Directory provided by the Energy Information Administration, other DOE Offices, other Federal and State agencies, Energy Ministries of ...

187

Directory of energy information administration models 1995  

Science Conference Proceedings (OSTI)

This updated directory has been published annually; after this issue, it will be published only biennially. The Disruption Impact Simulator Model in use by EIA is included. Model descriptions have been updated according to revised documentation approved during the past year. This directory contains descriptions about each model, including title, acronym, purpose, followed by more detailed information on characteristics, uses, and requirements. Sources for additional information are identified. Included are 37 EIA models active as of February 1, 1995. The first group is the National Energy Modeling System (NEMS) models. The second group is all other EIA models that are not part of NEMS. Appendix A identifies major EIA modeling systems and the models within these systems. Appendix B is a summary of the `Annual Energy Outlook` Forecasting System.

NONE

1995-07-13T23:59:59.000Z

188

Directory of Small Business Program Managers (SBPMs)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

smallbusiness.energy.gov smallbusiness.energy.gov Office of Small and Disadvantaged Business Utilization (OSDBU) U.S. Department of Energy Office of Small and Disadvantaged Business Utilization 1000 Independence Ave., SW Washington, DC 20585 DIRECTORY OF SMALL BUSINESS PROGRAM MANAGERS (SBPMs) Section I CONTENTS Headquarters Program Elements/Offices ....................................................... Section I Contracting Activities/Offices ........................................................................ Section II Facility Management Contractors (FMCs) .................................................... Section III

189

Building Directories from DNS: Experiences from WWWSeeker  

E-Print Network (OSTI)

This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. There has been much discussion and several documents written about the need for an Internet Directory. Recently, this discussion has focused on ways to discover an organization’s domain name without relying on use of DNS as a directory service. This memo discusses lessons that were learned during InterNIC Directory and Database Services ’ development and operation of WWWSeeker, an application that finds a web site given information about the name and location of an organization. The back end database that drives this application was built from information obtained from domain registries via WHOIS and other protocols. We present this information to help future implementors avoid some of the blind alleys that we have already explored. This work builds on the Netfind system that was created by Mike Schwartz and his team at the University of Colorado at Boulder [1].

R. Moats; R. Huber

1999-01-01T23:59:59.000Z

190

Directory of certificates of compliance for radioactive materials packages. Revision 16, Volume 3  

SciTech Connect

This directory provides information on packagings approved by the U.S. Nuclear Regulatory Commission.

NONE

1996-10-01T23:59:59.000Z

191

A personal naming and directory service for mobile internet users  

Science Conference Proceedings (OSTI)

This paper proposes a new approach for the role of smartcards into distributed and mobile service environments. It is based on the naming and directory service architecture. We present a naming and directory service architecture which is based on a new ...

Alain Macaire; David Carlier

1999-05-01T23:59:59.000Z

192

V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: IBM Tivoli Federated Identity Manager Signature Verification 3: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes January 21, 2013 - 12:15am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes PLATFORM: Tivoli Federated Identity Manager versions 6.2.0, 6.2.1, 6.2.2 ABSTRACT: A vulnerability was reported in IBM Tivoli Federated Identity Manager. REFERENCE LINKS: IBM Security Bulletin: 1615744 SecurityTracker Alert ID: 1028011 CVE-2012-6359 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not check that all attributes have been signed. A remote user with the ability to conduct a man-in-the-middle attack can modify

193

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

194

Photovoltaic Product Directory and Buyers Guide  

DOE Green Energy (OSTI)

The directory guide explains photovoltaic systems briefly and shows what products are available off-the-shelf. Information is given to assist in designing a photovoltaic system and on financial incentives. Help is given for determining if photovoltaic products can meet a particular buyer's needs, and information is provided on actual photovoltaic user's experiences. Detailed information is appended on various financial incentives available from state and federal governments, sources of additional information on photovoltaics, sources of various photovoltaic products, and a listing of addresses of photovoltaic products suppliers. (LEW)

Watts, R.L.; Smith, S.A.; Dirks, J.A.; Mazzucchi, R.P.; Lee, V.E.

1984-04-01T23:59:59.000Z

195

Hanford Site radioactive hazardous materials packaging directory  

SciTech Connect

The Hanford Site Radioactive Hazardous Materials Packaging Directory (RHMPD) provides information concerning packagings owned or routinely leased by Westinghouse Hanford Company (WHC) for offsite shipments or onsite transfers of hazardous materials. Specific information is provided for selected packagings including the following: general description; approval documents/specifications (Certificates of Compliance and Safety Analysis Reports for Packaging); technical information (drawing numbers and dimensions); approved contents; areas of operation; and general information. Packaging Operations & Development (PO&D) maintains the RHMPD and may be contacted for additional information or assistance in obtaining referenced documentation or assistance concerning packaging selection, availability, and usage.

McCarthy, T.L.

1995-12-01T23:59:59.000Z

196

Environmental impact directory system: preliminary implementation for geothermal energy  

DOE Green Energy (OSTI)

An Environmental Impact Directory System (EIDS) was proposed as a method for a computerized search of the widely distributed data files and models pertaining to energy-related environmental effects. To define the scope and content of the system, an example was prepared for the case of geothermal energy. The resulting sub-directory is known as GEIDs (Geothermal Environmental Impact Directory System). In preparing or reviewing an Environmental Impact Statement (EIS), the user may employ GEIDS as an extensive checklist to make sure he has taken into account all predictable impacts at any level of severity.

Hess, F.D.; Hall, R.T.; Fullenwider, E.D.

1976-07-01T23:59:59.000Z

197

Environment, Environmental Restoration, and Waste Management Field Organization Directory  

SciTech Connect

This directory was developed by the Office of Environmental Guidance, RCRA/CERCLA Division (EH-231) from an outgrowth of the Departments efforts to identify and establish the regulatory response lead persons in the Field Organizations. The directory was developed for intemal EH-231 use to identify both the DOE and DOE contractor Field Organizations in the Environment, Environmental Restoration and Waste Management areas. The Field Organization directory is divided into three substantive sections: (1) Environment; (2) Environmental Restoration; and (3) Waste Management which are organized to correspond to the management hierarchy at each Field Organization. The information provided includes the facility name and address, individual managers name, and telephone/fax numbers.

Not Available

1993-07-01T23:59:59.000Z

198

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

199

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

200

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

202

U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service October 1, 2012 -...

203

V-075: EMC AlphaStor Command Injection and Format String Flaws...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

204

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

205

U-270:Trend Micro Control Manager Input Validation Flaw in Ad...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc...

206

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

207

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

208

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

209

Directory of RivDIS data  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory of RivDIS data Directory of RivDIS data The data consists of tabular data files, html summary tables, and gif images. The images summarize all existing data except for Discharge vs Year, which shows only 1960 - 1990. This index is organized by Country, River, and Station. Clicking on a letter link scrolls you to a country beginning with that letter. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The most recent update at 10:57:50 on 12/29/1999 included 1018 stations out of the total 1018 stations. See also the README file and the RivDIS Online Home Page for further information. Albania A B C D E F G H I J K L M N O P Q R S T U V W X Y Z (Devolli River) Kokel: Data Summary and Plots (Drini River) Kalimash: Data Summary and Plots (Drini i Zi River) Ura e Dodes: Data

210

Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds  

Science Conference Proceedings (OSTI)

The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

GJ Schuster, FA Simonen, SR Doctor

2008-04-01T23:59:59.000Z

211

Northwest Territories and Nunavut Snow Characteristics from a Subarctic Traverse: Implications for Passive Microwave Remote Sensing  

Science Conference Proceedings (OSTI)

During April 2007, a coordinated series of snow measurements was made across the Northwest Territories and Nunavut, Canada, during a snowmobile traverse from Fairbanks, Alaska, to Baker Lake, Nunavut. The purpose of the measurements was to ...

Chris Derksen; Arvids Silis; Matthew Sturm; Jon Holmgren; Glen E. Liston; Henry Huntington; Daniel Solie

2009-04-01T23:59:59.000Z

212

An integrated traverse planner and analysis tool for future lunar surface exploration  

E-Print Network (OSTI)

This thesis discusses the Surface Exploration Traverse Analysis and Navigation Tool (SEXTANT), a system designed to help maximize productivity, scientific return, and safety on future lunar and planetary explorations,. The ...

Johnson, Aaron William

2010-01-01T23:59:59.000Z

213

Online National Solar Energy Directory and 2005 Solar Decathlon Product Directory  

SciTech Connect

The Solar Electric Power Association (SEPA), in partnership with the American Solar Energy Society, developed an online National Solar Energy Directory with clear, comprehensive information on suppliers and purchasing options. The site was originally located at FindSolar.com, but has recently been moved to Find-Solar.org. The original FindSolar.com domain name has been taken by the American Solar Energy Society (a partner in this project) and utilized for a similar but different project. This Find-Solar.org directory offers the rapidly growing base of potential solar customers a simple, straightforward destination to learn about their solar options. Members of the public are able to easily locate contractors in their geographic area and verify companiesâ?? qualifications with accurate third-party information. It allows consumers to obtain key information on the economics, incentives, desirability, and workings of a solar energy system, as well as competing quotes from different contractors and reviews from customers they have worked with previously. Find-Solar.org is a means of facilitating the growing public interest in solar power and overcoming a major barrier to widespread development of U.S. solar markets. In addition to the development of Find-Solar.org, SEPA developed a separate online product directory for the 2005 DOE Solar Decathlon to facilitate the communication of information about the energy efficiency and renewable energy products used in each university teamâ??s home.

Julia Hamm; Mike Taylor; America Solar Energy Society

2005-07-01T23:59:59.000Z

214

NON-DESTRUCTIVE METHOD AND MEANS FOR FLAW DETECTION  

DOE Patents (OSTI)

BS>An improved method is presented for the nondestructive detection of flaws in olectrictilly conductivc articles using magnetic field. According to thc method a homogoneous mignetic field is established in the test article;it right angle" to the artyicle. A probe is aligned with its axis transverse to the translates so hat th4 probe scans the surface of the test article while the axis of the robe is transverse to the direction of translation of the article. In this manner any output current obtained in thc probe is an indication of the size and location of a flaw in the article under test, with a miiiimum of signal pick- up in the probe from the established magnetic field.

Hochschild, R.

1959-03-10T23:59:59.000Z

215

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2011 14, 2011 T-717: Microsoft Security Bulletin Summary for September 2011 Microsoft Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 13, 2011 T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. September 12, 2011 T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 8, 2011

216

Evaluation of similarity measures for knowledge profiles from an expert directory: a field study  

Science Conference Proceedings (OSTI)

Expert directories describe the knowledge of the staff. From field data of an implementation of such an expert directory we calculated weighted connections between employees based on their shared topics. These relations will be used for recommending ... Keywords: expert directories, expert recommender, expert recommender systems, knowledge management, knowledge profile similarity

Wilko Kraß; Ulrich Försterling

2012-09-01T23:59:59.000Z

217

Directory of certificiates of compliance for radioactive materials packages: Report of NRC approved packages. Revision 19, Volume 1  

SciTech Connect

This directory provides information on packagings approved by the U.S. Nuclear Regulatory Commission.

NONE

1996-10-01T23:59:59.000Z

218

Alteration Patterns In Volcanic Rocks Within An East-West Traverse Through  

Open Energy Info (EERE)

Patterns In Volcanic Rocks Within An East-West Traverse Through Patterns In Volcanic Rocks Within An East-West Traverse Through Central Nicaragua Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Alteration Patterns In Volcanic Rocks Within An East-West Traverse Through Central Nicaragua Details Activities (0) Areas (0) Regions (0) Abstract: The volcanic rocks investigated in a cross-section between the Pacific and Atlantic coasts of Nicaragua - with the exception of Recent and some Pleistocene lavas - are incipiently to strongly altered. Alteration patterns on different scales can be discerned in the Tertiary sequences: (i) a regional burial diagenesis or very low-grade burial metamorphism at the low-temperature end of the zeolite facies (mordenite subfacies) with an inferred thermal gradient of < 50°C/km, grading into (ii) a geothermal

219

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

220

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

222

Acoustic emission: flaw relationship for inservice monitoring of nuclear reactor pressure boundaries. [PWR; BWR  

Science Conference Proceedings (OSTI)

The objective of the acoustic emission (AE)/flaw characterization program is to provide an experimental feasibility evaluation of using the AE method on a continuous basis (during operation and during hydrotest) to detect and analyze flaw growth in reactor pressure vessels and primary piping. This effort is based on the philosophy that AE shows demonstrated capability for being a valuable addition to current nondestructive inspection (NDI) methods with unique capability for continuous monitoring, high sensitivity and remote flaw location.

Not Available

1981-10-01T23:59:59.000Z

223

OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY OFFICE OF NEPA POLICY AND COMPLIANCE - STAFF DIRECTORY Carol Borgstrom, Director 202-586-4600 Carol.Borgstrom@hq.doe.gov Lettie Wormley, Secretary 202-586-4610 Lettie.Wormley@hq.doe.gov Eastern Energy and Waste Management Unit Contact Program/Responsibility Special Projects or Topics Brian Costner Brian.Costner@hq.doe.gov 202-586-9924 Unit Leader Yardena Mansoor Yardena.Mansoor@hq.doe.gov 202-586-9326 Office of Environmental Management * Oak Ridge Office * Savannah River Operations Office Office of Fossil Energy * Strategic Reserves * Liquefied Natural Gas (LNG) Office of Electricity Delivery and Energy Reliability * Champlain Hudson Power Express Western Area Power Administration Bonneville Power Administration

224

Directory of certificates of compliance for radioactive materials packages  

SciTech Connect

The purpose of this directory is to make available a convenient source of information on packagings approved by the U.S. Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. An alphabetical listing by user name is included in the back of Volume 3 for approved Quality Assurance programs. The reports include a listing of all users of each package design and approved Quality Assurance programs prior to the publication date of the directory. Comments to make future revisions of this directory more useful are invited and should be directed to the Spent Fuel Project Office, U.S. Nuclear Regulatory Commission.

NONE

1997-10-01T23:59:59.000Z

225

Tunneling and traversal of ultracold three-level atoms through vacuum-induced potentials  

SciTech Connect

The passage of ultracold three-level atoms through the potential induced by the vacuum cavity mode is discussed using cascade atomic configuration. We study the tunneling or traversal time of the ultracold atoms via a bimodal high-Q cavity. It is found that the phase time, which may be considered as a measure for the time required to traverse the cavity, exhibits superclassical and subclassical behaviors. Further, the dark states and interference effects in cascade atomic configuration may influence the passage time of the atom through the cavity.

Badshah, Fazal; Irfan, Muhammad; Qamar, Shahid [Department of Physics and Applied Mathematics, Pakistan Institute of Engineering and Applied Sciences, Nilore, Islamabad 45650 (Pakistan); Qamar, Sajid [Department of Physics, COMSATS Institute of Information Technology, Islamabad (Pakistan)

2011-09-15T23:59:59.000Z

226

U-193: NetBSD System Call Return Value Validation Flaw Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Centers Field Sites Power Marketing Administration Other Agencies You are here Home U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain...

227

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Manager Database Authentication Bypass Vulnerability V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

228

Alpha-helical Protein Networks Are Self-protective and Flaw-tolerant  

Science Conference Proceedings (OSTI)

Presentation Title, Alpha-helical Protein Networks Are Self-protective and Flaw- ... Bulk Metallic Glass Composites: A New High-Performance Structural Material.

229

A Two-Level Directory Architecture for Highly Scalable cc-NUMA Multiprocessors  

E-Print Network (OSTI)

Abstract—One important issue the designer of a scalable shared-memory multiprocessor must deal with is the amount of extra memory required to store the directory information. It is desirable that the directory memory overhead be kept as low as possible, and that it scales very slowly with the size of the machine. Unfortunately, current directory architectures provide scalability at the expense of performance. This work presents a scalable directory architecture that significantly reduces the size of the directory for large-scale configurations of a multiprocessor without degrading performance. First, we propose multilayer clustering as an effective approach to reduce the width of directory entries. Based on this concept, we derive three new compressed sharing codes, some of them with a space complexity of Oðlog2ðlog2ðNÞÞÞfor an N-node system. Then, we present a novel two-level directory architecture to eliminate the penalty caused by compressed directories in general. The proposed organization consists of a small full-map first-level directory (which provides precise information for the most recently referenced lines) and a compressed second-level directory (which provides inexcess information for all the lines). The proposals are evaluated based on extensive execution-driven simulations (using RSIM) of a 64-node cc-NUMA multiprocessor. Results demonstrate that a system with a two-level directory architecture achieves the same performance as a multiprocessor with a big and nonscalable full-map directory, with a very significant reduction of the memory overhead. Index Terms—Scalability, directory memory overhead, two-level directory architecture, compressed sharing codes, unnecessary coherence messages, cc-NUMA multiprocessor. 1

Manuel E. Acacio; José González; Ieee Computer Society; José M. García; José Duato

2005-01-01T23:59:59.000Z

230

2006 UDI directory of electric power producers and distributors  

Science Conference Proceedings (OSTI)

The directory contains profiles of nearly 5,000 energy-related companies across the USA and Canada. This includes over 17,000 executives and other key personnel at: 3,600 regulated electric utilities and holding companies; 700 non-utility generators and service companies; 350 associations; power pools and independent system operators, architects, engineers, consultants, agencies and commissions. The directory covers such essential business information as: electric customer classifications; revenues and sales for utilities; number of employees; electric production and delivery system design; performance data; major interconnections; sources of purchased power; and service territories.

NONE

2005-07-01T23:59:59.000Z

231

Residential solar data center: data dictionary/directory  

Science Conference Proceedings (OSTI)

The Residential Solar Data Center project staff in the Center for Building Technology, National Bureau of Standards, maintains a computerized data base containing non-instrumented residential data from the DOE/HUD Solar Heating and Cooling Demonstration Program. This document provides a dictionary of data elements collected as part of the Residential Solar Program and a directory of the specific files which contain the data elements. This data dictionary/directory was produced by a computer program written in ASCII COBOL. The automated procedure is briefly described in an appendix.

Christopher, P.M.

1981-08-01T23:59:59.000Z

232

Method for fabricating prescribed flaws in the interior of metals  

SciTech Connect

The method for fabricating a metal body having a flaw of predetermined size and shape located therein comprises placing half of the metal powder required to make the metal body in the die of a press and pressing it to create a flat upper surface thereon. A piece of copper foil is cut to the size and shape of the desired interior crack and placed on the upper surface of the powder and centered in position. The remaining powder is then placed in the die to cover the copper foil. The powder is first cold pressed and removed from the press. The powder metal piece is then sintered in a furnace at a temperature above the melting point of the copper and below the melting point of the metal. It is then removed from the furnace, cooled to room temperature, and placed back in the die and pressed further. This procedure results in an interior flaw or crack. Modified forms of the method involve using a press-sinter-press-sinter cycle with the first sinter being below the melting point of the copper and the second sinter being above the melting point of the copper and below the melting point of the metal.

Hsu, David K. (Ames, IA); Thompson, Donald O. (Ames, IA)

1989-03-07T23:59:59.000Z

233

Traversability: A Case Study for Learning and Perceiving Affordances in Robots  

Science Conference Proceedings (OSTI)

The concept of affordances, introduced in psychology by J. J. Gibson, has recently attracted interest in the development of cognitive systems in autonomous robotics. In earlier work (Sahin, Çakmak, Dogar, Ugur, & Ã?çoluk), we reviewed the uses ... Keywords: affordance, autonomous robots, learning, perception, range image, traversability

Emre U?ur; Erol ?ahin

2010-06-01T23:59:59.000Z

234

Resource directory of DOE information organizations. Revision 2  

SciTech Connect

This Directory, the 1985 update of DOE/TIC-4616, is a guide to 199 information components of the Department of Energy (DOE) and is arranged by organization. When applicable, individual offices are listed hierarchically. Organization and personal name indexes are included.

Jared, M.W. (ed.)

1985-10-01T23:59:59.000Z

235

EIA directory of electronic products, Third quarter 1995  

SciTech Connect

EIA makes available for public use a series of machine-readable data files and computer models on magnetic tapes. Selected data files/models are also available on diskette for IBM-compatible personal computers. For each product listed in this directory, a detailed abstract is provided which describes the data published. Ordering information is given in the preface. Indexes are included.

NONE

1996-02-01T23:59:59.000Z

236

Steam Generator Management Program: Production of Steam Generator Tubing Flaws by Laboratory Autoclave Exposures  

Science Conference Proceedings (OSTI)

Qualification of a technique for the examination of steam generator tubing requires realistic flaws that are either pulled from service or produced in the laboratory. Due to the scarcity of pulled tube specimens, an effort was undertaken to produce realistic flaws in a laboratory environment. The ability to produce cracks in the laboratory was explored in doped steam, acidic, and caustic environments. These ...

2013-09-24T23:59:59.000Z

237

T-610: Red Hat kdenetwork security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat kdenetwork security update 0: Red Hat kdenetwork security update T-610: Red Hat kdenetwork security update April 26, 2011 - 7:11am Addthis PROBLEM: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. reference LINKS: RHSA-2011:0465-1 CVE-2011-1586 RH Classification RH Updates Support

238

U-001:Symantec IM Manager Input Validation Flaws | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws October 3, 2011 - 12:45pm Addthis PROBLEM: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. PLATFORM: Version(s): prior to 8.4.18 ABSTRACT: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. reference LINKS: Security Advisory: SYM11-012 SecurityTracker Alert ID: 1026130 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in Symantec IM Manager. A remote user can conduct cross-site scripting attacks. A remote user can inject SQL commands. Several scripts do not properly filter HTML code from user-supplied input before displaying the input [CVE-2011-0552]. A remote user can create a

239

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets 0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges August 8, 2012 - 7:00am Addthis PROBLEM: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) ABSTRACT: An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5. reference LINKS: Advisory: RHSA-2012:1149-1 SecurityTracker Alert ID: 1027356 Sudo Main Page Bugzilla 844442 CVE-2012-3440 IMPACT ASSESSMENT: Medium Discussion: A local user can exploit a temporary file symbolic link flaw in the %postun

240

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

1994 Washington State directory of Biomass Energy Facilities  

DOE Green Energy (OSTI)

This is the fourth edition of the Washington Directory of Biomass Energy Facilities, the first edition was published in 1987. The purpose of this directory is to provide a listing of and basic information about known biomass producers and users within the state to help demonstrate the importance of biomass energy in fueling our state`s energy needs. In 1992 (latest statistical year), estimates show that the industrial sector in Washington consumed nearly 128 trillion Btu of electricity, nearly 49.5 trillion Btu of petroleum, over 82.2 trillion Btu of natural gas, and over 4.2 trillion Btu of coal. Facilities listed in this directory generated approximately 114 trillion Btu of biomass energy - 93 trillion were consumed from waste wood and spent chemicals. In the total industrial energy picture, wood residues and chemical cooking liquors placed second only to electricity. This directory is divided into four main sections biogas production, biomass combustion, ethanol production, and solid fuel processing facilities. Each section contains maps and tables summarizing the information for each type of biomass. Provided in the back of the directory for reference are a conversion table, a table of abbreviations, a glossary, and an index. Chapter 1 deals with biogas production from both landfills and sewage treatment plants in the state. Biogas produced from garbage and sewage can be scrubbed and used to generate electricity. At the present time, biogas collected at landfills is being flared on-site, however four landfills are investigating the feasibility of gas recovery for energy. Landfill biogas accounted for approximately 6 percent of the total biomass reported. Sewage treatment biogas accounted for 0.6 percent. Biogas generated from sewage treatment plants is primarily used for space and process heat, only one facility presently scrubs and sells methane. Together, landfill and sewage treatment plant biogas represented over 6.6 percent of the total biomass reported.

Deshaye, J.A.; Kerstetter, J.D.

1994-03-01T23:59:59.000Z

242

1990 Washington State directory of biomass energy facilities  

DOE Green Energy (OSTI)

This second edition is an update of biomass energy production and use in Washington State for 1989. The purpose of this directory is to provide a listing of known biomass users within the state and some basic information about their facilities. The data can be helpful to persons or organizations considering the use of biomass fuels. The directory is divided into three sections of biomass facilities with each section containing a map of locations and a data summary table. In addition, a conversion table, a glossary and an index are provided in the back of the directory. The first section deals with biogas production from wastewater treatment plants. The second section provides information on the wood combustion facilities in the state. This section is subdivided into two categories. The first is for facilities connected with the forest products industries. The second category include other facilities using wood for energy. The third section is composed of three different types of biomass facilities -- ethanol, municipal solid waste, and solid fuel processing. Biomass facilities included in this directory produce over 64 trillion Btu (British thermal units) per year. Wood combustion facilities account for 91 percent of the total. Biogas and ethanol facilities each produce close to 800 billion Btu per year, MSW facilities produce 1845 billion BTU, and solid fuel processing facilities produce 2321 billion Btu per year. To put these numbers in perspective, Washington's industrial section uses 200 trillion Btu of fuels per year. Therefore, biomass fuels used and/or produced by facilities listed in this directory account for nearly 32 percent of the state's total industrial fuel demand. This is a sizable contribution to the state's energy needs.

Deshaye, J.A.; Kerstetter, J.D.

1990-01-01T23:59:59.000Z

243

1990 Washington State directory of biomass energy facilities  

DOE Green Energy (OSTI)

This second edition is an update of biomass energy production and use in Washington State for 1989. The purpose of this directory is to provide a listing of known biomass users within the state and some basic information about their facilities. The data can be helpful to persons or organizations considering the use of biomass fuels. The directory is divided into three sections of biomass facilities with each section containing a map of locations and a data summary table. In addition, a conversion table, a glossary and an index are provided in the back of the directory. The first section deals with biogas production from wastewater treatment plants. The second section provides information on the wood combustion facilities in the state. This section is subdivided into two categories. The first is for facilities connected with the forest products industries. The second category include other facilities using wood for energy. The third section is composed of three different types of biomass facilities -- ethanol, municipal solid waste, and solid fuel processing. Biomass facilities included in this directory produce over 64 trillion Btu (British thermal units) per year. Wood combustion facilities account for 91 percent of the total. Biogas and ethanol facilities each produce close to 800 billion Btu per year, MSW facilities produce 1845 billion BTU, and solid fuel processing facilities produce 2321 billion Btu per year. To put these numbers in perspective, Washington`s industrial section uses 200 trillion Btu of fuels per year. Therefore, biomass fuels used and/or produced by facilities listed in this directory account for nearly 32 percent of the state`s total industrial fuel demand. This is a sizable contribution to the state`s energy needs.

Deshaye, J.A.; Kerstetter, J.D.

1990-12-31T23:59:59.000Z

244

Directory of financing sources for foreign energy projects  

SciTech Connect

The Office of National Security Policy has produced this Directory of Financing Sources for Foreign Energy Projects. The Directory reviews programs that offer financing from US government agencies, multilateral organizations, public, private, and quasi-private investment funds, and local commercial and state development banks. The main US government agencies covered are the US Agency for International Development (USAID), the Export-Import Bank of the US (EXIM Bank), Overseas Private Investment Corporation (OPIC), US Department of Energy, US Department of Defense, and the US Trade and Development Agency (TDA). Other US Government Sources includes market funds that have been in part capitalized using US government agency funds. Multilateral organizations include the World Bank, International Finance Corporation (IFC), Asian Development Bank (ADB), European Bank for Reconstruction and Development (EBRD), and various organizations of the United Nations. The Directory lists available public, private, and quasi-private sources of financing in key emerging markets in the Newly Independent States and other developing countries of strategic interest to the US Department of Energy. The sources of financing listed in this directory should be considered indicative rather than inclusive of all potential sources of financing. Initial focus is on the Russian Federation, Ukraine, india, China, and Pakistan. Separate self-contained sections have been developed for each of the countries to enable the user to readily access market-specific information and to support country-specific Departmental initiatives. For each country, the directory is organized to follow the project life cycle--from prefeasibility, feasibility, project finance, cofinancing, and trade finance, through to technical assistance and training. Programs on investment and export insurance are excluded.

La Ferla, L. [La Ferla Associates, Washington, DC (United States)

1995-09-01T23:59:59.000Z

245

1990 Washington State directory of biomass energy facilities  

SciTech Connect

This second edition is an update of biomass energy production and use in Washington State for 1989. The purpose of this directory is to provide a listing of known biomass users within the state and some basic information about their facilities. The data can be helpful to persons or organizations considering the use of biomass fuels. The directory is divided into three sections of biomass facilities with each section containing a map of locations and a data summary table. In addition, a conversion table, a glossary and an index are provided in the back of the directory. The first section deals with biogas production from wastewater treatment plants. The second section provides information on the wood combustion facilities in the state. This section is subdivided into two categories. The first is for facilities connected with the forest products industries. The second category include other facilities using wood for energy. The third section is composed of three different types of biomass facilities -- ethanol, municipal solid waste, and solid fuel processing. Biomass facilities included in this directory produce over 64 trillion Btu (British thermal units) per year. Wood combustion facilities account for 91 percent of the total. Biogas and ethanol facilities each produce close to 800 billion Btu per year, MSW facilities produce 1845 billion BTU, and solid fuel processing facilities produce 2321 billion Btu per year. To put these numbers in perspective, Washington's industrial section uses 200 trillion Btu of fuels per year. Therefore, biomass fuels used and/or produced by facilities listed in this directory account for nearly 32 percent of the state's total industrial fuel demand. This is a sizable contribution to the state's energy needs.

Deshaye, J.A.; Kerstetter, J.D.

1990-01-01T23:59:59.000Z

246

2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 Directory of Potential Stakeholders for DOE Actions under NEPA 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued July 31, 2013 - 5:02pm Addthis 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued The Stakeholder Directory, now in its 30th edition, identifies contacts in federal agencies; states, territories, and state government associations; and nongovernmental organizations for reviewing environmental impact statements and environmental assessments, and for other NEPA public involvement and consultation activities. The Directory is primarily intended to supplement lists that Departmental Offices compile for individual projects or facilities. Addthis Related Articles Obama Officials Announce Steps to Promote the Clean Energy Potential of the

247

2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2013 Directory of Potential Stakeholders for DOE Actions under NEPA 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued July 31, 2013 - 5:02pm Addthis 2013 Directory of Potential Stakeholders for DOE Actions under NEPA Issued The Stakeholder Directory, now in its 30th edition, identifies contacts in federal agencies; states, territories, and state government associations; and nongovernmental organizations for reviewing environmental impact statements and environmental assessments, and for other NEPA public involvement and consultation activities. The Directory is primarily intended to supplement lists that Departmental Offices compile for individual projects or facilities. Addthis Related Articles Secretary Chu Announces Efforts to Strengthen U.S. Electric Transmission

248

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets 4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service May 17, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in Novell eDirectory. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HP/UX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user can cause denial of service conditions. reference LINKS: Novell eDirectory - LDAP-SSL SECURELIST.ORG SecurityFocus BugTrackID: 47858 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Novell eDirectory. A remote user can cause

249

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

250

Architectural Support for an Efficient Implementation of a Software-Only Directory Cache Coherence Protocol  

E-Print Network (OSTI)

Software-only directory cache coherence protocols emulate directory management by handlers executed on the compute processor in shared-memory multiprocessors. While their potential lies in lower implementation cost and complexity than traditional hardware-only directory protocols, the miss penalty for cache misses induced by application data accesses as well as directory accesses is a critical issue to address. In this paper, we study important support mechanisms for software-only directory protocols in the context of a processor node organization for a cache-coherent NUMA architecture. We find that it is possible to remove or hide software handler latency for local as well as remote read misses by adopting simple hardware support mechanisms. To further reduce the overhead of software handler execution, we study the effects of directory data caching. While this could pollute the caches, our results suggest that this effect is marginal and that software handler execution over...

Håkan Grahn; Per Stenström

1995-01-01T23:59:59.000Z

251

Hydrogen Visual CDP Directory (Sunburst) | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Hydrogen Visual CDP Directory (Sunburst) Jump to: navigation, search Ret Left click to go straight to a CDP. Right click to find more information. The interactive graphic on this page links to all of the Composite Data Products, organized by topic. You can find this complete listing on the Composite Data Products by Topic Web page. If you need additional assistance finding a Composite Data Product, please email us. rieved from "http://en.openei.org/w/index.php?title=Hydrogen_Visual_CDP_Directory_(Sunburst)&oldid=618100" What links here Related changes Special pages

252

Collaborative Management of Global Directories in P2P Systems  

E-Print Network (OSTI)

To date, much of the research in P2P information sharing has concentrated on methods for key-based or contentbased location of shared information. In this paper, we argue that in addition to these techniques, the provision of a global browsable structure is also a critical component since users do not always know the appropriate key or set of keywords to locate needed information. To give substance to our argument, we propose a framework that will provide P2P communities with global browsable directories. Our proposal focuses specifically on how to support the communal organization and management of such a shared global directory in order to provide a coherent structure for users in a community to locate information via browsing.

Christopher Peery; Francisco Matias Cuenca-Acuna; Richard P. Martin; Thu D. Nguyen

2002-01-01T23:59:59.000Z

253

Usenetfs: A Stackable File System for Large Article Directories  

E-Print Network (OSTI)

The Internet has grown much in popularity in the past few years. Numerous users read USENET newsgroups daily for entertainment, work, study, and more. USENET News servers have seen a gradual increase in the traffic exchanged between them, to a point where the hardware and software supporting the servers is no longer capable of meeting demand, at which point the servers begin "dropping " articles they could not process. The rate of this increase has been faster than software or hardware improvements were able to keep up, resulting in much time and effort spent by administrators upgrading their news systems. One of the primary reasons for the slowness of news servers has been the need to process many articles in very large flat directories representing newsgroups such as control. cancel and misc.jobs.offered. A large portion of the resources is spent on processing articles in these few newsgroups. Most Unix directories are organized as a linear unsorted sequence of entries. Large newsgr...

Erez Zadok; Ion Badulescu

1998-01-01T23:59:59.000Z

254

The directory of US coal and technology export resources  

Science Conference Proceedings (OSTI)

The purpose of The Directory remains focused on offering a consolidated resource to potential buyers of US coal, coal technology, and expertise. This is consistent with the US policy on coal and coal technology trade, which continues to emphasize export market strategy implementation. Within this context, DOE will continue to support the teaming'' approach to marketing; i.e., vertically integrated large project teams to include multiple industry sectors, such as coal producers, engineering and construction firms, equipment manufacturers, financing and service organizations.

Not Available

1990-10-01T23:59:59.000Z

255

Directory of selected tropical forestry journals and newsletters  

SciTech Connect

Heightened public and professional interest in tropical forestry has led in recent years to a large increase in the volume of information produced on the subject. The directory catalogues and describes 473 tropical forestry periodicals, ranging from scientific journals to informal newsletters. Entries are arranged alphabetically and provide information on each journals focus, audience, language, frequency of publication, availability, and cost, as well as address, and telephone, fax, and telex number. Includes subject, geographic, and language indexes.

Haugen, C.; Durst, P.B.; Freed, E.

1994-01-01T23:59:59.000Z

256

EIA directory of electronic products fourth quarter 1993  

SciTech Connect

The Energy Information Administration (EIA) makes available for public use a series of machine-readable data files and computer models. The data files and models are made available to the public on magnetic tapes. In addition, selected data files/models are available on diskette for IBM-compatible personal computers. For each product listed in this directory, a detailed abstract is provided which describes the data published.

1994-02-23T23:59:59.000Z

257

A directory service for configuring high-performance distributed computations  

Science Conference Proceedings (OSTI)

High-performance execution in distributed computing environments often requires careful selection and configuration not only of computers, networks, and other resources but also of the protocols and algorithms used by applications. Selection and configuration in turn require access to accurate, up-to-date information on the structure and state of available resources. Unfortunately, no standard mechanism exists for organizing or accessing such information. Consequently, different tools and applications adopt ad hoc mechanisms, or they compromise their portability and performance by using default configurations. We propose a Metacomputing Directory Service that provides efficient and scalable access to diverse, dynamic, and distributed information about resource structure and state. We define an extensible data model to represent required information and present a scalable, high-performance, distributed implementation. The data representation and application programming interface are adopted from the Lightweight Directory Access Protocol; the data model and implementation are new. We use the Globus distributed computing toolkit to illustrate how this directory service enables the development of more flexible and efficient distributed computing services and applications.

Fitzgerald, S.; Kesselman, C. [Univ. of Southern California, Marina del Rey, CA (United States). Information Sciences Institute; Foster, I. [Argonne National Lab., IL (United States)] [and others

1997-08-01T23:59:59.000Z

258

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Wicket Input Validation Flaw Permits Cross-Site 5: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks September 11, 2012 - 6:00am Addthis PROBLEM: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache Software Foundation Apache Wicket 1.4.20 Apache Software Foundation Apache Wicket 1.4.18 Apache Software Foundation Apache Wicket 1.4.17 Apache Software Foundation Apache Wicket 1.4.16 ABSTRACT: A vulnerability was reported in Apache Wicket reference LINKS: Apache Wicket SecurityTracker Alert ID: 1027508 Bugtraq ID: 55445 CVE-2012-3373 IMPACT ASSESSMENT: Medium Discussion: The software does not properly filter HTML code from user-supplied input in

259

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

260

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

262

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

263

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

264

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

265

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

266

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

267

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

268

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

269

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

270

U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName'  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' 2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks March 23, 2012 - 7:42am Addthis PROBLEM: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks PLATFORM: Apache Wicket 1.4.x ABSTRACT: A remote user can conduct cross-site scripting attacks. reference LINKS: Apache Wicket CVE-2012-0047 SecurityTracker Alert ID: 1026839 IMPACT ASSESSMENT: High Discussion: The software does not properly filter HTML code from user-supplied input in the 'wicket:pageMapName' request parameter before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target

271

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

272

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

273

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

274

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

275

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

276

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

277

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

278

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

279

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

280

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

282

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

283

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

284

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

285

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

286

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

287

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

288

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

289

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

290

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

291

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

292

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

293

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Blue Coat Director HTTP Trace Processing Flaw Permits 0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks September 19, 2011 - 8:45am Addthis PROBLEM Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks. PLATFORM: All versions of Director prior to 5.5.2.3 are vulnerable. ABSTRACT: A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks. reference LINKS: Blue Coat Advisories ID: SA62 SecurityTracker Alert ID: 1026061 Blue Coat Director 510 Blue Coat SGME 5 IMPACT ASSESSMENT: Medium Discussion: An attacker can use the HTTP TRACE method to echo malicious script back to the client as part of a Cross Site Scripting (XSS) attack. No

294

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site 4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis PROBLEM: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 4.3.0 through 4.3.5 ABSTRACT: A vulnerability was reported in Splunk Web. REFERENCE LINKS: SecurityTracker Alert ID: 1028371 Splunk IMPACT ASSESSMENT: High DISCUSSION: Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the

295

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

296

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

297

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

298

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

299

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

NLE Websites -- All DOE Office Websites (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

300

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit 2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September 6, 2012 - 6:00am Addthis PROBLEM: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: Barracuda Web Filter 5.0.015 is vulnerable; other versions may also be affected. ABSTRACT: Barracuda Web Filter Authentication Module Multiple HTML Injection Vulnerabilities reference LINKS: Barracuda Networks Barracuda Networks Security ID: BNSEC-279/BNYF-5533 SecurityTracker Alert ID: 1027500 Bugtraq ID: 55394 seclists.org IMPACT ASSESSMENT: Medium Discussion: Two scripts not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to

302

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

303

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

304

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

305

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

306

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

307

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

308

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

309

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

310

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

311

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

312

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

313

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

314

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

315

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

316

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

317

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

318

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

319

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

320

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

322

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

323

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

324

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site 0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks. PLATFORM: Adobe Flex SDK 4.5.1 and earlier 4.x versions for Windows, Macintosh and Linux Adobe Flex SDK 3.6 and earlier 3.x versions for Windows, Macintosh and Linux ABSTRACT: Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: Adobe Security Bulletin CVE-2011-2461 SecurityTracker Alert ID: 1026361 IMPACT ASSESSMENT: High Discussion: A remote user may be able to cause arbitrary scripting code to be executed

325

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

326

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

327

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

328

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

329

T-602: BlackBerry Enterprise Server Input Validation Flaw in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

330

Plant Engineering: Evaluation of Indirect Assessment Techniques for Coating Flaw Detection  

Science Conference Proceedings (OSTI)

This report is a description of the work performed and conclusions resulting from an investigation of indirect assessment techniques for coating flaw detection on buried piping in nuclear generating power plant environments. Indirect assessment techniques have been developed and successfully used in the oil and gas industry to identify coating flaws on buried transmission and distribution pipelines. These techniques involve the use of electrochemical measurements taken at the soil surface (grade) to dete...

2011-12-23T23:59:59.000Z

331

Stress Intensity Factor Plasticity Correction for Flaws in Stress Concentration Regions  

DOE Green Energy (OSTI)

Plasticity corrections to elastically computed stress intensity factors are often included in brittle fracture evaluation procedures. These corrections are based on the existence of a plastic zone in the vicinity of the crack tip. Such a plastic zone correction is included in the flaw evaluation procedure of Appendix A to Section XI of the ASME Boiler and Pressure Vessel Code. Plasticity effects from the results of elastic and elastic-plastic explicit flaw finite element analyses are examined for various size cracks emanating from the root of a notch in a panel and for cracks located at fillet fadii. The results of these caluclations provide conditions under which the crack-tip plastic zone correction based on the Irwin plastic zone size overestimates the plasticity effect for crack-like flaws embedded in stress concentration regions in which the elastically computed stress exceeds the yield strength of the material. A failure assessment diagram (FAD) curve is employed to graphically c haracterize the effect of plasticity on the crack driving force. The Option 1 FAD curve of the Level 3 advanced fracture assessment procedure of British Standard PD 6493:1991, adjusted for stress concentration effects by a term that is a function of the applied load and the ratio of the local radius of curvature at the flaw location to the flaw depth, provides a satisfactory bound to all the FAD curves derived from the explicit flaw finite element calculations. The adjusted FAD curve is a less restrictive plasticity correction than the plastic zone correction of Section XI for flaws embedded in plastic zones at geometric stress concentrators. This enables unnecessary conservatism to be removed from flaw evaluation procedures that utilize plasticity corrections.

Friedman, E.; Wilson, W.K.

2000-02-01T23:59:59.000Z

332

Cache directory look-up re-use as conflict check mechanism for speculative memory requests  

DOE Patents (OSTI)

In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

Ohmacht, Martin

2013-09-10T23:59:59.000Z

333

Directory of Energy Data Collection Forms: Forms in use as of October 1993  

Science Conference Proceedings (OSTI)

This is the seventeenth edition of the Directory of Energy Data Collection forms, an authoritative listing of selected public use forms currently used as basic energy information gathering tools by the Department of Energy (DOE). Originally entitled EIA Data Collection forms, this directory provides an overview of DOE`s energy information collection programs for decisionmakers in Government and industry.

Not Available

1993-12-28T23:59:59.000Z

334

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

335

An Information Services Algorithm to Heuristically Summarize IP Addresses for a Distributed, Hierarchical Directory Service  

NLE Websites -- All DOE Office Websites (Extended Search)

information services algorithm to heuristically summarize IP addresses for a information services algorithm to heuristically summarize IP addresses for a distributed, hierarchical directory service Marcos Portnoi, Martin Swany Department of Computer and Information Sciences University of Delaware Newark, DE 19716, U.S.A. {portnoi, swany}@cis.udel.edu Jason Zurawski Internet2 Washington, DC 20036, U.S.A. zurawski@internet2.edu Abstract- A distributed, hierarchical information service for computer networks might use several service instances, located in different layers. A distributed directory service, for example, might be comprised of upper level listings, and local directories. The upper level listings contain a compact version of the local directories. Clients desiring to access the information contained in local directories might first access the

336

EIA directory of electronic products, first quarter 1995  

SciTech Connect

The Energy Information Administration (EIA) makes available for public use a series of machine-readable data files and computer models. The data files and models are made available to the public on magnetic tapes. In addition, selected data files/models are available on diskette for IBM-compatible personal computers. EIA, as the independent statistical and analytical branch of the Department of Energy, provides assistance to the general public through the National Energy Information Center (NEIC). For each product listed in this directory, a detailed abstract is provided which describes the data published. Specific technical questions may be referred to the appropriate contact person.

NONE

1995-06-01T23:59:59.000Z

337

EIA directory of electronic products. Third quarter 1994  

SciTech Connect

The Energy Information Administration (EIA) makes available for public use a series of machine-readable data files and computer models. The data files and models are made available to the public on magnetic tapes. In addition, selected data files/models are available on diskette for IBM-compatible personal computers. EIA, as the independent statistical and analytical branch of the Department of Energy, provides assistance to the general public through the National Energy Information Center (NEIC). Inquirers may telephone NEIC`s information specialists at (202) 586-8800 with any data questions relating to the content of EIA Directory of Electronic Products.

Not Available

1994-09-01T23:59:59.000Z

338

EIA Directory of Electronic Products, Second quarter 1994  

SciTech Connect

EIA makes available for public use a series of machine-readable data files and computer models, on magnetic tapes; selected data files/models are also available on PC diskettes. The data files include: petroleum, natural gas, electricity, coal, integrated statistics, and consumption. Models include: petroleum, natural gas, electricity, coal, nuclear, and multifuel. On-line files and compact discs include: electronic publishing system, federal bulletin board, economic bulletin board, national trade data bank, national economic/social/environmental data bank, and FedWorld Gateway. For each product listed in this directory, an abstract describes the data published. Contact persons are provided, as are indexes.

1994-07-26T23:59:59.000Z

339

Directory of Certificates of Compliance for dry spent fuel storage casks  

Science Conference Proceedings (OSTI)

This directory contains Certificates of Compliance for all dry spent fuel storage casks approved by the US Nuclear Regulatory Commission and Summary Reports of each approved cask model. Later directories will contain a list of cask users, and a list of cask locations. The purpose of this directory is to make available a convenient source of information on spent fuel storage casks which have been approved by the US Nuclear Regulatory Commission. Storage of fuel assemblies using these casks must be in accordance with the provisions of 10 CFR Part 72.

Not Available

1992-02-01T23:59:59.000Z

340

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 9, 2011 September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 7, 2011 T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks. September 6, 2011 T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. September 2, 2011 T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed By Remote Users Mac OS X keychain certificate settings can be bypassed by remote users September 1, 2011 T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code Pidgin bugs let remote users deny service and potentially execute arbitrary

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

342

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

343

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

344

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

345

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Skype Input Validation Flaw in 'mobile phone' Profile Entry 0: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

346

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

347

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

348

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

349

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

350

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

351

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

352

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

353

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

354

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

355

T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Access Gateway Enterprise Edition Input Validation 1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks August 25, 2011 - 3:33pm Addthis PROBLEM: A vulnerability was reported in Citrix Access Gateway Enterprise Edition. A remote user can conduct cross-site scripting attacks. PLATFORM: Citrix Access Gateway Enterprise Edition 9.2-49.8 and prior. Citrix Access Gateway Enterprise Edition version 9.3 is not affected by this vulnerability. ABSTRACT: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. reference LINKS: SecurityTracker Alert ID: 1025973 Citrix Document ID: CTX129971

356

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Skype Input Validation Flaw in 'mobile phone' Profile Entry 70: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

357

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

358

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

359

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

360

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

362

V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Brightmail Gateway Input Validation Flaw Permits 3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks May 10, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Brightmail Gateway PLATFORM: The vulnerabilities are reported in versions prior to 9.5.x ABSTRACT: Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. REFERENCE LINKS: Security Tracker Alert ID: 1028530 Symantec Security Advisory CVE-2013-1611 IMPACT ASSESSMENT: Medium DISCUSSION: The administrative interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause

363

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

364

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

365

V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local  

NLE Websites -- All DOE Office Websites (Extended Search)

7: VMware Workstation and Player vmware-mount Command Flaw Lets 7: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges August 26, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation and Player on Debian-based systems PLATFORM: VMware Workstation 8.x, 9.x and Player 4.x, 5.x ABSTRACT: VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command REFERENCE LINKS: Security Tracker Alert ID 1028948 VMware Security Advisory VMSA-2013-0010 CVE-2013-1662 IMPACT ASSESSMENT: Medium DISCUSSION: A local malicious user may exploit this vulnerability to escalate their privileges to root on the host OS. The issue is present when Workstation or

366

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

367

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

368

Characterization of flaws in a tube bundle mock-up for reliability studies  

Science Conference Proceedings (OSTI)

As part of an assessment of in-service inspection of steam generator tubes, the authors will assemble a steam generator mock-up for round robin studies and use as a test bed in evaluating emerging technologies. Progress is reported on the characterization of flaws that will be part of the mock-up. Eddy current and ultrasonic techniques are being evaluated as a means to characterize the flaws in the mock-up tubes before final assembly. Twenty Inconel 600 tubes with laboratory-grown cracks, typical of those to be used in the mock-up, were provided by Pacific Northwest National Laboratory for laboratory testing. After the tubes were inspected with eddy current and ultrasonic techniques, they were destructively analyzed to establish the actual depths, lengths, and profiles of the cracks. The analysis of the results will allow the best techniques to be used for characterizing the flaws in the mock-up tubes.

Kupperman, D.S.; Bakhtiari, S.

1996-10-01T23:59:59.000Z

369

Market development directory for solar industrial process heat systems  

DOE Green Energy (OSTI)

The purpose of this directory is to provide a basis for market development activities through a location listing of key trade associations, trade periodicals, and key firms for three target groups. Potential industrial users and potential IPH system designers were identified as the prime targets for market development activities. The bulk of the directory is a listing of these two groups. The third group, solar IPH equipment manufacturers, was included to provide an information source for potential industrial users and potential IPH system designers. Trade associates and their publications are listed for selected four-digit Standard Industrial Code (SIC) industries. Since industries requiring relatively lower temperature process heat probably will comprise most of the near-term market for solar IPH systems, the 80 SIC's included in this chapter have process temperature requirements less than 350/sup 0/F. Some key statistics and a location list of the largest plants (according to number of employees) in each state are included for 15 of the 80 SIC's. Architectural/engineering and consulting firms are listed which are known to have solar experience. Professional associated and periodicals to which information on solar IPH sytstems may be directed also are included. Solar equipment manufacturers and their associations are listed. The listing is based on the SERI Solar Energy Information Data Base (SEIDB).

None

1980-02-01T23:59:59.000Z

370

Safeguards and Security Technology Development Directory. FY 1993  

SciTech Connect

The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

1993-06-01T23:59:59.000Z

371

Building Efficient Limited Directory-Based DSMs: A Multidestination Message Passing Based  

E-Print Network (OSTI)

: A cost-effective distributed shared memory (DSM) system typically uses a limited directory protocol to enforce cache coherence. This paper presents a new family of protocols, called Limited directory with Region-based Broadcast (Limited-RB), to efficiently implement cache coherence in wormhole routed DSM systems. This protocol family uses multidestinationbased cache invalidation mechanisms to distribute invalidation requests to and collect the associated acknowledgments from separate regions. As a result, a write invalidation can be accomplished with fewer messages, less network traffic, and reduced occupancy at home nodes. These reductions contribute to decreasing invalidation latency and improving overall system performance. Directory organization under this new protocol is developed for 2D systems with e-cube routing and evaluated through simulations for a set of applications. The results indicate that with a small directory storage, the Limited-RB protocol family can achieve supe...

Donglai Dai; Dhabaleswar K. Panda; Donglai Dai; Dhabaleswar K. P; Dhabaleswar K. P

1996-01-01T23:59:59.000Z

372

Directory of Energy Data Collection Forms: Forms in use as of October 1996  

SciTech Connect

This is the twentieth edition of the Directory of Energy Collection Data Forms, an authoritative listing of selected public use forms currently used as basic energy information gathering tools by the Department of Energy.

NONE

1996-12-01T23:59:59.000Z

373

Directory of energy data collection forms. Forms in use as of October 1995  

SciTech Connect

This is an authoritative listing of selected public use forms currently used as basic energy information gathering tools by the Department of Energy (DOE). This directory provides an overview of DOE`s energy information collection programs for decisionmakers in Government and industry. Forms designed to collect energy information and used by the Energy Information Administration (EIA) as of October 1995 are included in this directory. For each form listed in this directory, an abstract is included that describes the form`s uses, its respondents, and the data collected. For the reader`s convenience in finding specific types of collections, several indices have been provided in this directory. A listing of the forms grouped by energy source and function begins on page 26. Beginning on page 38 are the publications derived from the collections, and on page 50, are the forms linked to general respondent categories.

NONE

1996-01-01T23:59:59.000Z

374

About Us Nanotechnology News Columns Products Directories Career Center My Account Google Search  

E-Print Network (OSTI)

About Us Nanotechnology News Columns Products Directories Career Center My Account Google Search. Bookmark: The latest news from around the world, FREE Subscribe Ads by Google Teleportation Nanotechnology.fluigent.com Ads by Google Nanotechnology Now - Press Release

Leigh, David A.

375

Pre-SW - Steam Generator Management Program: Flaw Handbook Calculator for Excel 2010, Version 2.0  

Science Conference Proceedings (OSTI)

The EPRI Steam Generator Management Program:  Steam Generator Degradation Specific Flaw Handbook (1019037) defines burst pressure equations for steam generator tubes with various degradation morphologies, and the EPRI Steam Generator Management Program:  Steam Generator Integrity Assessment Guidelines (1019038) describes a probabilistic evaluation process which can be used to account for key input parameter uncertainties.  The Flaw Handbook Calculator software is an automated ...

2013-11-20T23:59:59.000Z

376

Investigation of effective parameters on the traverse of root of the gas turbine blade by design of experiments  

Science Conference Proceedings (OSTI)

Creep feed grinding is widely used in manufacturing suppe-ralloy materials. The main objectives of this research deal with the influences of major process parameters and their interactions of creep feed grinding process such as wheel speed, workpiece ... Keywords: analysis of variance, creep feed grinding, interactive effect, regression, traverse

A. R. Fazeli Nahrekhalaji

2010-04-01T23:59:59.000Z

377

Efficient Traversal of Mesh Edges using Adjacency Primitives Pedro V. Sander Diego Nehab Eden Chlamtac Hugues Hoppe  

E-Print Network (OSTI)

traversal of mesh edges that builds on the adja- cency primitives and programmable geometry shaders. Keywords: real-time rendering, silhouettes, shadow volumes, ver- tex locality, programmable geometry shader triangles, thereby achieving significant reduction in both memory bandwidth and vertex shader computation

Cohen, Michael

378

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

379

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

380

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Rational AppScan Import/Load Function Flaws Let Remote 7: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code October 10, 2011 - 9:15am Addthis PROBLEM: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code. PLATFORM: Version(s): 7.8, 7.8.0.1, 7.8.0.2, 7.9, 7.9.0.1, 7.9.0.2, 7.9.0.3, 8.0, 8.0.0.1, 8.0.0.2 ABSTRACT: Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: IBM Security Advisory Document ID: 1515110 IBM Fix Pack Document ID: 4030774 SecurityTracker Alert ID: 1026154 IMPACT ASSESSMENT: High Discussion: A high risk security vulnerability in the "Import functionality" of IBM

382

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

383

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

384

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

385

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

386

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

387

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

388

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

389

How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store  

Science Conference Proceedings (OSTI)

Although there has been a great deal of research on impression formation, little application of that research has been made to electronic commerce. A research model was constructed that hypothesized errors, poor style, and incompleteness to be inversely ... Keywords: Intention To Purchase, Trust In E-Commerce, Web Site Credibility, Web Site Presentation Flaws, Web Site Quality

Andrea Everard; Dennis F. Galletta

2006-01-01T23:59:59.000Z

390

Apparatus and method for detecting and/or measuring flaws in conductive material  

Science Conference Proceedings (OSTI)

The present invention uses a magnet and sensor coil unilaterial and in relative motion to a conductive material, to measure perturbation or variation in the magnetic field in the presence of a flaw. A liftoff compensator measures a distance between the conductive material and the magnet.

Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

2000-01-01T23:59:59.000Z

391

Two Dynamical Core Formulation Flaws Exposed by a Baroclinic Instability Test Case  

Science Conference Proceedings (OSTI)

Two flaws in the semi-Lagrangian algorithm originally implemented as an optional dynamical core in the NCAR Community Atmosphere Model (CAM3.1) are exposed by steady-state and baroclinic instability test cases. Remedies are demonstrated and have ...

David L. Williamson; Jerry G. Olson; Christiane Jablonowski

2009-02-01T23:59:59.000Z

392

EIA directory of electronic products. Second quarter 1995  

Science Conference Proceedings (OSTI)

The Energy Information Administration (EIA) makes available for public use a series of machine-readable data files and computer models. They are available to the public on magnetic tapes; selected data files/models are available on diskette for IBM-compatible personal computers. This directory first presents the on-line files and compact discs. This is followed by descriptions and technical contacts and ordering and other information on the data files and models. An index by energy source is included. Additional ordering information is in the preface. The data files cover petroleum, natural gas, electricity, coal, integrated statistics, and consumption; the models cover petroleum, natural gas, electricity, coal, nuclear, and multifuel.

NONE

1995-10-04T23:59:59.000Z

393

Development of flaw evaluation and acceptance procedures for flaw indications in the cooling water system at the Savannah River Site K Reactor  

SciTech Connect

This paper describes the methodology used in determining the criteria for acceptance of inspection indications in the K-Reactor Cooling Water System at the Savannah River Plant. These criteria have been developed in a manner consistent with the development of similar criteria in the ASME Code Section 11 for commercial light water reactors, but with a realistic treatment of the operating conditions in the cooling water system. The technical basis for the development of these criteria called {open_quotes}Acceptance Standards{close_quotes} is contained in this paper. A second portion of this paper contains the methodology used in the construction of flaw evaluation charts which have been developed for each specific line size in the cooling water system. The charts provide the results of detailed fracture mechanics calculations which have been completed to determine the largest flaw which can be accepted in the cooling water system without repair. These charts are designed for use in conjunction with inservice inspections of the cooling water system, and only require inspection results to determine acceptability.

Tandon, S.; Bamford, W.H. [Westinghouse Electric Corp., Pittsburgh, PA (US); Cowfer, C.D.; Ostrowski, R. [Westinghouse Savannah River Co., Aiken, SC (US)

1993-06-01T23:59:59.000Z

394

Development of flaw evaluation and acceptance procedures for flaw indications in the cooling water system at the Savannah River Site K Reactor  

SciTech Connect

This paper describes the methodology used in determining the criteria for acceptance of inspection indications in the K-Reactor Cooling Water System at the Savannah River Plant. These criteria have been developed in a manner consistent with the development of similar criteria in the ASME Code Section 11 for commercial light water reactors, but with a realistic treatment of the operating conditions in the cooling water system. The technical basis for the development of these criteria called [open quotes]Acceptance Standards[close quotes] is contained in this paper. A second portion of this paper contains the methodology used in the construction of flaw evaluation charts which have been developed for each specific line size in the cooling water system. The charts provide the results of detailed fracture mechanics calculations which have been completed to determine the largest flaw which can be accepted in the cooling water system without repair. These charts are designed for use in conjunction with inservice inspections of the cooling water system, and only require inspection results to determine acceptability.

Tandon, S.; Bamford, W.H. (Westinghouse Electric Corp., Pittsburgh, PA (United States)); Cowfer, C.D.; Ostrowski, R. (Westinghouse Savannah River Co., Aiken, SC (United States))

1993-01-01T23:59:59.000Z

395

Directory of Federal Agencies and University Research Centers conducting R D in Environmental and Waste Management  

Science Conference Proceedings (OSTI)

In October 1990 PAR Enterprises, Incorporated was awarded a contract by the Department of Energy to conduct a survey and prepare a Directory of Federal Agencies and University Research Centers involved in environmental restoration and waste management research and development. To conduct the survey and organize the Directory, data from 50 Federal agencies and 100 universities was collected, evaluated and summarized. The purpose of the survey and Directory is to describe the activities and provide a reference base of Federal Agencies and University Research Cantors involved in environmental restoration and waste management research and development. The Directory contains (1) the Foreword, (2) an Introduction, (3) a Description of the Survey Organization and Research Approach, (4) the EM/OTD Key Word Networks, (5) a series of matrices that show the relationship between the OTD technical requirements and the Federal Agency/University EM capabilities, (6) the Federal Agency and University Research Center EM R D Capabilities Profiles, (7) a Glossary, and (8) an Appendix that describes the EM activities of the DOE National Laboratories and related research facilities. The survey and Directory was prepared for the Office of Technology Development (OTD), a major R D component of DOE's Office of Environmental Restoration and Waste Management.

Not Available

1991-12-01T23:59:59.000Z

396

Detection and characterization of flaws in segments of light water reactor pressure vessels  

Science Conference Proceedings (OSTI)

Studies have been conducted to determine flaw density in segments cut from light water reactor (LWR) pressure vessels as part of the Oak Ridge National Laboratory's Heavy-Section Steel Technology (HSST) Program. Segments from the Hope Creek Unit 2 vessil and the Pilgrim Unit 2 Vessel were purchased from salvage dealers. Hope Creek was a boiling water reactor (BWR) design and Pilgrim was a pressurized water reactor (PWR) design. Neither were ever placed in service. Objectives were to evaluate these LWR segments for flaws with ultrasonic and liquid penetrant techniques. Both objectives were successfully completed. One significant indication was detected in a Hope Creek seam weld by ultrasonic techniques and characterized by further analyses terminating with destructive correlation. This indication (with a through-wall dimension of approx.6 mm (approx.0.24 in.)) was detected in only 3 m (10 ft) of weldment and offers extremely limited data when compared to the extent of welding even in a single pressure vessel. However, the detection and confirmation of the flaw in the arbitrarily selected sections implies the Marshall report estimates (and others) are nonconservative for such small flaws. No significant indications were detected in the Pilgrim material by ultrasonic techniques. Unfortunately, the Pilgrim segments contained relatively little weldment; thus, we limited our ultrasonic examinations to the cladding and subcladding regions. Fluorescent liquid penetrant inspection of the cladding surfaces for both LWR segments detected no significant indications (i.e., for a total of approximately 6.8 m/sup 2/ (72 ft/sup 2/) of cladding surface).

Cook, K.V.; Cunningham, R.A. Jr.; McClung, R.W.

1987-01-01T23:59:59.000Z

397

BWRVIP-139: Vessel and Internals Project, Steam Dryer Inspection and Flaw Evaluation Guidelines  

Science Conference Proceedings (OSTI)

This document provides steam dryer inspection and flaw evaluation guidelines consistent with those developed for other boiling water reactor (BWR) internal components. It includes (1) documentation of the steam dryer configurations for the different plants, (2) a summary of dryer cracking incidents based on field experience, (3) documentation of the regions of susceptibility for fatigue cracking and intergranular stress corrosion cracking (IGSCC), (4) a review of the failure modes and effects of cracking...

2005-04-01T23:59:59.000Z

398

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service 11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service February 27, 2012 - 6:27am Addthis PROBLEM: A vulnerability was reported in IBM AIX. A remote user can cause denial of service conditions. PLATFORM: version(s): 5.3, 6.1, and 7.1 ABSTRACT: A remote user can send a specially crafted ICMP packet to cause the target service to crash. reference LINKS: Vendor Advisory Security Tracker ID 1026742 CVE-2011-1385 IMPACT ASSESSMENT: Medium Discussion: There is an error in the handling of a particular ICMP packet in which a remote user can cause a denial of service. Impact: Denial of service on AIX via network. Solution: The vendor has issued a fix. 5.3.12: APAR IV03369 6.1.5: APAR IV13672 6.1.6: APAR IV13554

399

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: ISC BIND Packet Processing Flaw Lets Remote Users Deny 2: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service July 6, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions. PLATFORM: 9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0, 9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2, 9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2, 9.8.0-P3, 9.8.1b1 ABSTRACT: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured

400

Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect

During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

2012-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Directory of energy efficiency information services for the residential and commercial sectors  

SciTech Connect

This directory is a compilation of organizations which disseminate a wide range of information on the efficient use of energy in the residential and commercial sectors. Each organization's services are defined by the informations' targeted audience, types of services offered, topics and sectors addressed and access terms required. The organizations included in this directory are based on the Guide to Energy Efficiency Information Services for the Residential and Commercial Sectors, June 1987. The information is presented in two formats in this directory, each focusing on different manners of data retrieval. Section One provides a matrix illustrating the information available by the type of energy-efficiency services offered and Section Two presents information on available services in an alphabetized list by the organization name.

Not Available

1988-11-30T23:59:59.000Z

402

Personnel involved in nuclear standards development: 1980 directory  

Science Conference Proceedings (OSTI)

The development of nuclear standards is an active and necessary endeavor that is concerned with the safe, orderly, and economic development of nuclear potential. There are almost 4100 people from the teachnical community who are presently involved either in writing nuclear standards, including codes, or in the management and processing roles necessary for their approval and promulgation. This document identifies the current participation of each individual as member, chairman, cochairman (vice-chairman), or secretary of about 700 standards development committees and groups. The standards committees and groups are identified with the organizations that are responsible for the preparation, review, and maintenance of the standards and that provide support through supervisory committees and headquarters staff. This directory includes four major sections: personnel, employers, committees, and a Key-Word-in-Context (KWIC) Index of committee titles. It can also be used to identify the participation of employers as well as to recognize the contributions of individuals to the often interdisciplinary activity of standards development.

Carr, S.J. (ed.)

1980-03-01T23:59:59.000Z

403

Directory of Service and Product Providers | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory of Service and Product Providers Directory of Service and Product Providers Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories

404

Data sources directory for purchasing officials: Energy-efficient and environmentally preferred products  

Science Conference Proceedings (OSTI)

This Directory, produced by the New York State Energy Research and Development Authority, is an introduction to organizations that provide information about energy-efficient and environmentally preferred equipment and products. It is intended to be a reference tool for purchasing officials in the public and private sectors. The New York State Energy Research and Development Authority does not endorse any particular vendor, organization, or technology. This list was prepared to provide information. The companies listed may provide additional products and/or services not mentioned in this directory.

NONE

1995-09-01T23:59:59.000Z

405

Web directories as a knowledge base to build a multi-agent system for information sharing  

Science Conference Proceedings (OSTI)

A neural based multi-agent system, exploiting the Web Directories as a Knowledge Base for information sharing and documents retrieval, is presented. The system is based on the E?Net architecture, a neural network capable of learning the activation ...

Giovanni Pilato; Salvatore Vitabile; Giorgio Vassallo; Vincenzo Conti; Filippo Sorbello

2004-12-01T23:59:59.000Z

406

Pipeline and Gas Journal`s 1998 annual pipeline directory and equipment guide  

Science Conference Proceedings (OSTI)

The tables provide information on line pipe sizes, walls, grades, and manufacturing processes. Data are presented by manufacturer within each country. Also tabulated are engineering and construction service companies, crude oil pipeline companies, products pipeline companies, natural gas pipeline companies, gas distribution companies, and municipal gas systems in the US. There is also a Canadian and an international directory.

NONE

1998-09-01T23:59:59.000Z

407

A Flaw Tolerance Approach to Address Reactor Vessel Head Penetration Cracking Issue  

SciTech Connect

Nickel-based alloys and the associated welds are susceptible to Primary Water Stress Corrosion Cracking. In Pressurized Water Reactor nuclear power plants, the reactor vessel closure head upper penetration nozzles used for the Control Rod Drive Mechanisms and other instrumentation systems are made of such nickel-based alloys. Cracking and leakage have been observed in the upper head penetration nozzles in nuclear power plants worldwide. Such cracking and the resulting leakage is a degradation of the reactor vessel pressure boundary. Regulatory requirements have been issued by the Nuclear Regulatory Commission regarding periodic inspection of the susceptible areas to enable detection of indications and provide reasonable assurance of continued structural integrity for reactor vessel closure head. A flaw tolerance approach has been used in the disposition of detected indications to minimize outage delays, by performing up-front fracture mechanics evaluations for the common types of indications detected in the susceptible areas. Details of the flaw tolerance approach are presented in this paper. (authors)

Ng, C. K.; Jirawongkraisorn, S.; Swamy, S. [Westinghouse Electric Company, LLC, Nuclear Services Division, P. O. Box 158, Madison, PA 15663 (United States)

2006-07-01T23:59:59.000Z

408

Serious Flaws in Korf et al.'s Analysis on Time Complexity of A*  

E-Print Network (OSTI)

Understanding the effect of a heuristic on the time complexity of the well-known A* search algorithm has been a subject of a large research body in AI. Among those researches is Korf et al.'s analysis (Korf & Reid, 1998; Korf et al., 2001; Korf, 2000a; Korf, 2000b), which concluded that the effect of a heuristic is to reduce the effective depth rather than effective branching factor. Since this conclusion conflicts with both previous analysis and recent analysis by other authors, we try to investigate the causes of such contradictions and finally find out that Korf et al.'s analysis has many serious flaws from which their main conclusion was drawn.

Dinh, Hang

2008-01-01T23:59:59.000Z

409

Environmental cleanup privatization, products and services directory, January 1997. Second edition  

Science Conference Proceedings (OSTI)

The US Department of Energy has undertaken an ambitious ``Ten Year Plan`` for the Weapons Complex, an initiative to complete cleanup at most nuclear sites within a decade. This Second Edition of the Directory is designed to facilitate privatization which is key to the success of the Plan. The Directory is patterned after the telephone Yellow Pages. Like the Yellow Pages, it provides the user with points of contact for inquiring further into the capabilities of the listed companies. This edition retains the original format of three major sections under the broad headings: Treatment, Characterization, and Extraction/Deliver/Materials Handling. Within each section, companies are listed alphabetically. Also, ``company name`` and ``process type`` indices are provided at the beginning of each section to allow the user quick access to listings of particular interest.

NONE

1997-01-01T23:59:59.000Z

410

U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site 7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks December 22, 2011 - 8:15am Addthis PROBLEM: WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks PLATFORM: WebSVN 2.3.0 and prior versions ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1026438 WebSVN version update WebSVN News IMPACT ASSESSMENT: Medium Discussion: The getLog() function does not properly filter HTML code from user-supplied

411

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7, 2011 7, 2011 U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. October 6, 2011 U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers A remote user can access internal servers. October 5, 2011 U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. October 4, 2011 U-003:RPM Package Manager security update RPM Package Manager Header Validation Flaws Let Remote Users Execute

412

Directory of Federal Agencies and University Research Centers conducting R&D in Environmental and Waste Management  

Science Conference Proceedings (OSTI)

In October 1990 PAR Enterprises, Incorporated was awarded a contract by the Department of Energy to conduct a survey and prepare a Directory of Federal Agencies and University Research Centers involved in environmental restoration and waste management research and development. To conduct the survey and organize the Directory, data from 50 Federal agencies and 100 universities was collected, evaluated and summarized. The purpose of the survey and Directory is to describe the activities and provide a reference base of Federal Agencies and University Research Cantors involved in environmental restoration and waste management research and development. The Directory contains (1) the Foreword, (2) an Introduction, (3) a Description of the Survey Organization and Research Approach, (4) the EM/OTD Key Word Networks, (5) a series of matrices that show the relationship between the OTD technical requirements and the Federal Agency/University EM capabilities, (6) the Federal Agency and University Research Center EM R&D Capabilities Profiles, (7) a Glossary, and (8) an Appendix that describes the EM activities of the DOE National Laboratories and related research facilities. The survey and Directory was prepared for the Office of Technology Development (OTD), a major R&D component of DOE`s Office of Environmental Restoration and Waste Management.

Not Available

1991-12-01T23:59:59.000Z

413

On Traversable Lorentzian Wormholes in the Vacuum Low Energy Effective String Theory in Einstein and Jordan Frames  

E-Print Network (OSTI)

Three new classes (II-IV) of solutions of the vacuum low energy effective string theory in four dimensions are derived. Wormhole solutions are investigated in those solutions including the class I case both in the Einstein and in the Jordan (string) frame. It turns out that, of the eight classes of solutions investigated (four in the Einstein frame and four in the corresponding string frame), massive Lorentzian traversable wormholes exist in five classes. Nontrivial massless limit exists only in class I Einstein frame solution while none at all exists in the string frame. An investigation of test scalar charge motion in the class I solution in the two frames is carried out by using the Plebanski-Sawicki theorem. A curious consequence is that the motion around the extremal zero (Keplerian) mass configuration leads, as a result of scalar-scalar interaction, to a new hypothetical "mass" that confines test scalar charges in bound orbits, but does not interact with neutral test particles.

K. K. Nandi; Yuan-Zhong Zhang

2004-05-10T23:59:59.000Z

414

HYDROGEN EFFECTS ON THE BURST PROPERTIES OF TYPE 304L STAINLESS STEEL FLAWED VESSELS  

DOE Green Energy (OSTI)

The effect of hydrogen on the burst properties Type 304L stainless steel vessels was investigated. The purpose of the study was to compare the burst properties of hydrogen-exposed stainless steel vessels burst with different media: water, helium gas, or deuterium gas. A second purpose of the tests was to provide data for the development of a predictive finite-element model. The burst tests were conducted on hydrogen-exposed and unexposed axially-flawed cylindrical vessels. The results indicate that samples burst pneumatically had lower volume ductility than those tested hydraulically. Deuterium gas tests had slightly lower ductility than helium gas tests. Burst pressures were not affected by burst media. Hydrogen-charged samples had lower volume ductility and slightly higher burst pressures than uncharged samples. Samples burst with deuterium gas fractured by quasi-cleavage near the inside wall. The results of the tests were used to improve a previously developed predictive finite-element model. The results show that predicting burst behavior requires as a material input the effect of hydrogen on the plastic strain to fracture from tensile tests. The burst test model shows that a reduction in the plastic strain to fracture of the material will result in lower volume ductility without a reduction in burst pressure which is in agreement with the burst results.

Morgan, M; Monica Hall, M; Ps Lam, P; Dean Thompson, D

2008-03-27T23:59:59.000Z

415

Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system  

DOE Patents (OSTI)

A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

Thompson, Donald O. (Ames, IA); Wormley, Samuel J. (Ames, IA)

1989-03-28T23:59:59.000Z

416

BWRVIP-18, Revision 1-A: BWR Vessel and Internals Project, BWR Core Spray Internals Inspection and Flaw Evaluation Guidelines  

Science Conference Proceedings (OSTI)

The Boiling Water Reactor Vessel and Internals Project (BWRVIP), formed in June 1994, is an association of utilities focused exclusively on boiling water reactor (BWR) vessel and internals issues. This BWRVIP report contains generic guidelines that describe locations on the core spray piping and spargers for which inspection is needed, categories of plants for which inspection needs would differ, extent of inspection and reinspection for each location, and flaw evaluation procedures to determine ...

2012-04-09T23:59:59.000Z

417

ADS-Directory Services for Mobile Ad-Hoc Networks Based on an Information Market Model  

E-Print Network (OSTI)

Ubiquitous computing based on small mobile devices using wireless communication links is becoming very attractive. The computational power and storage capacities provided allow the execution of sophisticated applications. Due to the fact that sharing of information is a central problem for distributed applications, the development of self organizing middleware services providing high level interfaces for information managing is essential. ADS is a directory service for mobile ad-hoc networks dealing with local and nearby information as well as providing access to distant information. The approach discussed throughout this paper is based upon the concept of information markets.

Hutter, Christian; Rothkugel, Steffen

2007-01-01T23:59:59.000Z

418

Directory of Certificates of Compliance for radioactive materials packages: Certificates of Compliance. Volume 2, Revision 18  

Science Conference Proceedings (OSTI)

The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. An alphabetical listing by user name is included in the back of Volume 3 of approved QA programs. The reports include a listing of all users of each package design and approved QA programs prior to the publication date.

NONE

1995-10-01T23:59:59.000Z

419

Directory of Solar Energy Research Activities in the United States: First Edition, May 1980. [1220 projects  

DOE Green Energy (OSTI)

Information covering 1220, FY 1978 and FY 1979 solar energy research projects is included. In addition to the title and text of project summaries, the directory contains the following indexes: subject index, investigator index, performing organization index, and supporting organization index. This information was registered with the Smithsonian Science Information Exchange by Federal, State, and other supporting organizations. The project summaries are categorized in the following areas: biomass, ocean energy, wind energy,photovoltaics, photochemical energy conversion, photobiological energy conversion, solar heating and cooling, solar process heat, solar collectors and concentrators, solar thermal electric generation, and other solar energy conversion. (WHK)

None

1980-05-01T23:59:59.000Z

420

Comparison of the results of an authorship-based expert recommender against data from a directory of experts  

Science Conference Proceedings (OSTI)

Expert recommender systems have been introduced and implemented in various ways. But due to legal issues, the special nature of human-bound knowledge and lack of acceptance by the staff only few case studies and even less evaluations in real world scenarios ... Keywords: Directory of Experts, Document Metadata, Empirical Evaluation, Expert Recommender System, Field Data Set, Knowledge Discovery, Knowledge Map, Yellow Pages

Wilko Kraß, Ulrich Försterling

2013-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Directory of Points of Contact for the DOE Technical Standard Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-2002 2-2002 August 2002 Supersedes DOE-TSL-2-98 January 1998 DOE TECHNICAL STANDARDS LIST DIRECTORY OF POINTS OF CONTACT FOR THE DOE TECHNICAL STANDARDS PROGRAM U.S. Department of Energy AREA SDMP Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. TS NOT MEASUREMENT SENSITIVE DOE-TSL-2-2002 August 2002 Supersedes DOE-TSL-2-98 January 1998 DOE TECHNICAL STANDARDS LIST

422

Directory of energy data collection forms: Forms in use as of October 1994  

SciTech Connect

This 18th edition directory provides an overview of DOE`s energy information collection programs for decisionmakers in Government and industry; selected public use forms currently used as basic energy information gathering tools by DOE are covered. For each form, an abstract is included that describes the form`s uses, its respondents, and the data collected. Also shown are frequently requested items: energy sources and functions covered by the form, general categories of respondents, collection frequency, public laws and regulations, reporting requirement, name and phone number of the data collection manager, and the publications resulting from the data collection. Indexes, arranged according to energy source/function, publications, respondent categories, former EIA form number designations, and collection authorities, are provided.

Not Available

1994-12-15T23:59:59.000Z

423

Case study analysis of the legal and institutional obstacles and incentives to the development of the hydroelectric power of the Boardman River at Traverse City, Michigan  

SciTech Connect

An analytic description of one decision-making process concerning whether or not to develop the hydroelectric potential of the Boardman River is presented. The focus of the analysis is on the factor that the developers considered, or should consider in making a responsible commitment to small-scale hydroelectric development. Development of the Boardman River would occur at the five dam sites. Two existing dams, owned by the county, previously generated hydroelectricity, as did a third before being washed out. One dam has never been utilized. It is owned by the city which also owns the washed-out area. The study concludes that hydroelectric power is feasible at each. Grand Traverse County and Traverse City would engage in a joint venture in developing the resource. Chapter I presents a detailed description of the developers, the river resource, and the contemplated development. Chapter II is an analysis of the factors affecting the decision making process. Chapter III summarizes the impact of the more significant barriers and incentives and presents recommendations that, if implemented, will favorably affect decisions to develop small-scale hydroelectric generation capability.

1980-05-01T23:59:59.000Z

424

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2012 28, 2012 U-246: Tigase XMPP Dialback Protection Bypass Vulnerability A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions. August 27, 2012 U-245: Critical Java 0-day flaw exploited Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines August 27, 2012 U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks Several vulnerabilities were reported in McAfee Email Gateway. August 24, 2012 U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service A vulnerability was reported in libvirt. August 23, 2012 U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local

425

NCO Directory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

307-233-4851 Department of Energy Rocky Mountain Oilfield Testing Center 907 North Poplar, Ste 150 Casper, WY 82601 RMOTC Katherine Batiste katherine.batiste@spr.doe.gov...

426

Exhibition Directory  

Science Conference Proceedings (OSTI)

Feb 13, 2005 ... questions concerning our products and services. ALTECH SMV Ltd ..... our bestseller CRC Materials Science and Engineering Handbook,. 3rd Edition. ...... Professional and determination are the fundamentals which sustain.

427

Exhibition Directory  

Science Conference Proceedings (OSTI)

Feb 7, 2008 ... Fundamentals ..... ing ASM Handbooks Online, ASM Alloy Center and the Al- ..... sales engineers to answer any questions you may have.

428

Staff Directory  

Science Conference Proceedings (OSTI)

... 3866. Miller, Bruce R. GB, 771, (301) 975-2708. Mills, Kevin L. GB, 772, (301) 975-3618. Mink, Alan, GB, 771, (301) 975-5681. ...

2010-12-16T23:59:59.000Z

429

Exhibition Directory  

Science Conference Proceedings (OSTI)

Feb 2, 2007 ... enterprise.under.the.direct.leadership.of.China's.Central.Government. ... per,. Chinalco.and.Chalco.are.proud.of.their.outstanding.management. ...... prove.the. performance.of.your.existing.assets..This.creates.value.

430

Exhibit Directory  

Science Conference Proceedings (OSTI)

Mar 3, 2013 ... ondary Casthouses incl. charging management, target alloy calculation and ... Kempe is the largest provider of asset and maintenance services in the ..... As a China leading enterprise engaged in general contracting of ...

431

Phone Directory  

Science Conference Proceedings (OSTI)

... 6052 497 7259 R/GSD2 NOAA-2B406 Lee.M.Cohen ... Dalke, Roger 497 3109 497 3680 ITS.T 1-3447 ... Davis, Darien L. 497 6347 497 6821 R/GSD ...

2013-12-27T23:59:59.000Z

432

JC3 High Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

high-impact-assessment-bulletins high-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities http://energy.gov/cio/articles/v-215-networkminer-directory-traversal-and-insecure-library-loading-vulnerabilities directory-traversal-and-insecure-library-loading-vulnerabilities" class="title-link">V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities

433

Directory of Certificates of Compliance for radioactive materials packages: Report of NRC approved packages. Volume 1, Revision 18  

SciTech Connect

The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. An alphabetical listing by user name is included in the back of Volume 3 of approved QA programs. The reports include a listing of all users of each package design and approved QA programs prior to the publication date.

NONE

1995-10-01T23:59:59.000Z

434

Progress in evaluation and improvement in nondestructive examination reliability for inservice inspection of Light Water Reactors (LWRs) and characterize fabrication flaws in reactor pressure vessels  

Science Conference Proceedings (OSTI)

This paper is a review of the work conducted under two programs. One (NDE Reliability Program) is a multi-year program addressing the reliability of nondestructive evaluation (NDE) for the inservice inspection (ISI) of light water reactor components. This program examines the reliability of current NDE, the effectiveness of evolving technologies, and provides assessments and recommendations to ensure that the NDE is applied at the right time, in the right place with sufficient effectiveness that defects of importance to structural integrity will be reliably detected and accurately characterized. The second program (Characterizing Fabrication Flaws in Reactor Pressure Vessels) is assembling a data base to quantify the distribution of fabrication flaws that exist in US nuclear reactor pressure vessels with respect to density, size, type, and location. These programs will be discussed as two separate sections in this report. 4 refs., 7 figs.

Doctor, S.R.; Bowey, R.E.; Good, M.S.; Friley, J.R.; Kurtz, R.J.; Simonen, F.A.; Taylor, T.T.; Heasler, P.G.; Andersen, E.S.; Diaz, A.A.; Greenwood, M.S.; Hockey, R.L.; Schuster, G.J.; Spanner, J.C.; Vo, T.V.

1991-10-01T23:59:59.000Z

435

Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material  

DOE Patents (OSTI)

Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

1999-07-20T23:59:59.000Z

436

Materials Reliability Program: Advanced FEA Evaluation of Growth of Postulated Circumferential PWSCC Flaws in Pressurizer Nozzle Dis similar Metal Welds (MRP-216, Rev. 1)  

Science Conference Proceedings (OSTI)

Indications of circumferential flaws in the pressurizer nozzles at Wolf Creek raised questions about the need to accelerate refueling outages or take mid-cycle outages at other plants. This study demonstrates the viability of leak detection as a means to preclude the potential for rupture for the pressurizer nozzle dissimilar metal (DM) welds in a group of nine PWRs originally scheduled to perform performance demonstration initiative (PDI) inspection or mitigation during the spring 2008 outage season. Mo...

2007-08-10T23:59:59.000Z

437

Materials Reliability Program: Advanced FEA Evaluation of Growth of Postulated Circumferential PWSCC Flaws in Pressurizer Nozzle Dis similar Metal Welds (MRP-216)  

Science Conference Proceedings (OSTI)

Indications of circumferential flaws in the pressurizer nozzles at Wolf Creek raised questions about the need to accelerate refueling outages or take mid-cycle outages at other plants. This study demonstrates the viability of leak detection as a means to preclude the potential for rupture for the pressurizer nozzle dissimilar metal (DM) welds in a group of nine PWRs originally scheduled to perform performance demonstration initiative (PDI) inspection or mitigation during the spring 2008 outage season. Mo...

2007-08-02T23:59:59.000Z

438

DOE Technical Standards List: Directory of DOE and Contractor Personnel Involved in Non-Government Standards Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4-99 4-99 May 1999 Superseding DOE-TSL-4-98 May 1998 DOE TECHNICAL STANDARDS LIST DIRECTORY OF DOE AND CONTRACTOR PERSONNEL INVOLVED IN NON- GOVERNMENT STANDARDS ACTIVITIES U.S. Department of Energy AREA SDMP Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. DOE-TSL-4-99 iii 1. GENERAL GUIDANCE 1.1 Purpose. Public Law (PL) 104-113 [15 USC 272(b), March 7, 1996], The

440

The directory of United States coal & technology export resources. Profiles of domestic US corporations, associations and public entities, nationwide, which offer products or services suitable for export, relating to coal and its utilization  

SciTech Connect

The purpose of this directory is to provide a listing of available U.S. coal and coal related resources to potential purchasers of those resources abroad. The directory lists business entities within the US which offer coal related resources, products and services for sale on the international market. Each listing is intended to describe the particular business niche or range of product and/or services offered by a particular company. The listing provides addresses, telephones, and telex/fax for key staff in each company committed to the facilitation of international trade. The content of each listing has been formulated especially for this directory and reflects data current as of the date of this edition. The directory listings are divided into four primary classifications: coal resources; technology resources; support services; and financing and resource packaging. The first three of which are subdivided as follows: Coal Resources -- coal derivatives, coal exporters, and coal mining; Technology Resources -- advanced utilization, architects and engineers, boiler equipment, emissions control and waste disposal systems, facility construction, mining equipment, power generation systems, technical publications, and transport equipment; Support Services -- coal transport, facility operations, freight forwarders, sampling services and equipment, and technical consultants. Listings for the directory were solicited on the basis of this industry breakdown. Each of the four sections of this directory begins with a matrix illustrating which companies fall within the particular subclassifications specific to that main classification. A general alphabetical index of companies and an index by product/service classification are provided following the last section of the directory.

Not Available

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 26, 2011 April 26, 2011 T-610: Red Hat kdenetwork security update A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. April 25, 2011 T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user. April 22, 2011 T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to

442

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 17, 2011 June 17, 2011 T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. June 16, 2011 T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could infect their systems after visiting a malicious

443

Article DirectoryArticle Directory Free Online Article Directory  

E-Print Network (OSTI)

, As Much As 9 Pounds Per Week in 2 Simple Steps. GE Gas Turbines ecomagination.com/GE_Gas_Turbines GE heavy duty gas turbine consumes less fuel and emit lower emissions. Free Weight Loss Seminar www

444

Directory of Certificates of Compliance for radioactive materials packages: Report of NRC approved quality assurance programs for radioactive materials packages. Volume 3, Revision 15  

SciTech Connect

The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. An alphabetical listing by user name is included in the back of Volume 3 of approved QA programs. The reports include a listing of all users of each package design and approved QA programs prior to the publication date.

NONE

1995-10-01T23:59:59.000Z

445

Energy directory of researchers in Great Plains/Great Basin area (Arizona, Colorado, Montana, Nebraska, Nevada, New Mexico, North Dakota, South Dakota, Utah, Wyoming)  

SciTech Connect

The directory lists in Part 1 names of researchers involved in energy R and D in Arizona, Colorado, Montana, Nebraska, Nevada, New Mexico, North Dakota, South Dakota, Utah, and Wyoming by category. Within each category each researcher is given with his phone number when known, his affiliation, the title of his research, and publication information. These categories are listed and defined in ERDA Energy Information Data Base: Subject Categories, TID-4584-R2 (May 1977). In Part 2 the principal investigators are arranged by the state (two-letter state abbreviation) in which the research is performed. Researchers are alphabetically listed by the first author. If research on a project is performed in more than one state, the abbreviations for all the states involved will appear with the names of the project's principal investigators listed below. Indexes included are an investigator index, a research institute index, and a location index.

Caton, G.M.; Michelson, D.C.; Danford, G.S.; Frogge, L.M. (comps.)

1977-10-01T23:59:59.000Z

446

Energy directory of organizations and researchers in Great Plains/Great Basin area (Arizona, Colorado, Montana, Nebraska, Nevada, New Mexico, North Dakota, South Dakota, Utah, Wyoming)  

SciTech Connect

The directory lists research institutes and researchers involved in energy R and D in Arizona, Colorado, Montana, Nebraska, Nevada, New Mexico, North Dakota, South Dakota, Utah, and Wyoming. The first section of this publication, Organizations and Researchers, lists the names of colleges and organizations which are involved in energy R and D in these ten western states. The name of the organization is arranged in alphabetical order and printed below each organization are the name(s) of the researchers in the organization, their phone numbers if known, and the titles of their research projects. Section 2, Research Organizations by State, lists the research organizations performing energy R and D within each of the ten states mentioned. The alphabetical arrangement is first by state and then by research organization.

Caton, G.M.; Michelson, D.C.; Danford, G.S.; Frogge, L.M. (comps.)

1977-10-01T23:59:59.000Z

447

In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements  

SciTech Connect

Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), “Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events,” adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, §50.61a, published on January 4, 2010, entitled “Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events” (75 FR 13). Use of the new rule by licensees is optional. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensee’s reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with §50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in §50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

2012-09-17T23:59:59.000Z

448

Case study of the propagation of a small flaw under PWR loading conditions and comparison with the ASME code design life. Comparison of ASME Code Sections III and XI  

SciTech Connect

A cooperative study was performed by EG and G Idaho, Inc., and Oak Ridge National Laboratory to investigate the degree of conservatism and consistency in the ASME Boiler and Pressure Vessel Code Section III fatigue evaluation procedure and Section XI flaw acceptance standards. A single, realistic, sample problem was analyzed to determine the significance of certain points of criticism made of an earlier parametric study by staff members of the Division of Engineering Standards of the Nuclear Regulatory Commission. The problem was based on a semielliptical flaw located on the inside surface of the hot-leg piping at the reactor vessel safe-end weld for the Zion 1 pressurized-water reactor (PWR). Two main criteria were used in selecting the problem; first, it should be a straight pipe to minimize the computational expense; second, it should exhibit as high a cumulative usage factor as possible. Although the problem selected has one of the highest cumulative usage factors of any straight pipe in the primary system of PWRs, it is still very low. The Code Section III fatigue usage factor was only 0.00046, assuming it was in the as-welded condition, and fatigue crack-growth analyses predicted negligible crack growth during the 40-year design life. When the analyses were extended past the design life, the usage factor was less than 1.0 when the flaw had propagated to failure. The current study shows that the criticism of the earlier report should not detract from the conclusion that if a component experiences a high level of cyclic stress corresponding to a fatigue usage factor near 1.0, very small cracks can propagate to unacceptable sizes.

Yahr, G.T.; Gwaltney, R.C.; Richardson, A.K.; Server, W.L.

1986-01-01T23:59:59.000Z

449

Traverse Electric Coop, Inc | Open Energy Information  

Open Energy Info (EERE)

Minnesota Minnesota Utility Id 19060 Utility Location Yes Ownership C NERC Location MRO NERC MRO Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png 5/7 Interruptible Service Industrial General Service - Single Phase Commercial Heat Storage - Single Phase Commercial Interruptible Heating Service Commercial Irrigation Industrial Large Power Industrial Multi-Phase and Large Single Phase Industrial Residential Controlled Demand Residential Seasonal Service - Single Phase Commercial Seasonal Service - Town Halls Commercial Special Electric Heat Residential

450

Simplified Parallel Domain Traversal Wesley Kendall  

E-Print Network (OSTI)

Tube Twitter Sensors Fixed Mobile SNS .05 PB OLCF 14 PB 10n EB >10n EB #12;Focus in Knowledge Discovery 6

Tennessee, University of

451

Simplified Parallel Domain Traversal Wesley Kendall  

E-Print Network (OSTI)

architecture [9] Jaguar is the primary system in the ORNL Leadership Computing Facility (OLCF) [9]. It consists

Tennessee, University of

452

Gas Metrology - Staff Directory  

Science Conference Proceedings (OSTI)

... Group. Search for Staff Member. The Search box will accept a name, phone number, organization name, email address, etc.

2013-08-15T23:59:59.000Z

453

NIST PML Staff Directory  

Science Conference Proceedings (OSTI)

Physical Measurement Laboratory. Browse Staff By Organization. Physical Measurement Laboratory Office. Office of Weights and Measures. ...

2012-03-16T23:59:59.000Z

454

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

DRI Model of the U.S. Economy. Ron Earley (202) 586-1398. World Oil Refining, Logistics, and Demand Model. Dan Butler (202) 586-9503 ...

455

Energy Information Directory 1999  

U.S. Energy Information Administration (EIA)

166 Argonne National Laboratory ... and renewable energy technologies in the four sectors of the assigned geographical areas; to provide EE information on

456

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

Canadian Petroleum Association Statistical Handbook Historical Canadian supply and consumption data Mineral Management Service, Federal ...

457

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

WEPS is an integrated set of personal, computer-based spreadsheets containing data compilations, assumption specifications, descriptive analysis ...

458

Exhibit & Sponsor Directory  

Science Conference Proceedings (OSTI)

May 23, 2010 ... components are used in fiber optic communication systems, wireless and ... storage devices, computing, signalling and lighting, as well as a.

459

Tools & Resources: Resource Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

that reduce air emissions. Emissions & Generation Resource Integrated Database (eGRID) A tool that provides data on the environmental characteristics of almost all electric...

460

JOM Technical Directory  

Science Conference Proceedings (OSTI)

Company Description: Leading International manufactrer, fabricator of Precious Metal Labware, Wire, Foil, Sputtering Targets and Evap. Materials. USA office: ...

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

The Personal Computer International Nuclear Model (PCINM) is a deterministic model used by the Energy Information Administration (EIA) to project ...

462

JOM Technical Directory - TMS  

Science Conference Proceedings (OSTI)

59 records ... Institute for Plasma Research Division - FCIPT, B-15-17/P, GIDC, Electronics zone, Sector 25. Gandhinagar, Gujarat 382044 India, Telephone: ...

463

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

... National Climatic Data Center, State, Regional, and National Monthly and Annual Precipitation Weighted by Area for the Contiguous United States, January ...

464

JOM Technical Directory - TMS  

Science Conference Proceedings (OSTI)

93 records ... Institute for Plasma Research Division - FCIPT, B-15-17/P, GIDC, Electronics zone, Sector 25. Gandhinagar, Gujarat 382044 India, Telephone: ...

465

JOM Technical Directory  

Science Conference Proceedings (OSTI)

38 records ... Struers Inc. 24766 Detroit Road Westlake, OH 44145 USA, Telephone: 440-871- 0071. Toll Free: 800-321-5834. Fax: 440-871-8188 ...

466

JOM Technical Directory  

Science Conference Proceedings (OSTI)

24766 Detroit Road • Westlake, OH 44145 • USA. Telephone: 440-871-0071. E- Mail: info@struers.com. Toll Free: 800-321-5834, Web Site: www.struers.com.

467

BNL | CFN Staff Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Staff List Name CFN Affiliation Al-Mahboob, Abdullah Interface Sciences Catalysis Bhatia, Surita Soft Bio Nanomaterials Black, Chuck Electronic Materials: Nanofabrication...

468

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

For the remainder of the projection period, SNAPPS uses average, full-cycle capacity factors, which ... (BWR or PWR) and fuel cycle (1st, 2nd, or equilibrium).

469

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

UMM94 — Archived for World Nuclear Capacity and Fuel Cycle Requirements; UMM95 — Archived for World Nuclear Outlook 1995;

470

Smart Grid Staff Directory  

Science Conference Proceedings (OSTI)

... Jeffery Mazer, Project Manager, 301-975-2617. Cuong Nguyen, Project Manager, 301-975-2254. Tom Nelson, Project Manager, 301-975-2986. ...

2012-12-18T23:59:59.000Z

471

Nanoelectronics Group Staff Directory  

Science Conference Proceedings (OSTI)

... Oleg A. Kirillov, Electrical Engineer, 301-975-2087. Dr. Nhan V. Nguyen, Physicist, 301-975-2044. Sujitra Pookpanratana, Physicist, 301-975-2082. ...

2013-04-25T23:59:59.000Z

472

Cyclotomic Solver Directory - CECM  

E-Print Network (OSTI)

sys225.txt Maple code for a 225 by 225 system with fifth roots of unity. SampleRun.txt Example of how to run the code on the above systems. VahidsSystems.zip ...

473

JOM Technical Directory - TMS  

Science Conference Proceedings (OSTI)

38 records ... Institute for Plasma Research Division - FCIPT, B-15-17/P, GIDC, Electronics zone, Sector 25. Gandhinagar, Gujarat 382044 India, Telephone: ...

474

JOM Technical Directory - TMS  

Science Conference Proceedings (OSTI)

47 records ... Institute for Plasma Research Division - FCIPT, B-15-17/P, GIDC, Electronics zone, Sector 25. Gandhinagar, Gujarat 382044 India, Telephone: ...

475

2002 EIA Models Directory  

U.S. Energy Information Administration (EIA)

Generation sources (fuels used in power production) identified in STIFS are coal, petroleum, natural gas, nuclear ... including wind and solar, wood and waste, ...

476

JOM Technical Directory - TMS  

Science Conference Proceedings (OSTI)

In addition, SAFER Systems provides GIS maps, receptor databases and topographical databases for the geographical region. Every second counts in the

477

EIA Publications Directory 1999  

U.S. Energy Information Administration (EIA)

(E-Mail) addresses. In the back of the book there is a subject index cross-referenced by number to the alphabetical entries.

478

JOM Technical Directory - TMS  

Science Conference Proceedings (OSTI)

22 records ... Institute for Plasma Research Division - FCIPT, B-15-17/P, GIDC, Electronics zone, Sector 25. Gandhinagar, Gujarat 382044 India, Telephone: ...

479

ALS Beamlines Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Parameters, Contact Information, and Schedules Download a high-resolution version of the ALS Beamclock. See Beamclock to view the ALS energy-related beamlines beamclock. Beamline...

480

Pre-Show Directory  

Science Conference Proceedings (OSTI)

specialties for use in carbon bake and cast house areas for fuel efficiency, safety ... only U.S. Department of Energy laboratory devoted to fossil energy research.

Note: This page contains sample records for the topic "directory traversal flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

JOM Technical Directory  

Science Conference Proceedings (OSTI)

2175 Solar Crescent • Oldcastle, ON N0R 1L0 • Canada ... components, small bore residual stress measurement, global patents, licensing inquires welcome.

482

EIA Publications Directory  

Reports and Publications (EIA)

Contains titles and abstracts of periodicals and one time reports produced by EIA from January 2000 through December 2001.

Information Center

2002-07-01T23:59:59.000Z

483

JOM Technical Directory - TMS  

Science Conference Proceedings (OSTI)

42 records ... Institute for Plasma Research Division - FCIPT, B-15-17/P, GIDC, Electronics zone, Sector 25. Gandhinagar, Gujarat 382044 India, Telephone: ...

484

Exhibit Show Directory  

Science Conference Proceedings (OSTI)

Mar 4, 2003 ... Flux/Gas Injectors (RFI/RGI); Degassers including the Alcan Com- pact inline Degasser (ACD); ... and Natural bone ash products will be described. Application methods and .... worldwide including Russia. Equipment includes ...

485

Engineering Laboratory Staff Directory  

Science Conference Proceedings (OSTI)

... Smart Grid Program Office (730.04). ... Dave Wollman, Deputy Director of the Smart Grid and Cyber-Physical Systems Program Office, 301-975-2433. ...

2013-11-04T23:59:59.000Z

486

FACDIS FACULTY DIRECTORY Directory Prepared and Distributed by FACDIS  

E-Print Network (OSTI)

and monolithic Si3N4 to actual and simulated combustion environments (e.g., engine tests at Solar TurbinesN was conducted employing SOLGASMIX-PV. Deposition phase diagrams were calculated for gas mixtures containing, P. J. Maziasz, and B. A. Pint J. P. Montague, Solar Turbines, Inc. San Diego, CA INTRODUCTION Basic

Mohaghegh, Shahab

487

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

488

Directory of Organizations October 2009  

E-Print Network (OSTI)

..................................................14 WASHINGTON DEPARTMENT OF FISH & WILDLIFE ..................................................................................................................19 WASHINGTON DEPARTMENT OF HEALTH .......................................................................................................................20 WASHINGTON ENERGY FACILITY SITE EVALUATION COUNCIL

489

Systems Integration Division Staff Directory  

Science Conference Proceedings (OSTI)

... Scientist, 301-975-2720. Search for a Staff Member. The search box accepts a name, organizational name, or e-mail address. ...

2013-12-30T23:59:59.000Z

490

Biomolecular Measurement Division Staff Directory  

Science Conference Proceedings (OSTI)

... Search For a Staff Member. The Search box will accept a name, phone number, organization name, email address, etc. ...

2013-12-05T23:59:59.000Z

491

Organic Chemical Metrology - Staff Directory  

Science Conference Proceedings (OSTI)

... Group. Search for Staff Member. The Search box will accept a name, phone number, organization name, email address, etc.

2013-06-06T23:59:59.000Z

492

Chemical Process Measurements - Staff Directory  

Science Conference Proceedings (OSTI)

... Group. Search for Staff Member. The Search box will accept a name, phone number, organization name, email address, etc.

2012-11-06T23:59:59.000Z

493

Inorganic Chemical Metrology - Staff Directory  

Science Conference Proceedings (OSTI)

... Group. Search for Staff Member. The Search box will accept a name, phone number, organization name, email address, etc.

2012-11-16T23:59:59.000Z

494

Research Facilities Operation Staff Directory  

Science Conference Proceedings (OSTI)

... Andrew Malone, 301-975-6671. Kevin Pritchard, 301-975-4727. Thuan Thai, 301-975-6460. Peter Tsai, 301-975-3368. Jeffery Ziegler, 301-975-4732 ...

2013-04-01T23:59:59.000Z

495

Fire Research Division Staff Directory  

Science Conference Proceedings (OSTI)

Fire Research Division Staff. Fire Research Division Office (733). ... Dr. Rick Davis, Leader, Supervisory Materials Research Engineer, 301-975-5901. ...

2013-08-01T23:59:59.000Z

496

Chemical Informatics Research - Staff Directory  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Chemical Informatics Research Group. William E. Wallace III (Group Leader) Laurell R. Phillips (Office ...

2013-08-29T23:59:59.000Z

497

STAFF DIRECTORY Karl Albrecht ........................................................1  

E-Print Network (OSTI)

via thermochemical processes · High throughput catalyst discovery and development · Catalyst Interests · Biochemical Conversion · Thermochemical Conversion · Microalgae Production and Processing and experimental approaches for metabolic engineering and systems biology research. His work includes simulations

498

Directory Challenge '97 Technical Report  

Science Conference Proceedings (OSTI)

... EMA Coordinators Paul Moniz and Tracy Campos WEMA Regional Coordinators Colin Robbins, NEXOR (for EEMA) Terry Brain, BHP Information ...

2007-09-25T23:59:59.000Z

499

DOE Solar Decathlon: Product Directory  

NLE Websites -- All DOE Office Websites (Extended Search)

Fixed Lighting Plug-In Lighting MechanicalHVAC Air-to-Air Heat Pump Air-to-Water Heat Pump Absorption chiller Ceiling Fans Centralized Ventilation Systems Dehumidifier...

500

Dimensional Metrology Group Staff Directory  

Science Conference Proceedings (OSTI)

... James Bowie, Group Office Manager, Secretary, 301-975-3468. Christopher Blackburn, Physical Science Technician, 301-975-6413. ...

2013-04-25T23:59:59.000Z