Powered by Deep Web Technologies
Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

2

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

3

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

4

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

5

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

6

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

7

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

8

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

9

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January...

10

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

11

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption...  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors...

12

V-087: Adobe Flash Player Two Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Two Vulnerabilities 7: Adobe Flash Player Two Vulnerabilities V-087: Adobe Flash Player Two Vulnerabilities February 8, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in Adobe Flash Player PLATFORM: Vulnerabilities are reported in the following versions: Adobe Flash Player versions 11.5.502.146 and earlier for Windows and Macintosh Adobe Flash Player versions 11.2.202.261 and earlier for Linux Adobe Flash Player versions 11.1.115.36 and earlier for Android 4.x Adobe Flash Player versions 11.1.111.31 and earlier for Android 3.x Adobe Flash Player versions 11.5.31.137 and earlier for Chrome users Adobe Flash Player versions 11.3.378.5 and earlier for Internet Explorer 10 users on Windows 8 ABSTRACT: Two vulnerabilities are reported as 0-day which can be exploited by

13

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

14

V-087: Adobe Flash Player Two Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Two Vulnerabilities 7: Adobe Flash Player Two Vulnerabilities V-087: Adobe Flash Player Two Vulnerabilities February 8, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in Adobe Flash Player PLATFORM: Vulnerabilities are reported in the following versions: Adobe Flash Player versions 11.5.502.146 and earlier for Windows and Macintosh Adobe Flash Player versions 11.2.202.261 and earlier for Linux Adobe Flash Player versions 11.1.115.36 and earlier for Android 4.x Adobe Flash Player versions 11.1.111.31 and earlier for Android 3.x Adobe Flash Player versions 11.5.31.137 and earlier for Chrome users Adobe Flash Player versions 11.3.378.5 and earlier for Internet Explorer 10 users on Windows 8 ABSTRACT: Two vulnerabilities are reported as 0-day which can be exploited by

15

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

16

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

17

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

18

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

19

T-627: Adobe Flash Player Memory Corruption | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Memory Corruption 7: Adobe Flash Player Memory Corruption T-627: Adobe Flash Player Memory Corruption May 20, 2011 - 2:50pm Addthis PROBLEM: Adobe Flash Player Memory Corruption, Denial Of Service, Execute Code PLATFORM: Windows, Mac OS X, Linux, and Solaris ABSTRACT: Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file. reference LINKS: CVE Details - CVE-2011-0627 CVE Details - Adobe Flash Player Vulnerability Statistics CVE Details - Adobe Security Vulnerabilities IMPACT ASSESSMENT: High Discussion:

20

T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File...  

Broader source: Energy.gov (indexed) [DOE]

Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

22

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

23

T-630: Security update available for Adobe Flash Player | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Security update available for Adobe Flash Player 0: Security update available for Adobe Flash Player T-630: Security update available for Adobe Flash Player May 25, 2011 - 3:35pm Addthis PROBLEM: Vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. PLATFORM: The vulnerabilities are reported in the following versions: Adobe Flash Player 10.2.159.1 and earlier for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.2.154.28 and earlier for Chrome. Adobe Flash Player 10.2.157.51 and earlier for Android. ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.2.159.1 and earlier versions (Adobe Flash Player 10.2.154.28 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, and Adobe

24

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

25

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

26

T-600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Broader source: Energy.gov (indexed) [DOE]

600: Security Advisory for Adobe Flash Player, Adobe Reader and 600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat April 12, 2011 - 5:19am Addthis PROBLEM: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat PLATFORM: A critical vulnerability exists in Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 10.2.156.12 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems. ABSTRACT: This vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports

27

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Buffer Overflows and Memory Corruption 8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code November 7, 2012 - 6:00am Addthis PROBLEM: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.4.402.287 and prior for Windows and OS X; 11.2.202.243 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-24 SecurityTracker Alert ID: 1027730 CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Adobe Flash Player. A remote user

28

T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Broader source: Energy.gov (indexed) [DOE]

7: Security Advisory for Adobe Flash Player, Adobe Reader and 7: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat March 14, 2011 - 4:05pm Addthis PROBLEM: There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment. PLATFORM: Windows, Macintosh, Linux and Solaris ABSTRACT: A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.13 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1)

29

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

30

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

31

V-102: SUSE update for flash-player | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: SUSE update for flash-player 2: SUSE update for flash-player V-102: SUSE update for flash-player March 1, 2013 - 6:00am Addthis PROBLEM: SUSE has issued an update for flash-player. PLATFORM: openSUSE 12.1 ABSTRACT: This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52416 openSUSE Adobe Security Bulletin APSB13-08 CVE-2013-0504 CVE-2013-0643 CVE-2013-0648 IMPACT ASSESSMENT: High DISCUSSION: This update resolves: 1. Permissions issue with the Flash Player Firefox sandbox. 2. Vulnerability in the ExternalInterface ActionScript feature, which can be exploited to execute malicious code. 3. Buffer overflow vulnerability in a Flash Player broker service, which can be used to execute malicious code.

32

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

33

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities August 6, 2012 - 7:00am Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions 2.0.1.358 and earlier. ABSTRACT: Vulnerabilities in Adobe Flash Player version included with the BlackBerry PlayBook tablet software reference LINKS: BlackBerry Article ID: KB31675 Secunia Advisory SA50164 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

34

T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing  

Broader source: Energy.gov (indexed) [DOE]

7: Update: Adobe Acrobat, Reader, and Flash Player SWF File 7: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability April 21, 2011 - 3:03am Addthis PROBLEM: The vulnerability is due to improper processing of Adobe Flash content. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view malicious Flash (.swf) files with the affected software. If successful, the attacker could execute arbitrary code or cause a DoS condition on the targeted system. PLATFORM: Adobe Flash Player versions prior to 10.2.153.1 for Microsoft Windows, Apple Macintosh, Linux, and Solaris systems Adobe Flash Player versions prior to 10.2.156.12 for Android systems

35

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

36

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

37

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

38

T-604: Google Chrome updated version of the Adobe Flash player | Department  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome updated version of the Adobe Flash player 4: Google Chrome updated version of the Adobe Flash player T-604: Google Chrome updated version of the Adobe Flash player April 15, 2011 - 4:30am Addthis PROBLEM: Chrome Stable and Beta channels have been updated to 10.0.648.134 for Windows, Mac, Linux and Chrome Frame PLATFORM: Windows, Mac, Linux and Chrome Frame ABSTRACT: The Chrome Stable channel has been updated to 10.0.648.205 for Windows, Mac, Linux and Chrome Frame. This release contains a new version of Adobe Flash 0-Day CVE-2011-0611. Update also includes a fix for a security vulnerability Critical CVE-2011-1300: Off-by-three in GPU process, CVE-2011-1301: Use-after-free in the GPU process, and CVE-2011-1302: Heap overflow in the GPU process. OTHER LINKS: Google Chrome Releases - Google Chrome Browser

39

T-638: Security update available for Adobe Flash Player | Department of  

Broader source: Energy.gov (indexed) [DOE]

Adobe Security Bulletin IMPACT ASSESSMENT: High Discussion: An important vulnerability has been identified in Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.22 and earlier versions for Android. This universal cross-site scripting vulnerability (CVE-2011-2107) could be used to take actions on a user's behalf on any website or webmail provider, if the user visits a malicious website. There are reports that this vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message. Adobe recommends users of Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris update to

40

T-638: Security update available for Adobe Flash Player | Department of  

Broader source: Energy.gov (indexed) [DOE]

Adobe Security Bulletin IMPACT ASSESSMENT: High Discussion: An important vulnerability has been identified in Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.22 and earlier versions for Android. This universal cross-site scripting vulnerability (CVE-2011-2107) could be used to take actions on a user's behalf on any website or webmail provider, if the user visits a malicious website. There are reports that this vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message. Adobe recommends users of Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris update to

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities May 17, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in BlackBerry Tablet OS PLATFORM: BlackBerry Tablet OS 2.x ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53453 Blackberry Security Advisory KB34161 CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265

42

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

create specially crafted content that, when loaded by the target user, will trigger a memory corruption error CVE-2012-4163, CVE-2012-4164, CVE-2012-4165, CVE-2012-4166 or...

43

Water Bugs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

44

V-009: Adobe Shockwave Player Buffer Overflows and Array Error...  

Broader source: Energy.gov (indexed) [DOE]

has issued a fix (11.6.8.638). Addthis Related Articles U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player...

45

A bug's leaf | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

46

flash flood  

Science Journals Connector (OSTI)

flash flood [Context: The flash flood in the Big Thompson Canyon in Colorado on July 31,1976 killed 139 people]? flutartige Überschwemmung f, durch heftige Regenfälle ausgelöste Überschwemmung f ...

2014-08-01T23:59:59.000Z

47

Massive June Bug Emergence  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

48

POLICY FLASH  

Broader source: Energy.gov (indexed) [DOE]

6 6 DATE: TO: FROM: January 28,2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management SUBJECT: Changes in Small Business Contracting Policy SUMMARY: This Policy Flash forwards changes to the Small Disadvantaged Business (SDB) price evaluation adjustment, new guidance from the U.S. Small Business Administration (SBA) on improving subcontracting opportunities with small businesses, and the requirement for recertification of small business status. Page 1 of3 POLICY FLASH 2005-16 1. The statute for the SDB price evaluation adjustment implemented in FAR Subpart 19.11 is no longer in effect for civilian agencies, except the National Aeronautics and Space Administration and Coast Guard. See the attached Civilian Agency Acquisition Council Letter, dated December 27,2004: ~ CAAC Letter 2004-04, Expirationc

49

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Broader source: Energy.gov (indexed) [DOE]

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

50

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Broader source: Energy.gov (indexed) [DOE]

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

51

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

52

POLICY FLASH  

Broader source: Energy.gov (indexed) [DOE]

7 7 DATE: TO: FROM: February 10,2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management SUBJECT: Acquisition Guide Updates SUMMARY: This Policy Flash advises you of changes being made to five chapters of the Department of Energy Acquisition Guide. These changes are as follows: Pagel of 2 -_un - --- n__- Chapter 26.1 Energy Policy Act hnplementation - The changes to this chapter were updates and editorial style changes. Chapter 26.2 Energy Policy Act Cost Sharing Requirements - The changes to this chapter were updates and editorial style changes. Chapter 37.1 Support Service Contracting - Revisions were made to recognize performance based service acquisition. Other changes were updates and editorial style changes. Chapter39.1 Acquisitionof InformationResources- The changesto this chapterwere updates

53

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

54

Microhole Arrays / FLASH  

Broader source: Energy.gov [DOE]

Microhole Arrays / FLASH presentation at the April 2013 peer review meeting held in Denver, Colorado.

55

Chinch Bugs in St. Augustine Lawns  

E-Print Network [OSTI]

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

56

Team Bug Bag Biogas For Nicaragua  

E-Print Network [OSTI]

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

57

Summary of Bugs Database Jeremy Kepner  

E-Print Network [OSTI]

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

58

Double Flash | Open Energy Information  

Open Energy Info (EERE)

Flash Jump to: navigation, search Retrieved from "http:en.openei.orgwindex.php?titleDoubleFlash&oldid599606"...

59

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

60

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Broader source: Energy.gov (indexed) [DOE]

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

62

Scale Insects and Mealy Bugs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

63

Policy Flashes | Department of Energy  

Energy Savers [EERE]

Policy Flashes Policy Flashes The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files)...

64

EM News Flashes  

Broader source: Energy.gov (indexed) [DOE]

flashes Office of Environmental Management 1000 Independence Ave., SW Washington, DC 20585 202-586-7709 en Head of EM Visits Waste Isolation Pilot Plant for First Underground Tour...

65

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network [OSTI]

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

66

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

67

HEADQUARTERS POLICY FLASH  

Broader source: Energy.gov (indexed) [DOE]

----- - ----- - HEADQUARTERS POLICY FLASH DATE: June 29,2005 TO: Procurement Directors FROM: Office of Procurement and Assistance Policy, ME-6 1 Office of Procurement and Assistance Management SUBJECT: Department of Energy Rulemaking on Research Misconduct SUMMARY: This Policy Flash distributes the Department's interim final rules on research misconduct that were published in the Federal Register on June 28, 2005 and are effective on July 28, 2005. These rules includes a general statement of policy and standard financial assistance and procurement requirements that implement the government-wide policy on research misconduct issued by the White IIouse Office of Science and Technology Page 1 of 2 POLICY FLASH 2005-41 The attached Federal Register Notice promulgates a new 10 CFR Part 733, "Allegations of

68

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Broader source: Energy.gov (indexed) [DOE]

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

69

Policy Flash 2012-54  

Broader source: Energy.gov [DOE]

Attached is Policy Flash 2012-54 Acquisition Guide Chapter 71.1, Headquarters Business Clearance Process

70

Policy Flash 2013-06  

Broader source: Energy.gov [DOE]

Attached is Policy Flash 2013-06 Executive Order-Strengthening Protections Against Trafficking in Persons in Federal Contracts.

71

Policy Flashes | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Policy Flashes Policy Flashes The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. View the archive of Policy Flashes for FY 2013. Earlier Policy Flashes can be found in the right bar of this screen. Number Topic 2014-11 Federal Acquisition Circular (FAC) 2005-71

72

Policy Flash 2011-76 | Department of Energy  

Office of Environmental Management (EM)

Policy Flash 2011-76 Policy Flash 2011-76 PolicyFlash2011-76.pdf More Documents & Publications Flash2011-76 OPAM Policy Flash 2011-84 Policy Flash 2011-60...

73

Recovery News Flashes  

Broader source: Energy.gov (indexed) [DOE]

news-flashes Office of Environmental news-flashes Office of Environmental Management 1000 Independence Ave., SW Washington, DC 20585 202-586-7709 en "TRU" Success: SRS Recovery Act Prepares to Complete Shipment of More Than 5,000 Cubic Meters of Nuclear Waste to WIPP http://energy.gov/em/downloads/tru-success-srs-recovery-act-prepares-complete-shipment-more-5000-cubic-meters-nuclear "TRU" Success: SRS Recovery Act Prepares to Complete Shipment of More Than 5,000 Cubic Meters of Nuclear Waste to WIPP

74

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

75

Policy Flash 2012-61  

Broader source: Energy.gov (indexed) [DOE]

1 1 DATE: August 16, 2012 TO: Procurement Directors FROM: Director Contract and Financial Assistance Policy Division Office of Policy Office of Acquisition and Project Management SUBJECT: COR Toolkit SUMMARY: The COR Toolkit cited in the attachments to Policy Flash 2012-25 and posted to/linked from various DOE Internet pages has been withdrawn until further notice. This Flash will be available online at the following website: http://energy.gov/management/office-management/operational- management/procurement-and-acquisition/policy-flashes. Questions concerning this policy flash should be directed to

76

Policy Flash 2012-49  

Broader source: Energy.gov [DOE]

Attached is Policy Flash 2012-49 Acquisition Guide Chapter 17.1- Interagency Acquisitions, Interagency Transactions, and Interagency Agreements- Minor Revision.

77

Policy Flash 2005-53  

Office of Environmental Management (EM)

POLICY FLASH 2011-61 DATE: March 28, 2011 TO: Procurement Directors FROM: Director, Policy Division Office of Procurement and Assistance Policy Office of Procurement and Assistance...

78

Policy Flash 2005-53  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

POLICY FLASH 2011-58 DATE: March 16, 2011 TO: Procurement Directors FROM: Director, Policy Division Office of Procurement and Assistance Policy Office of Procurement and Assistance...

79

Policy Flash 2013-10  

Broader source: Energy.gov [DOE]

Attached is Policy Flash 2013-10 Hurricane Sandy Contingency Operation --Increase in Micro-Purchase and Simplified Acquisition Thresholds for Specific States and Counties

80

Policy Flash 2005-53  

Energy Savers [EERE]

POLICY FLASH 2015-09 DATE: December 12, 2014 TO: Procurement Directors and Contracting Officers FROM: Director, Contract and Financial Assistance Policy Division Office of Policy...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

82

Vacuum flash evaporated polymer composites  

DOE Patents [OSTI]

A method for fabrication of polymer composite layers in a vacuum is disclosed. More specifically, the method of dissolving salts in a monomer solution, vacuum flash evaporating the solution, condensing the flash evaporated solution as a liquid film, and forming the condensed liquid film into a polymer composite layer on a substrate is disclosed.

Affinito, J.D.; Gross, M.E.

1997-10-28T23:59:59.000Z

83

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

84

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

85

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

86

Microsoft Word - Final BUGS article final.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

87

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

88

Policy Flash 2011-86 | Department of Energy  

Office of Environmental Management (EM)

6 Policy Flash 2011-86 PolicyFlash2011-86.pdf More Documents & Publications Policy Flash 2011-84 Policy Flash 2011-60 Policy Flash 2011-9...

89

Policy Flash 2005-53 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

05-53 Policy Flash 2005-53 Policy Flash 2005-53 More Documents & Publications Policy Flash 2011-84 Policy Flash 2011-87 Policy Flash 2011-48...

90

Policy Flash 2011-60 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

60 Policy Flash 2011-60 PolicyFlash2011-60.pdf More Documents & Publications Policy Flash 2011-84 Policy Flash 2011-86 Policy Flash 2011-90...

91

Policy Flash 2011-93 | Department of Energy  

Office of Environmental Management (EM)

3 Policy Flash 2011-93 DOE O 420.2C Safety of Accelerator Facilities PolicyFlash2011-93.pdf More Documents & Publications Policy Flash 2011-84 Policy Flash 2011-48 Policy Flash...

92

Policy Flash 2011-87 | Department of Energy  

Office of Environmental Management (EM)

7 Policy Flash 2011-87 PolicyFlash2011-87.pdf More Documents & Publications Policy Flash 2011-84 Policy Flash 2005-53 Policy Flash 2011-6...

93

Policy Flash 2011-84 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4 Policy Flash 2011-84 PolicyFlash2011-84.pdf More Documents & Publications Policy Flash 2005-53 Policy Flash 2011-87 Policy Flash 2011-48...

94

Policy Flash 2011-89 | Department of Energy  

Energy Savers [EERE]

9 Policy Flash 2011-89 PolicyFlash2011-89.pdf More Documents & Publications Policy Flash 2011-84 Policy Flash 2011-48 Policy Flash 2011-47 OPAM...

95

Policy Flash 2011-48 | Department of Energy  

Energy Savers [EERE]

8 Policy Flash 2011-48 DOE O 225.1B Accident Investigations - OPAM Policy Flash 2011-48 More Documents & Publications Policy Flash 2011-84 Policy Flash 2011-47 OPAM Policy Flash...

96

Policy Flash 2011-90 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

0 Policy Flash 2011-90 PolicyFlash2011-90.pdf More Documents & Publications Policy Flash 2011-84 Policy Flash 2011-60 Policy Flash 2011-86...

97

Flash2011-71 OPAM | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Flash2011-71 OPAM Flash2011-71 OPAM DOE O 436.1 Departmental Sustainability Flash2011-71 OPAM More Documents & Publications Policy Flash 2011-47 OPAM Flash2011-76...

98

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

14, 2012 V-047: IBM Lotus Foundation Multiple Cross Site Scripting Two vulnerabilities have been reported in IBM Lotus Foundations. December 13, 2012 V-046: Adobe Flash Player Bugs...

99

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can...

100

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Policy Flash 2005-53  

Broader source: Energy.gov (indexed) [DOE]

38 38 DATE: February 3, 2011 TO: Procurement Directors FROM: Director, Policy Division Office of Procurement and Assistance Policy Office of Procurement and Assistance Management SUBJECT: Acquisition Career Management Handbook Change 2011-01 SUMMARY: A recent review of the Department of Energy (DOE) Acquisition Career Management Program (ACMP), Financial Assistance Program certification identified opportunities for updating the courses required for Level I, Level II, and Level III certification. This Policy Flash and its attachment will be available online at the following website: http://www.management.energy.gov/policy_guidance/policy_flashes.htm. Questions concerning this policy flash should be directed to the Acquisition Career

102

Policy Flash 2012-18  

Broader source: Energy.gov [DOE]

Policy Flash 2012-09, dated October 21, 2011, forwarded both FAR and DEAR contract clause matrices. The FAR matrix contained 2 errors. It listed FAR 52.215-12 and 13 as Not Applicable although they...

103

Policy Flash 2014-34  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to A. Scott Geary, of the  Office of Acquisition and Project Management Policy at 202-287-1507 or at andrew.geary@hq.doe.gov.

104

Flash pyrolysis of sewage sludge  

Science Journals Connector (OSTI)

Flash pyrolysis of sewage sludge ... Influence of the Pyrolysis Temperature on Sewage Sludge Product Distribution, Bio-Oil, and Char Properties ... Influence of the Pyrolysis Temperature on Sewage Sludge Product Distribution, Bio-Oil, and Char Properties ...

Jan Piskorz; Donald S. Scott; Ian B. Westerberg

1986-01-01T23:59:59.000Z

105

POlicy Flash 2013-60  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov,  or at (202) 287-1614.

106

Policy Flash 2013-08 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8 Policy Flash 2013-08 Attached: Policy Flash 2013-08 Major Disaster and Emergency Declarations for Specific States from Hurricane Sandy Questions concerning this policy flash...

107

Flash Steam Power Plant | Open Energy Information  

Open Energy Info (EERE)

Flash Steam Power Plant Flash Steam Power Plant (Redirected from Flash Steam Power Plants) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Flash Steam Power Plants General List of Flash Steam Plants Flash Steam power plant process diagram - DOE EERE 2012 Flash steam plants are the most common type of geothermal power generation plants in operation in the world today. Fluid at temperatures greater than 360°F (182°C) is pumped under high pressure into a tank at the surface held at a much lower pressure, causing some of the fluid to rapidly vaporize, or "flash." The vapor then drives a turbine, which drives a generator. If any liquid remains in the tank, it can be flashed again in a second tank to extract even more energy.[1] Facility Name Owner Capacity (MW) Facility

108

Policy Flash 2012-21 | Department of Energy  

Energy Savers [EERE]

1 Policy Flash 2012-21 Attached is Policy Flash 2012-21 Class Deviation on Trade Agreements. PolicyFlash2012-21.pdf More Documents & Publications PolicyFlash2011-62.pdf Policy...

109

Policy Flash 2011-92 | Department of Energy  

Energy Savers [EERE]

Policy Flash 2011-92 Policy Flash 2011-92 Federal Acquisition Circular 2005-53. PolicyFlash2011-92.pdf PolicyFlash2011-92Attachment.pdf More Documents & Publications Policy...

110

Policy_Flash_2011-62.pdf | Department of Energy  

Energy Savers [EERE]

62.pdf PolicyFlash2011-62.pdf 2011-62 Attachment - Attachment to ACMP Flash 2011-62 PolicyFlash2011-62.pdf More Documents & Publications PolicyFlash2011-62Attachment.pdf...

111

Policy Flash 2011-61 | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1-61 Policy Flash 2011-61 2011-61 Attachment - Acquisition, Use, and Disposal of Real Estate PolicyFlash2011-61.pdf More Documents & Publications Flash2011-91.pdf Flash2011-83...

112

Flash2011-77 OPAM | Department of Energy  

Energy Savers [EERE]

77 OPAM Flash2011-77 OPAM Acquisition Guide Chapter 71.3, Data Reporting - Quality Management Flash2011-77 OPAM More Documents & Publications FLASH2011-11-OPAM Flash 2011-10 OPAM...

113

flash2004-18attachment1.pdf | Department of Energy  

Energy Savers [EERE]

attachment1.pdf flash2004-18attachment1.pdf flash2004-18attachment1.pdf More Documents & Publications flash2004-18attachment2.pdf flash2004-18.pdf Financial Management Handbook...

114

Flash2011-45 OPAM | Department of Energy  

Energy Savers [EERE]

5 OPAM Flash2011-45 OPAM DOE O 458.1 Radiation Protection of the Public and the Environment Flash2011-45 OPAM More Documents & Publications Policy Flash 2011-49 OPAM Flash2011-79...

115

Policy Flash 2005-53  

Broader source: Energy.gov (indexed) [DOE]

7 7 DATE: March 16, 2011 TO: Procurement Directors FROM: Director, Policy Division Office of Procurement and Assistance Policy Office of Procurement and Assistance Management SUBJECT: Acquisition Guide Chapters 4.1 - Procurement and Assistance Data System (PADS) and 4.3 - Requirements for the Industry Interactive Procurement System (IIPS) SUMMARY: With the implementation of Strategic Integrated Procurement Enterprise System (STRIPES), Acquisition Guide Chapters 4.1 - Procurement and Assistance Data System (PADS) and 4.3 - Requirements for the Industry Interactive Procurement System (IIPS) are hereby rescinded. This flash may be viewed at http://management.energy.gov/policy_guidance/policy_flashes.htm. Questions concerning this policy flash should be directed to Barbara Binney at (202) 287-1340

116

DATE: TO: FROM: POLICY FLASH  

Broader source: Energy.gov (indexed) [DOE]

June 5,2008 June 5,2008 Procurement Directors Office of Procurement and Assistance Policy, MA-61 Office of Procurement and Assistance Management SUBJECT: DOE 0 540.1B - Departmental Business Instrument Numbering System for Actions Conducted Outside of the Strategic Integrated Procurement Enterprise System (STRIPES) SUMMARY: This Policy flash is to inform you that the above listed Directive was issued on May 23,2008. This Order prescribes procedures for assigning identifying numbers to all new business instruments processed outside the Strategic Integrated Procurement Enterprise System. This Flash may be viewed online at the following website: http://mananement.energy.~ov/policy ~idance/policy flashes.htm. Questions regarding this Guide should be directed to the office identified in the "Contact"

117

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network [OSTI]

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

118

Policy Flash 2012-68  

Broader source: Energy.gov (indexed) [DOE]

68 68 DATE: September 21, 2012 TO: Procurement Directors FROM: Director, Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management SUBJECT: Political Activity SUMMARY: Policy Flash 2011-2, issued October 5, 2010, provided information on the prohibition on using Government property and facilities to conduct political activities. Recently, there was an alleged misuse of the Department of Energy (DOE) e-mail system to conduct political activities by a DOE contractor. This Policy Flash serves as a reminder on political activities in the workplace during this election season. Government property and facilities are not authorized for political activity. DOE contractors are restricted from using Government property

119

Policy Flashes 2014 | Department of Energy  

Energy Savers [EERE]

2014 Policy Flashes 2014 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files)...

120

Analysis of accidents during flashing operations  

E-Print Network [OSTI]

occurred at intersections under flashing operation compared to those operating in the normal mode. A statistical analysis was conducted to determine the safety of flashing signal operation. No significant increases in accidents or accident severity were...

Obermeyer, Michael Edward

2012-06-07T23:59:59.000Z

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Flash Steam Power Plant | Open Energy Information  

Open Energy Info (EERE)

Flash Steam Power Plant Flash Steam Power Plant Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Flash Steam Power Plants General List of Flash Steam Plants Flash Steam power plant process diagram - DOE EERE 2012 Flash steam plants are the most common type of geothermal power generation plants in operation in the world today. Fluid at temperatures greater than 360°F (182°C) is pumped under high pressure into a tank at the surface held at a much lower pressure, causing some of the fluid to rapidly vaporize, or "flash." The vapor then drives a turbine, which drives a generator. If any liquid remains in the tank, it can be flashed again in a second tank to extract even more energy.[1] Facility Name Owner Capacity (MW) Facility Type Commercial Online Date Geothermal Area

122

Cooling Fusion in a Flash | Princeton Plasma Physics Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cooling Fusion in a Flash American Fusion News Category: U.S. Universities Link: Cooling Fusion in a Flash...

123

Initial breakdown pulses in intracloud lightning flashes and their relation to terrestrial gamma ray flashes  

E-Print Network [OSTI]

Initial breakdown pulses in intracloud lightning flashes and their relation to terrestrial gamma breakdown stage of 10 intracloud lightning flashes that may have produced terrestrial gamma ray flashes, and S. Xiong (2013), Initial breakdown pulses in intracloud lightning flashes and their relation

Cummer, Steven A.

124

The real science behind FlashForward  

ScienceCinema (OSTI)

Berkeley Lab nuclear physicist Peter Jacobs discusses the ALICE experiment, setting of the science fiction novel FlashForward.

Peter Jacobs

2010-01-08T23:59:59.000Z

125

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

126

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

127

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

128

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

129

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Broader source: Energy.gov (indexed) [DOE]

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

130

Multi-stage flash degaser  

DOE Patents [OSTI]

A multi-stage flash degaser is incorporated in an energy conversion system having a direct-contact, binary-fluid heat exchanger to remove essentially all of the noncondensable gases from geothermal brine ahead of the direct-contact binary-fluid heat exchanger in order that the heat exchanger and a turbine and condenser of the system can operate at optimal efficiency.

Rapier, P.M.

1980-06-26T23:59:59.000Z

131

Policy Flashes FY 2013 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Flashes FY 2013 Flashes FY 2013 Policy Flashes FY 2013 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. View the archive of Policy Flashes for FY 2012. Number Topic 2013-79 Professional and Consultant service costs (FAR 31.205-33) 2013-78 Acquisition Guide Chapter 7.3 Acquisition Planning in the M&O Enviroment

132

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

133

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

134

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

135

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

136

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers [EERE]

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

137

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

138

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

139

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

140

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Multi-stage flash degaser  

DOE Patents [OSTI]

A multi-stage flash degaser (18) is incorporated in an energy conversion system (10) having a direct-contact, binary-fluid heat exchanger to remove essentially all of the noncondensable gases from geothermal brine ahead of the direct-contact binary-fluid heat exchanger (22) in order that the heat exchanger (22) and a turbine (48) and condenser (32) of the system (10) can operate at optimal efficiency.

Rapier, Pascal M. (Richmond, CA)

1982-01-01T23:59:59.000Z

142

Microsoft Word - Final BUGS article final.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

143

Policy Flash 2015-03 CRA Appropriations  

Broader source: Energy.gov [DOE]

Questions concerning the policy flash should be directed to Richard Bonnell at (202) 287-1747 or at richard.bonnell@hq.doe.gov.

144

News Flash - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Privacy Practices Patient Rights & Responsibilities Frequently Asked Questions News Flash Email Email Page | Print Print Page |Text Increase Font Size Decrease Font Size...

145

Digital Photography with Flash and No-Flash Image Pairs Georg Petschnigg Maneesh Agrawala Hugues Hoppe  

E-Print Network [OSTI]

(bottom) Flash No-Flash Detail Transfer with Denoising Figure 1: This candlelit setting from the wine cave include denoising and detail transfer (to merge the ambient qualities of the no-flash image with the high demonstrate how these applications can synthesize new images that are of higher quality than either

Cohen, Michael

146

Policy Flash 2005-53  

Broader source: Energy.gov (indexed) [DOE]

4 4 DATE: November 4, 2011 TO: Procurement Directors FROM: Director Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management SUBJECT: Accelerating Payment to Small Businesses for Goods and Services SUMMARY: With reference to Policy Flash 2012-02, Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices, and OMB Memorandum M-11-32, "Accelerating Payment to Small Businesses for Goods and Services," established an Executive Branch policy to pay small business invoices as quickly as practicable, with a goal of paying within 15 days. Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices implements this

147

Policy Flash 2012-38 | Department of Energy  

Office of Environmental Management (EM)

38 Policy Flash 2012-38 Attached is Policy Flash 2012-38 Acquisition Guide 42.2 Foreign Travel Approval Questions concerning the policy flash should be directed to Richard Bonnell...

148

Policy Flash 2012-43 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3 Policy Flash 2012-43 Attached is Policy Flash 2012-44 Acquisition Planning: Revised DOE Acquisition Guide Chapter 7.1 Questions concerning this policy flash should be directed to...

149

Policy Flash 2012-57 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

57 Policy Flash 2012-57 Attached is Policy Flash 2012-57 Communication to All Department of Energy Contractors Questions concerning this policy flash should be directed to Richard...

150

Policy Flash 2012-30 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

2-30 Policy Flash 2012-30 Attached is Policy Flash 2012-30, Acquisition Guide Chapter 9.4 - Contractor Responsibility Determinations. PolicyFlash2012-30.pdf AcqGuideChapter9.4...

151

Policy Flash 2013-17 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 Policy Flash 2013-17 Attached is Policy Flash 2013-17 Federal Acquisition Circular 2005-62 Questions concerning this policy flash should be directed to Barbara Binney, of the...

152

Policy Flash 2012-50 | Department of Energy  

Office of Environmental Management (EM)

Policy Flash 2012-50 Policy Flash 2012-50 Attached Policy Flash 2012-50 Department of Energy Audit Guide for For-Profit Recipients Questions regarding the contracts intended to be...

153

Policy Flash 2012-61 | Department of Energy  

Energy Savers [EERE]

1 Policy Flash 2012-61 Attached is Policy Flash 2012-61 COR Tool Kit Rescission. Questions concerning this policy flash should be directed to Lorri Wilkins of the Professional...

154

Policy Flash 2012-63 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3 Policy Flash 2012-63 Attached is Policy Flash 2012-63 Update Department of Energy Acquisition Guide Chapter 22.1 Labor Standards Questions concerning this policy flash should be...

155

Policy Flash 2012-67 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 Policy Flash 2012-67 Attached is Policy Flash 2012-67, Acquisition Savings Reporting Template Guidance Questions concerning this policy flash should be directed to Scott Clemons...

156

Policy Flash 2012-42 | Department of Energy  

Office of Environmental Management (EM)

2 Policy Flash 2012-42 Attached is Policy flash 2012-42 Federal Acquisition Circular 2005-59 Questions concerning this policy flash should be directed to Richard Langston, of the...

157

Policy Flash 2013-09 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

09 Policy Flash 2013-09 Attached: Policy Flash 2013-09 Acquisition Guide Chapter 7.1 - Acquisition Planning Questions concerning this policy flash should be directed to Jason...

158

Policy Flash 2012-26 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

26 Policy Flash 2012-26 Below is Policy Flash 2012-26, Release of Department of Energy Award Fee and Incentive Fee Reports PolicyFlash2012-26.pdf More Documents & Publications...

159

Policy Flash 2012-41 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

1 Policy Flash 2012-41 Attached is Policy flash 2012-41 OFPP Myth-Busting Memo Questions concerning this policy flash should be directed to Jason Taylor at (202) 287-1945 or...

160

Policy Flash 2012-35 | Department of Energy  

Energy Savers [EERE]

5 Policy Flash 2012-35 Attached is Policy Flash 2012-35 Federal Acquisition Circular 2005-58 Questions concerning this policy flash should be directed to Richard Langston at (202)...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Policy Flash 2013-18 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8 Policy Flash 2013-18 Attached is Policy Flash 2013-18 Federal Acquisition Circular 2005-63 Questions concerning this policy flash should be directed to Barbara Binney, of the...

162

Policy Flash 2012-46 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6 Policy Flash 2012-46 Attached is Policy Flash 2012-46 Acquisition Planning: Revised DOE Acquisition Guide Chapter 7.1 Questions concerning this policy flash should be directed to...

163

Policy Flash 2012-48 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

8 Policy Flash 2012-48 Attached is Policy Flash 2012-48: Interim Reporting for Advanced Notifications of Awards (ANA) Questions concerning this policy flash should be directed to...

164

Policy Flash 2012-58 | Department of Energy  

Office of Environmental Management (EM)

8 Policy Flash 2012-58 Attached is Policy Flash 2012-58 Federal Acquisition Circular 2005-60 Questions concerning this policy flash should be directed to Richard Langston, of the...

165

Policy Flash 2012-59 | Department of Energy  

Office of Environmental Management (EM)

9 Policy Flash 2012-59 Attached is Policy Flash 2012-59 Section 311 Revised Template August 2012 Questions concerning this policy flash should be directed to Barbara Binney, of the...

166

Policy Flash 2013-04 | Department of Energy  

Office of Environmental Management (EM)

3-04 Policy Flash 2013-04 Attached is Policy Flash 2013-04 Extension of SBA-DOE 8(a) Partnership Agreement. Questions concerning this policy flash should be directed to Jason...

167

Policy Flash 2014-34 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Policy Flash 2014-34 Policy Flash 2014-34 Questions concerning this policy flash should be directed to A. Scott Geary, of the Office of Acquisition and Project Management Policy at...

168

Policy Flash 2013-19 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9 Policy Flash 2013-19 Attached is Policy Flash 2013-19 Federal Acquisition Circular 2005-64 Questions concerning this policy flash should be directed to Barbara Binney, of the...

169

Policy Flash 2012-53 | Department of Energy  

Energy Savers [EERE]

3 Policy Flash 2012-53 Policy Flash 2012-53 M-12-16: Providing Prompt Payment to Small Business Subcontractors More Documents & Publications Policy Flash 2013-69 Extension of...

170

Policy Flash 2013-65 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Policy Flash 2013-65 Policy Flash 2013-65 Questions concerning this policy flash should be directed to Mike Larson of the Office of Acquisition and Project Management, Strategic...

171

Policy Flash 2013-13 | Department of Energy  

Office of Environmental Management (EM)

3-13 Policy Flash 2013-13 Attached is Policy Flash 2013-13 Further Extension of SBA-DOE 8(a) Partnership Agreement Questions concerning this policy flash should be directed to...

172

POLICY FLASH 2013-67 FAC-68 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

POLICY FLASH 2013-67 FAC-68 POLICY FLASH 2013-67 FAC-68 Questions concerning this policy flash should be directed to Barbara Binney, of the Office of Acquisition and Project...

173

FLASH2011-17-OPAM | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7-OPAM FLASH2011-17-OPAM DOE M 470.4-1 Change 2, Safeguards and Security Program Planning and Management FLASH2011-17-OPAM More Documents & Publications FLASH2011-16-OPAM Policy...

174

flash2004-18attachment2.pdf | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

flash2004-18attachment2.pdf flash2004-18attachment2.pdf More Documents & Publications flash2004-18attachment1.pdf Financial Management Handbook AcqGuide70pt4.doc&0;...

175

FLASH2011-34-OPAM | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

FLASH2011-34-OPAM Extension of Other Transaction Authority to enter into Technology Investment Agreements (TIAs) FLASH2011-34-OPAM More Documents & Publications Flash2011-63 OPAM...

176

Policy Flash 2013-15 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Flash 2013-15 Attached is Policy Flash 2013-15 DOE O 231.1B, Environment, Safety and Health Reporting Questions concerning this policy flash should be directed to Jason Taylor of...

177

Microsoft Word - Policy Flash 2010-81 Attachment 1 | Department...  

Energy Savers [EERE]

Flash 2010-81 Attachment 1 Microsoft Word - Policy Flash 2010-81 Attachment 2 Policy Flash 2014-13 AL 2014-03: Allowability of Contractor Litigation Defense and Settlement Costs...

178

N. Baboi, MDIN. Baboi, MDI FLASH Seminar, Dec. 8, 2009FLASH Seminar, Dec. 8, 2009 Status of FLASH-BPMsStatus of FLASH-BPMs  

E-Print Network [OSTI]

-BPMsStatus of FLASH-BPMs ·Status of BPM-system ·Maintenance work checked/adjusted trigger delay, zero-offset, calibration 6BYP: used by energy server ·BPM studies HERA (Neumann) electronics in TCA tested toroid in TCA tested BPM resolution for multibunch toroid resolution vs. charge ·FLASH Upgrade Changes in the BPM

179

Flash Center for Computational Science The University of Chicago  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Flash Center for Computational Science Flash Center for Computational Science The University of Chicago Flash Center for Computational Science Mira Early Science Project Conference Argonne National Laboratory 15 May 2013 Carlo Graziani Flash Center University of Chicago New Insights Into Buoyancy-Driven Turbulent Nuclear Combustion from Large-Scale 3D FLASH Simulations Flash Center for Computational Science The University of Chicago What are Type Ia supernovae? Supernova Cosmology Project Flash Center for Computational Science The University of Chicago What are Type Ia supernovae? Supernova Cosmology Project Peak luminosities of most Type Ia SNe are similar - making them excellent "cosmic yardsticks" Flash Center for Computational Science The University of Chicago

180

T-569: Adobe Flash SWF File Processing Memory Corruption Remote...  

Broader source: Energy.gov (indexed) [DOE]

69: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

POLICY FLASH 2014-12 Executive Compensation Cap | Department...  

Energy Savers [EERE]

2 Executive Compensation Cap POLICY FLASH 2014-12 Executive Compensation Cap Questions concerning this policy flash should be directed to Carol Jenkins, of the Office of...

182

Policy Flash 2012-34 | Department of Energy  

Energy Savers [EERE]

4 Policy Flash 2012-34 Attached is Policy Flash 34-Waiver of Mandatory Use of the Strategic Integrated Procurement Enterprise System (STRIPES) for GSA Global Supply Service...

183

Policy Flash: 2013-52 Contractor Legal Management Requirements...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Flash: 2013-52 Contractor Legal Management Requirements: Final Rule Policy Flash: 2013-52 Contractor Legal Management Requirements: Final Rule Questions concerning this policy...

184

Policy Flash 2014-19 Electronic Products Environmental Assessment...  

Broader source: Energy.gov (indexed) [DOE]

19 Electronic Products Environmental Assessment Tool (EPEAT) Policy Flash 2014-19 Electronic Products Environmental Assessment Tool (EPEAT) Questions concerning this policy flash...

185

Policy Flash 2013-24 Fee Determinations: Requirement to Obtain...  

Office of Environmental Management (EM)

Policy Flash 2013-24 Fee Determinations: Requirement to Obtain Acquisition Executive's Input Policy Flash 2013-24 Fee Determinations: Requirement to Obtain Acquisition Executive's...

186

Policy Flash 2014-19 Electronic Products Environmental Assessment...  

Broader source: Energy.gov (indexed) [DOE]

Flash 2014-19 Electronic Products Environmental Assessment Tool (EPEAT) Policy Flash 2014-19 Electronic Products Environmental Assessment Tool (EPEAT) Questions concerning this...

187

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network [OSTI]

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

188

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network [OSTI]

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

189

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

190

Policy Flash 2012-59  

Broader source: Energy.gov (indexed) [DOE]

9 9 DATE: August 6, 2012 TO: Procurement Directors/Contracting Officers FROM: Director Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management SUBJECT: Section 311 Revised Template August 2012 SUMMARY: Attached are 3 revised templates for sending the Section 311 notices to Congress as prescribed in Acquisition Letter (AL) 2012-07 and Financial Assistance Letter (FAL) 2012-01. The template revises the first bullet to use of the program name and subprogram name found in the appropriations, instead of the treasury account number. If there are multiple program names and/or subprogram names, then these will need to be listed. This Flash will be available online at the following website:

191

BOILER BLOW-DOWN FLASH RECOVERY  

E-Print Network [OSTI]

Malelane’s boiler blow-down flash, which was previously rejected to atmosphere, is now recovered into the turbo-alternator exhaust steam range and used for process heating duty. Various flash vapour recovery options have been evaluated for operability, maintainability and cost effectiveness. The design considerations for the blow-down vessel and the valve and piping configuration, which resulted from a Hazop Study, are explained. The recovery of 1.6 tons per hour of boiler blowdown flash equates to R260 000 per annum in coal savings.

I Singh; F Weyers

192

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

193

Policy Flash 2012-29 | Department of Energy  

Office of Environmental Management (EM)

Policy Flash 2012-29 Policy Flash 2012-29 Attached is Policy Flash 2012-29 Federal Acquisition Circular 2005-56 and 57 PolicyFlash2012-29.pdf AttachmentFAC-2005-56&FAC-2005-57...

194

Policy Flashes FY 2004 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4 4 Policy Flashes FY 2004 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2004-26 (pdf) - Discretionary Set-Aside Authority 2004-26 Attachment (pdf) - Memorandum from Richard Hopf on Discretionary Set-Aside Authority 2004-25 (pdf) - Nepotism in Contracting (with attachment)

195

Policy Flashes for 2007 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 7 Policy Flashes for 2007 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2007-62 Executive Order 13423, Strengthening Federal Environmental, Energy and Transportation Management 2007-62 Attachment Acquisition Letter 2007-12, Executive Order 13423, Strengthening Federal Environmental, Energy and Transportation Management

196

Policy Flashes for 2008 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8 8 Policy Flashes for 2008 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2008-67 Federal Acquisition Circular (FAC) 2005-27 2008-67 Attachment 1 Federal Acquisition Circular (FAC) 2005-27 2008-67 Attachment 2 Federal Register Notice of September 17, 2008 2008-66 Revised Acquisition Guide Chapter 71.1 Headquarters Business

197

Policy Flashes FY 2003 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3 3 Policy Flashes FY 2003 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2003-32 (pdf) Amendment of the Department of Energy Acquisition Regulation (DEAR) to Revise Conditional Payment of Fee Clause 2003-31 (pdf) Federal Acquisition Circular (FAC) 2001-16 -

198

Proton Efflux and Phosphorylation in Flash Groups  

Science Journals Connector (OSTI)

When thylakoid membranes are illuminated by single turnover flashes, transmembrane redox reactions in photosystem I and II lead to the rapid generation (>1 ns) of a transmembrane electric potential difference,...

P. Bogdanoff; P. Gräber

1990-01-01T23:59:59.000Z

199

CRB Policy Flashes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

CRB Policy Flashes CRB Policy Flashes CRB Policy Flashes In addition to granting certifications for DOE project management personnel, the Board is also tasked with developing and updating the policies that define the requisite knowledge, skills, and abilities needed to fulfill the Departmental mission for the effective management of capital asset projects as defined in DOE O 413.3B. To that end, the Board also establishes PMCDP certification requirements and publishes them in the Certification and Equivalency Guideline. In an effort to better inform the various participating program offices of changes within the PMCDP and the various certification requirements needed for each level of PMCDP certification, the Board publishes policy flash documents that are available for download here on the PMCDP Web site. New

200

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

202

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

203

New Diagnostics in the FLASH Dump Line  

E-Print Network [OSTI]

Line Status Aug. 2009 BPM 9DUMP BPM 15DUMP BPM 5DUMP Toroid 9DUMP OTR screen 9DUMP BLM 14DUMP BLM 13 at the dump #12;N. Baboi, MDIN. Baboi, MDI FLASH Seminar, Dec. 1, 2009FLASH Seminar, Dec. 1, 2009 Old BPM 15DUMPOld BPM 15DUMP ·Strange behavior of BPM signals measured impedance from end of cable (in bld. 49): L

204

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

15, 2011 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

205

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 15, 2011 November 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

206

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

207

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network [OSTI]

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

208

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Broader source: Energy.gov (indexed) [DOE]

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

209

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Broader source: Energy.gov (indexed) [DOE]

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

210

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

211

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Broader source: Energy.gov (indexed) [DOE]

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

212

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

213

Rules of Engagment for Exercise Players  

Broader source: Energy.gov (indexed) [DOE]

Energy Energy Washington, DC 20585 Rules of Engagement for Exercise Players Rules of engagement (ROE) provide for control of an exercise while allowing maximum free play in a tactical setting and enable evaluators to objectively monitor a participant's performance. Use of engagement simulation systems (ESSs) promotes realistic simulation of real-world response actions, which is vital to performance testing and evaluation. ROE govern the activities of all players (participants, controllers, and evaluators) throughout the exercise period, regardless of the organization, the identified training or evaluation objectives, or the particular scenario. ROE also apply to all personnel who participate in, support, observe, or control exercises. Only the Test

214

Policy Flashes FY 2012 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

FY 2012 FY 2012 Policy Flashes FY 2012 Archive of Policy Flashes issued in FY 2012. Number Topic 2012-70 Department of Energy Federal Acquisition Regulation Clause Usage Guide 2012-69 DEAR Contract Clause Matrix 2012-68 Political Activity 2012-67 Acquisition Savings Reporting Guidance 2012-66 Attachment to Policy Flash on New Procedures for Submitting Clause or Template Changes 2012-65 Federal Acquisition Circular 61 2012-64 Contract Clause Matrix 2012-63 Update Department of Energy Acquisition Guide Chapter 22.1 Labor Standards 2012-62 Class Deviation DEAR 950.7006/AL 2012-10, Implementation of the Price-Anderson Act of 2005 2012-61 DOE COR Toolkit Recission 2012-60 Acquisition Guide Chapter 13.1, Purchase Card Policy and Operating Procedures 2012-59 Section 311 Revised Template August 2012

215

Recovery News Flashes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Recovery News Flashes Recovery News Flashes Recovery News Flashes RSS September 1, 2011 Workers Complete Asbestos Removal at West Valley to Prepare Facility for Demolition American Recovery and Reinvestment Act workers safely cleared asbestos from more than 5,500 feet of piping in the Main Plant Process Building. Project completion is an important step in preparing the former commercial nuclear fuel reprocessing building for demolition. August 29, 2011 Idaho Workers Complete Last of Transuranic Waste Transfers Funded by Recovery Act American Recovery and Reinvestment Act workers successfully transferred 130 containers of remote-handled transuranic waste – each weighing up to 15 tons – to a facility for repackaging and shipment to a permanent disposal location.

216

Recovery News Flashes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Recovery News Flashes Recovery News Flashes Recovery News Flashes RSS January 29, 2013 "TRU" Success: SRS Recovery Act Prepares to Complete Shipment of More Than 5,000 Cubic Meters of Nuclear Waste to WIPP With the American Recovery and Reinvestment Act funding, Savannah River Site (SRS) continues to safely treat and dispose of radioactive waste created while producing materials for nuclear weapons throughout the Cold War. The DOE site in Aiken, S.C., is safely, steadily, and cost-effectively making progress to analyze, measure, and then carefully cleanup or dispose of legacy transuranic (TRU) waste remaining at SRS after the lengthy nuclear arms race. November 2, 2012 Recovery Act Exceeds Major Cleanup Milestone, DOE Complex Now 74 Percent Remediated The Office of Environmental Management's (EM) American Recovery and

217

Policy Flashes - FY 2002 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2 2 Policy Flashes - FY 2002 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. To obtain any Policy Flash listed below please contact Office of Policy at DOE_OAPM@hq.doe.gov or on (202) 287-1330. 2002-42 Federal Acquisition Circular 2001-10 2002-42 Attachment Federal Acquisition Circular 2001-10 2002-41 Revisions and Additions to the Department of Energy (DOE) Acquisition Guide - Chapter 7, Acquisition Planning, and Chapter 71, Headquarters Review of Contract and Financial Assistance Actions 2002-40 Extension of Price-Anderson Act - 1) Awarded Contracts, 2) Proposed Awards, and 3) Reinstatement of Acquisition Letter (AL) 2002-04 2002-39 Financial Assistance Letter (FAL) 2002-03, Implementation of DOE's Industry Interactive Procurement System (IIPS)

218

EM News Flashes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

News Flashes News Flashes EM News Flashes RSS December 23, 2013 Aspen Cass, a relative of an EM Carlsbad Field Office (CBFO) employee, holds donated coats with Farok Sharif (left), president and project manager of Nuclear Waste Partnership, the WIPP management and operating contractor, and Joe Franco, manager of CBFO. EM Waste Isolation Pilot Plant Team's Holiday Spirit Shines CARLSBAD, N.M. - Children in the Carlsbad area are warmer this holiday season thanks to the generosity of EM's Waste Isolation Pilot Plant (WIPP) team of employees. December 11, 2013 Jim Kopotic and his daughter Lauren pause for a photo after a race that raised money for cancer research and treatment. 'Can Do' Attitude Brings EM Family Together OAK RIDGE, Tenn. - It's 7:51 a.m. on a Tuesday morning. A white,

219

Policy Flashes - FY 2001 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 1 Policy Flashes - FY 2001 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. To obtain any Policy Flash listed below please contact Office of Policy at DOE_OAPM@hq.doe.gov or on (202) 287-1330. Number Topic 2001-29 Biological Etiologic Agents Notice 450.7 Implementation 2001-28 Greening the Government Executive Orders 2001-27 Implementation of New Advance Award Notification System 2001-26 Federal Acquisition Circular 2001-01 2001-25 Financial Assistance Letter (FAL) 2001-04 and Acquisition Letter 2001-05 2001-24 Financial Assistance Letter (FAL) 2001-03 and e-Digest 2001-23 Restrictions on Management and Operating and Support Services Contracting 2001-22 New Acquisition Guide Chapter 2001-21 Acquisition Letter (AL) 2001-04

220

EM News Flashes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

News Flashes News Flashes EM News Flashes RSS September 13, 2012 Pictured here is the Integrated Waste Treatment Unit's off-gas filter following the June incident. Idaho Site Launches Corrective Actions Before Restarting Waste Treatment Facility IDAHO FALLS, Idaho - The Idaho site and its cleanup contractor have launched a series of corrective actions they will complete before safely resuming startup operations at the Integrated Waste Treatment Unit (IWTU) following an incident in June that caused the new waste treatment facility to shut down. September 11, 2012 Wastren-EnergX Mission Support (WEMS) Senior Safety Engineer Marsha Bevins, left, stands with DOE Director of Worker Safety and Health Brad Davy while holding her Voluntary Protection Program Contractor Champion of the Year award and the 2012 Star of Excellence award WEMS received.

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Policy Flash 2013-79 Professional and Consultant service cost...  

Energy Savers [EERE]

9 Professional and Consultant service cost (FAR 31.205-33) Policy Flash 2013-79 Professional and Consultant service cost (FAR 31.205-33) Questions concerning this policy flash...

222

Flash2004-23Attachment_2.pdf | Department of Energy  

Office of Environmental Management (EM)

Flash2004-23Attachment2.pdf Flash2004-23Attachment2.pdf More Documents & Publications December 12, 2013 Business Opportunity Session Presentations Attachment FY2011-28 OPAM...

223

Policy Flash 2013-26 Guidance for tracking inquiries related...  

Broader source: Energy.gov (indexed) [DOE]

Questions concerning this policy flash should be directed to Karina Edmonds, Technology Transfer Coordinator, at (202) 586-2678 or at karina.edmonds@hq.doe.gov. Flash 2013-26...

224

Policy Flash 2012-60 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Policy Flash 2012-60 Acquisition Guide Chapter 13.1, Purchase Card Policy and Operating Procedures Questions concerning this policy flash should be directed to Denise T. Clarke...

225

Policy Flash 2014-38 Federal Acquisition Circular (FAC) 2005...  

Energy Savers [EERE]

4-38 Federal Acquisition Circular (FAC) 2005-76 Policy Flash 2014-38 Federal Acquisition Circular (FAC) 2005-76 Questions concerning this policy flash should be directed to Jason...

226

POLICY FLASH 2014-31 Federal Acquisition Circulars (FACs) 2005...  

Energy Savers [EERE]

POLICY FLASH 2014-31 Federal Acquisition Circulars (FACs) 2005-73 and 2005-74 POLICY FLASH 2014-31 Federal Acquisition Circulars (FACs) 2005-73 and 2005-74 Questions concerning...

227

Policy Flash 2012-18 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

A corrected matrix is attached. Attachment - Federal Acquisition Regulation Clause Usage Guide PolicyFlash2012-18.pdf PolicyFlash2012-18Attachment.pdf More Documents &...

228

Type B Accident Investigation of the January 10, 2006, Flash...  

Office of Environmental Management (EM)

January 10, 2006, Flash Fire and Injury at the Savannah River National Laboratory Type B Accident Investigation of the January 10, 2006, Flash Fire and Injury at the Savannah River...

229

Policy Flash 2012-37 | Department of Energy  

Office of Environmental Management (EM)

37 Policy Flash 2012-37 Attached is Policy Flash 2012-37 Acquisition Guide Chapter 4.6 - Assigning Identifying Numbers Outside of the Strategic Integrated Procurement Enterprise...

230

Policy Flash 2012-47 | Department of Energy  

Energy Savers [EERE]

7 Policy Flash 2012-47 Attached is Policy Flash 2012-47: Delay of Rollout of the System for Award Management (SAM) by the General Services Administration (GSA) Questions should be...

231

Policy Flash 2011-95 | Department of Energy  

Energy Savers [EERE]

5 Policy Flash 2011-95 On July 21, 2011, the Department issued a Contractor Requirements Document (CRD) for DOE O 452.8, Control of Nuclear Weapons Data Policy Flash 2011-950.pdf...

232

Policy Flash 2013-57 New Strategic Sourcing Acquisition Guide...  

Energy Savers [EERE]

57 New Strategic Sourcing Acquisition Guide Chapter 7.2 Policy Flash 2013-57 New Strategic Sourcing Acquisition Guide Chapter 7.2 Questions concerning this policy flash should be...

233

Policy Flash 2012-45 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

5 Policy Flash 2012-45 Attached is Policy Flash 2012-45 Rollout of the System for Award Management (SAM) by the General Services Administration (GSA) Questions should be directed...

234

Policy Flash 2011-101 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

1 Policy Flash 2011-101 Flash 2011-101 - OFPP Policy Letter 11-01, Performance of Inherently Governmental and Critical Functions. On September 12, 2011, the Office of Federal...

235

Policy Flash 2014-11 Federal Acquisition Circular (FAC) 2005...  

Broader source: Energy.gov (indexed) [DOE]

1 Federal Acquisition Circular (FAC) 2005-71 Policy Flash 2014-11 Federal Acquisition Circular (FAC) 2005-71 Questions concerning this policy flash should be directed to Barbara...

236

Policy Flash 2013-37 Federal Acquisition Circular (FAC) 2005...  

Energy Savers [EERE]

37 Federal Acquisition Circular (FAC) 2005-66 Policy Flash 2013-37 Federal Acquisition Circular (FAC) 2005-66 Attached is Policy Flash 2013-37 Federal Acquisition Circular (FAC)...

237

Policy Flash 2012-44 | Department of Energy  

Energy Savers [EERE]

4 Policy Flash 2012-44 Attached is POLICY FLASH 2012-44 Congressional Notifications- Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2 Section 2.6.1...

238

Policy Flash 2013-27 Federal Acquisition Circular (FAC) 2005...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

27 Federal Acquisition Circular (FAC) 2005-65 Policy Flash 2013-27 Federal Acquisition Circular (FAC) 2005-65 Attached is Policy Flash 2013-27 Federal Acquisition Circular (FAC)...

239

Policy Flash 2012-33 | Department of Energy  

Energy Savers [EERE]

3 Policy Flash 2012-33 Attached Policy Flash 2012-33 DOE O 580.1A Department of Energy Personal Property Management Program. Questions regarding the contracts intended to be...

240

Policy Flash 2011-100 | Department of Energy  

Office of Environmental Management (EM)

00 Policy Flash 2011-100 The Department issued Contractor Requirements Documents (CRDs) for the subject Directives on August 30, 2011. PolicyFlash2011-100.pdf More Documents &...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Policy Flash 2013-36 Update to Congressional Notifications -...  

Office of Environmental Management (EM)

Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Policy Flash 2013-36 Update to...

242

Policy Flash 2012-33 | Department of Energy  

Office of Environmental Management (EM)

2-33 Policy Flash 2012-33 Attached Policy Flash 2012-33 DOE O 580.1A Department of Energy Personal Property Management Program. Questions regarding the contracts intended to be...

243

Policy Flash 2012-37 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 Policy Flash 2012-37 Attached is Policy Flash 2012-37 Acquisition Guide Chapter 4.6 - Assigning Identifying Numbers Outside of the Strategic Integrated Procurement Enterprise...

244

Policy Flash 2009-01 Tips for Processing Financial Assistance...  

Energy Savers [EERE]

09-01 Tips for Processing Financial Assistance Actions in STRIPES Policy Flash 2009-01 Tips for Processing Financial Assistance Actions in STRIPES Attached is Policy Flash 2009-01...

245

Policy Flash 2012-14 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

14 Policy Flash 2012-14 With reference to Policy Flash 2012-02, Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices, and OMB Memorandum M-11-32,...

246

Policy Flash 2012-4 | Department of Energy  

Energy Savers [EERE]

4 Policy Flash 2012-4 This Flash is issued to provide you an Acquisition Letter containing information and guidance regarding application of labor standards at the Department of...

247

Policy Flash 2012-13 | Department of Energy  

Office of Environmental Management (EM)

Policy Flash 2012-13 Policy Flash 2012-13 Attached for your information is a list of FAR amendments published in today's Federal Register (76 FR 68027, November 2, 2011)....

248

FLASH2011-2-OPAM | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

FLASH2011-2-OPAM FLASH2011-2-OPAM POLITICAL ACTIVITY AT DOE FACILITIES OR BY DOE CONTRACTORS 2011-2 Attachment 1 Political Activity at DOE Facilities or by DOE Contractors, which...

249

Flash2011-72 OPAM | Department of Energy  

Energy Savers [EERE]

2 OPAM Flash2011-72 OPAM DOE O 414.1D Quality Assurance DOE O 226.1B Implementation of Department of Energy Oversight Policy Flash2011-72 OPAM More Documents & Publications Policy...

250

Policy Flash 2011-72 | Department of Energy  

Office of Environmental Management (EM)

72 Policy Flash 2011-72 DOE O 414.1D Quality Assurance and DOE O 226.1B Implementation of Department of Energy Oversight Policy PolicyFlash2011-72.pdf More Documents &...

251

Policy Flash 2012-23 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3 Policy Flash 2012-23 Attached is Policy Flash 2012-23 FAR Part 17 Special Contracting Methods and Part 35 Research and Development Contracting. Updated 22812. Revisions to FAR...

252

Sunset science. III. Visual adaptation and green flashes  

Science Journals Connector (OSTI)

Photographs of green flashes do not preclude a role for physiological effects in these phenomena. While green flashes are certainly not after-images, there is compelling evidence that...

Young, Andrew T

2000-01-01T23:59:59.000Z

253

Policy Flash 2013-07 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 Policy Flash 2013-07 The attached Flash announces the issuance of AL 2013-01 on Contractor Extended Personnel Assignments. This AL provide additional guidance on the earlier SPEs...

254

Policy Flash 2012-68 | Department of Energy  

Office of Environmental Management (EM)

is Policy Flash 2012-68 Political Activity Questions should be directed to Kevin Smith at (202) 287-1705 or kevin.m.smith@hq.doe.gov. Policy Flash 2012-68 Contractor...

255

POlicy Flash 2013-60 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Flash 2013-60 Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov...

256

Policy Flash 2011-49 OPAM | Department of Energy  

Energy Savers [EERE]

2011-49 OPAM DOE O 458.1 Admin Chg 1, Radiation Protection of the Public and the Environment Policy Flash 2011-49 OPAM More Documents & Publications Flash2011-45 OPAM...

257

Flash2011-32 OPAM | Department of Energy  

Office of Environmental Management (EM)

and Assignments Program Flash2011-32 OPAM More Documents & Publications FAQS Job Task Analyses - NNSA Package Certification Engineer Attachment FY2011-3(2) OPAM Flash 2011-58-OPAM...

258

Policy Flash 2012-27 | Department of Energy  

Energy Savers [EERE]

7 Policy Flash 2012-27 Below is Policy Flash 2012-27 and an attachment, a summary of Federal Acquisition Circular 2005-56. PolicyFlash2012-27.pdf AttachmentFAC2005-56Summary.p...

259

TERRESTRIAL GAMMA-RAY FLASH PRODUCTION BY LIGHTNING  

E-Print Network [OSTI]

TERRESTRIAL GAMMA-RAY FLASH PRODUCTION BY LIGHTNING A DISSERTATION SUBMITTED TO THE DEPARTMENT gamma-ray flashes (TGFs) are brief flashes of gamma-rays originating in the Earth's atmosphere) that extends from below 25 keV to above 20 MeV. When good lightning data exists, TGFs are closely associated

260

MICROSECOND-SCALE ELECTRIC FIELD PULSES IN CLOUD LIGHTNING FLASHES  

E-Print Network [OSTI]

-149- 30F3 MICROSECOND-SCALE ELECTRIC FIELD PULSES IN CLOUD LIGHTNING FLASHES Y. Villanueva, V tape-recorded data) for ground flashes by Rakov et al. [5]. Note that the K process in a lightning-scale pulses in different stages of cloud flashes in Florida and New Mexico are analyzed. The pulse occurrence

Florida, University of

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

How players value their characters in world of warcraft  

Science Journals Connector (OSTI)

Characters in games such as World of Warcraft allow players to act in the game world and to interact with others. Game characters and avatars are a mediated form of self-representation for the player, but some research suggests that players also view ... Keywords: avatars, character value, characters, world of warcraft

Ian J. Livingston; Carl Gutwin; Regan L. Mandryk; Max Birk

2014-02-01T23:59:59.000Z

262

POLICY FLASH 2014-16 In September 2012, DOE issued Policy Flash...  

Broader source: Energy.gov (indexed) [DOE]

6 In September 2012, DOE issued Policy Flash 2012-67, Acquisition Savings Reporting Template Guidance to fully comply with reporting requirements. This is an update to that Policy...

263

Policy Flash 2014-10 Update to Congressional Notifications - Full  

Broader source: Energy.gov (indexed) [DOE]

0 Update to Congressional Notifications - Full 0 Update to Congressional Notifications - Full Implementation of Advanced Notification of Awards (ANA) System Policy Flash 2014-10 Update to Congressional Notifications - Full Implementation of Advanced Notification of Awards (ANA) System The ANA system can be accessed directly at: https://iportalwc.doe.gov/pls/apex/f?p=ANA This flash and its attachments may be viewed at http://management.energy.gov/policy_guidance/policy_flashes.htm. Questions concerning this policy flash should be directed to Elle Clayton at 202-287-1444 or ellen.clayton@hq.doe.gov. New Policy_Flash_2013- ANA1172013 ec.pdf ANA User's Guide.pdf More Documents & Publications POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL IMPLEMENTATION OF ANA SYSTEM Policy Flash 2013-36 Update to Congressional Notifications - Acquisition

264

Policy Flash 2012-2 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Policy Flash 2012-2 Policy Flash 2012-2 Policy Flash 2012-2 OMB Memorandum M-11-32, "Accelerating Payment to Small Businesses for Goods and Services," established an Executive Branch policy to pay small business invoices as quickly as practicable, with a goal of paying within 15 days. Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices is revised to implement this policy. Attachment 1 - Acquisition Guide Chapter 32.1, Reviewing and Approving Contractor Invoices (updated October 2011) Attachment 2 - Memo from OMB M-11-32, Accelerating Payment to Small Businesses for Goods and Services Policy_Flash_2012-02.pdf Policy_Flash_2012-02_Attachment_1_0.pdf Policy_Flash_2012-02_Attachment_2_0.pdf More Documents & Publications Policy Flash 2012-14 Chapter 32 - Contract Financing

265

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

266

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

267

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

268

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Broader source: Energy.gov (indexed) [DOE]

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

269

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

270

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

271

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

272

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

273

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

274

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Broader source: Energy.gov (indexed) [DOE]

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

275

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

276

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

277

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

278

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

279

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

280

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

282

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

283

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Broader source: Energy.gov (indexed) [DOE]

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

284

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

285

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

286

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Broader source: Energy.gov (indexed) [DOE]

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

287

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

288

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

289

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Broader source: Energy.gov (indexed) [DOE]

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

290

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

291

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

292

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Broader source: Energy.gov (indexed) [DOE]

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

293

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

294

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

295

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

296

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

297

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

298

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

299

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

300

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

302

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

303

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

304

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

305

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

306

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

307

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Broader source: Energy.gov (indexed) [DOE]

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

308

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

309

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

310

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

311

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Broader source: Energy.gov (indexed) [DOE]

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

312

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

313

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

314

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Broader source: Energy.gov (indexed) [DOE]

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

315

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

316

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

317

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

318

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

319

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

320

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Broader source: Energy.gov (indexed) [DOE]

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

322

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

323

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

324

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

325

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

326

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Broader source: Energy.gov (indexed) [DOE]

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

327

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

328

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

329

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Broader source: Energy.gov (indexed) [DOE]

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

330

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Broader source: Energy.gov (indexed) [DOE]

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

331

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

332

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

333

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

334

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

335

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

336

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Broader source: Energy.gov (indexed) [DOE]

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

337

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

338

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

339

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

340

Flash2006-23Attachment.doc  

Broader source: Energy.gov (indexed) [DOE]

CORRECTION NOTICE FLASH 2005-23 CORRECTION NOTICE FLASH 2005-23 SUMMARY OF CHANGES IN MAKE-OR-BUY ELIMINATION A study of the Make-or-Buy process concluded that it was costly to administer and did not produce the expected benefits. 1. Section 901.105 is amended to remove the reference to the Make-or-Buy paperwork clearance under the Paperwork Reduction Act. 2. Section 970.1504-4-1, Make-or-Buy Plans, is removed. It included 970.1504-4-2, Policy, and 970.1504-3, Requirements. 3. Section 970.1504-5(b) is removed. It was the instruc tion for use of the Make-or-Buy Plan clause. 4. Section 970.5203-1, Management Controls, is amended to include outsourcing of functions as a consideration of efficient and effective operations. 5. Section 970.5203-2, Performance improvement and collaboratio

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

F POLICY FLASH 2009-24  

Broader source: Energy.gov (indexed) [DOE]

POLICY FLASH 2009-24 POLICY FLASH 2009-24 1 DATE: TO: FROM: r February 12,2009 Procurement Directors Office of Procurement and Assistance Management SUBJECT: Management of Excess Weapons Inventories and Selective Sensitive Equipment SUMMARY: A recent Office of Inspector General (OIG) audit identified opportunities for improving the Department of Energy (DOE) management of excess weapons and its processes for identifying and tracking of sensitive items. Specifically, the OIG recommended that DOE amend existing guidance to ensure that appropriate processes are in place to effectively manage excess inventories of weapons, and to ensure the timely declaration of excess weapons. The OIG also recommended that DOE update its guidance regarding the identification of high risklsensitive equipment.

342

Electrical Safety and Arc Flash Protections  

SciTech Connect (OSTI)

Over the past four years, the Electrical Safety Program at PPPL has evolved in addressing changing regulatory requirements and lessons learned from accident events, particularly in regards to arc flash hazards and implementing NFPA 70E requirements. This presentation will discuss PPPL's approaches to the areas of electrical hazards evaluation, both shock and arc flash; engineered solutions for hazards mitigation such as remote racking of medium voltage breakers, operational changes for hazards avoidance, targeted personnel training and hazard appropriate personal protective equipment. Practical solutions for nominal voltage identification and zero voltage checks for lockout/tagout will also be covered. Finally, we will review the value of a comprehensive electrical drawing program, employee attitudes expressed as a personal safety work ethic, integrated safety management, and sustained management support for continuous safety improvement.

R. Camp

2008-03-04T23:59:59.000Z

343

Flash pyrolysis and hydropyrolysis of biomass  

SciTech Connect (OSTI)

Process chemistry data on the flash pyrolysis and hydropyrolysis of wood is being obtained in a 1'' downflow entrained tubular reactor. The data indicates that at residence times of <1 second, and 900 to 1000/sup 0/C and 500 psi pressure, the flash hydropyrolysis of wood yields mainly methane and water. As the residence time increases to >3 seconds, the products are methane and CO. Almost complete conversion of the carbon to methane and CO are obtained in these experiments. At lower temperatures, in the order of 800/sup 0/C, 500 psi and residence times <4 seconds, significant amounts of benzene and ethane are produced. The experimental process chemistry data have been used to design and evaluate two processes in a preliminary manner. One process converts wood to high BTU pipeline gas and the other to methanol and chemical feedstocks consisting of benzene and ethylene. Reasonable plant investments which compare favorably with coal conversion plant estimates are derived.

Not Available

1982-08-01T23:59:59.000Z

344

Flash flooding events in south central Texas  

E-Print Network [OSTI]

. Heights in Peters. (Fran Henry, 1981 I. TABLE 1. Station information for Del Rio, Stephenville, and Victoria (from Henry, 1981). Station Name Station Number Call Elevation Letters m Latitude Lon itude Del Rio 72261 Stephenville 72Z60 Victoria... Totals Index (TTI) was computed for each rawinsonde station using the following formula: 16 TABLE 5. Neteorological elements used to determine the state of the atmosphere orior to flash flooding events over South Central Texas in a triangular area...

Utley, Tom Wilson

2012-06-07T23:59:59.000Z

345

Thermal Decomposition of Molecules Relevant to Combustion and Chemical Vapor Deposition by Flash Pyrolysis Time-of-Flight Mass Spectrometry  

E-Print Network [OSTI]

of Small Molecules by Flash Pyrolysis, University ofwas performed using flash pyrolysis vacuum-ultraviolet time-Vapor Deposition by Flash Pyrolysis Time-of-Flight Mass

Lemieux, Jessy Mario

2013-01-01T23:59:59.000Z

346

Policy Flash 2013-01 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3-01 3-01 Policy Flash 2013-01 Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov for the AL or Richard Bonnell at (202) 287-1747 or at richard.bonnell@hq.doe.gov for the FAL. Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov for the AL or Richard Bonnell at (202) 287-1747 or at richard.bonnell@hq.doe.gov for the FAL. More Documents & Publications Policy Flash 2013-1 Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Policy Flash 2013-31 Class Deviation from the Federal Acquisition

347

Policy Flash 2013-12 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2 2 Policy Flash 2013-12 Attached is Policy Flash 2013-12 Section 301(b) Congressional Notification of Multi-year Contract Award Report Revision for Fiscal Year 2013 Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning completing the spreadsheet should be directed to Casey Pearce at (202) 287-5810 or at casey.pearce@hq.doe.gov. Policy Flash 2013-12 FY 2013 301(b) reporting revision.pdf Updated 301(b) Spreadsheet.xlsx More Documents & Publications Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Policy Flash 2013-53 Implementation of Division F, Title I, II, III AL

348

Policy Flash 2013-05 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5 5 Policy Flash 2013-05 Attached is Policy Flash 2013-05 Class Deviation from the Federal Acquisition Regulation (FAR) to Implement Office of Management and Budget (OMB) Policy Memorandum M-12-16, Providing Prompt Payment to Small Business Subcontractors. Questions concerning this policy flash should be directed to Nancy Harvey of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at Nancy.Harvey@hq.doe.gov. Class Deviation -Providing Prompt Payment 2013-05.pdf Signed Deviation Bosco-Waddell w-attachement.pdf More Documents & Publications Policy Flash 2014-11 Federal Acquisition Circular (FAC) 2005-71 Policy Flashes FY 2013 Policy Flash 2013-69 Extension of Policy to Provide accelerated payment to

349

Policy Flash 2013-20 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0 0 Policy Flash 2013-20 Attached is Policy Flash 2013-20 Section 311 Revised Template January 4 2013 Questions concerning this policy flash should be directed to Barbara Binney, Office of Contract and Financial Assistance Policy Division at (202) 287-1340 or at Barbara.Binney@hq.doe.gov. Attachment 1 DOE Section 311 Contract Award Letter revised Jan 4 2013.pdf Attachment 2A DOE Section 311 Financial Assistance Letter revised Jan 4 2013.pdf Attachment 2B DOE Section 311 Financial Assistance Letter revised Jan 4 2013.pdf Policy flash 2013-20 Section 311 revised templateJan 4 2013.pdf More Documents & Publications Policy Flash 2013-22 Section 311 Revised Template January 24 2013 Policy Flash 2012-59 Letter to Congress RE: Office of Civilian Radioactive Waste Management's

350

Arc Flash Boundary Calculations Using Computer Software Tools  

SciTech Connect (OSTI)

Arc Flash Protection boundary calculations have become easier to perform with the availability of personal computer software. These programs incorporate arc flash protection boundary formulas for different voltage and current levels, calculate the bolted fault current at each bus, and use built in time-current coordination curves to determine the clearing time of protective devices in the system. Results of the arc flash protection boundary calculations can be presented in several different forms--as an annotation to the one-line diagram, as a table of arc flash protection boundary distances, and as printed placards to be attached to the appropriate equipment. Basic arc flash protection boundary principles are presented in this paper along with several helpful suggestions for performing arc flash protection boundary calculations.

Gibbs, M.D.

2005-01-07T23:59:59.000Z

351

A Flashing Binary Combined Cycle For Geothermal Power Generation | Open  

Open Energy Info (EERE)

Flashing Binary Combined Cycle For Geothermal Power Generation Flashing Binary Combined Cycle For Geothermal Power Generation Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A Flashing Binary Combined Cycle For Geothermal Power Generation Details Activities (0) Areas (0) Regions (0) Abstract: The performance of a flashing binary combined cycle for geothermal power generation is analysed. It is proposed to utilize hot residual brine from the separator in flashing-type plants to run a binary cycle, thereby producing incremental power. Parametric variations were carried out to determine the optimum performance of the combined cycle. Comparative evaluation with the simple flashing plant was made to assess its thermodynamic potential and economic viability. Results of the analyses indicate that the combined cycle can generate 13-28% more power than the

352

V-053: Adobe Shockwave player installs Xtras without prompting | Department  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe Shockwave player installs Xtras without prompting 3: Adobe Shockwave player installs Xtras without prompting V-053: Adobe Shockwave player installs Xtras without prompting December 24, 2012 - 12:15am Addthis PROBLEM: Adobe Shockwave player installs Xtras without prompting PLATFORM: Adobe Shockwave Player ABSTRACT: A vulnerability was reported in Adobe Shockwave. REFERENCE LINKS: Vulnerability Note VU#519137 SecurityTracker Alert ID: 1027903 Bugtraq ID: 56972 CVE-2012-6271 IMPACT ASSESSMENT: Medium DISCUSSION: Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra. IMPACT: By convincing a user to view a specially crafted Shockwave content, an attacker may be able to execute arbitrary code with the privileges of the

353

Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressio...  

Office of Environmental Management (EM)

4 Continuing Appropriations Act, 2014 -- Congressional Notification of Pending Contract or Financial Assistance Actions Policy Flash 2014-04 Continuing Appropriations Act, 2014 --...

354

Policy Flash 2014-29 Acquisition Letter 07 - Benchmark Compensation...  

Energy Savers [EERE]

07 - Benchmark Compensation Amount for Individual Executive Salary Actions Policy Flash 2014-29 Acquisition Letter 07 - Benchmark Compensation Amount for Individual Executive...

355

Flash2008-39attachment.pdf | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Award Actions Microsoft PowerPoint - changeorders Policy Flash 2014-01 Acquisition Guide 15.4-3 Negotiation Documentation: Pre-negotiation Plan & the Price Negotiation Memorandum...

356

Policy Flash 2013-65 Procurement Evaluation & Re-Engineering...  

Broader source: Energy.gov (indexed) [DOE]

Team (PERT) and Establishment of a 5-year Cycle with Corresponding Schedule Policy Flash 2013-65 Procurement Evaluation & Re-Engineering Team (PERT) and Establishment of...

357

Policy Flash 2012-6 | Department of Energy  

Office of Environmental Management (EM)

6 Policy Flash 2012-6 Office of Federal Procurement Policy's (OFPP) memorandum, dated September 29, 2011, Development, Review and Approval of Business Cases for Certain Interagency...

358

Policy Flash 2013-30 Acquisition Letter on Acquisition Planning...  

Energy Savers [EERE]

Letter on Acquisition Planning Considerations for Management and Operating Contracts Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management...

359

Policy Flash 20 Acquisition Letter 2014-05/Financial Acquisition...  

Energy Savers [EERE]

Appropriations Committees Subject to Energy and Water Development and Related Agencies Policy Flash 20 Acquisition Letter 2014-05Financial Acquisition Letter 2014-02 Congressional...

360

POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL...  

Broader source: Energy.gov (indexed) [DOE]

0 UPDATE TO CONGRESSIONAL NOTIFICATION FULL IMPLEMENTATION OF ANA SYSTEM POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION FULL IMPLEMENTATION OF ANA SYSTEM An updated...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Policy Flash 2014-32 General Accountability Office Report (GAO...  

Broader source: Energy.gov (indexed) [DOE]

to Improve Oversight of Work performed for non-DOE Entities (GAO 1478 October 2013) Policy Flash 2014-32 General Accountability Office Report (GAO) final report entitled...

362

Policy Flash 2014-06 Affirmative procurement of biobased products...  

Broader source: Energy.gov (indexed) [DOE]

of biobased products under service and construction contracts (FAR clause 52.223-2) Policy Flash 2014-06 Affirmative procurement of biobased products under service and...

363

Policy Flash 2015-04-Class Deviation: Min Wage  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Sharon Archer of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management...

364

POLICY FLASH 2014-15 Determination of Benchmark Compensation...  

Broader source: Energy.gov (indexed) [DOE]

5 Determination of Benchmark Compensation Amount for Certain Executives and Employees POLICY FLASH 2014-15 Determination of Benchmark Compensation Amount for Certain Executives and...

365

Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressio...  

Broader source: Energy.gov (indexed) [DOE]

2014 -- Congressional Notification of Pending Contract or Financial Assistance Actions Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressional Notification of...

366

Policy Flash 2011-2 Attachment 1 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 Policy Flash 2011-2 Attachment 1 During election seasons, questions arise regarding political activities on DOE facilities or using DOE email addresses. The General Counsel has...

367

Policy Flash 2015-12 Service Contracts Reporting (SCR) Requirements  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Carol Jenkins at 202-287-1827 or carol.jenkins@hq.doe.gov.

368

Policy Flash 2012-52 | Department of Energy  

Office of Environmental Management (EM)

Attached is Policy Flash 2012-52 The Deputy Secretary's Memorandum on Reporting Conference Related Activities and Spending Reporting Conference Related Activities and...

369

Policy Flash 2014-22 Chart Supplement to Acquistion Guide  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Michael Righi of the Contract and Financial Assistance Policy Division, Office of Policy, Office Acquisition and Project Management at ...

370

POLICY FLASH 2013-58 Revised Guide for Financial Assistance  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Ellen Colligan at (202) 287-1776 or Ellen.colligan@hq.doe.gov.

371

Policy Flash 2012-31 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Foreign Travel. Questions concerning this policy flash should be directed to Kevin M. Smith of the Contract and Financial Assistance Policy Division, Office of Policy, Office of...

372

Policy Flash 2012-40 | Department of Energy  

Office of Environmental Management (EM)

Matters Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division at (202) 287-1614 or at...

373

Policy Flash 2013-14 | Department of Energy  

Energy Savers [EERE]

Requirement Questions concerning this policy flash should be directed to Kevin Smith of the Contract and Financial Assistance Policy Division, Office of Policy, Office of...

374

Policy Flash 2012-7 | Department of Energy  

Office of Environmental Management (EM)

Sustainable Acquisition and Reporting Attachment 2 - Memo from DOD, Reporting Sustainability Attributes to the Federal Procurement Data System (FPDS) PolicyFlash2012-07.pdf...

375

EmoPlayer: A media player for video clips with affective annotations  

Science Journals Connector (OSTI)

......components of human skills such as active listening, empathy, and sympathy. Additionally...pixels. Since participants used a pointing device to interact with EmoPlayer and not all...IntelliMouse Optical mouse was employed as input device, and all participants used the external......

Ling Chen; Gen-Cai Chen; Cheng-Zhe Xu; Jack March; Steve Benford

2008-01-01T23:59:59.000Z

376

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

81 - 22590 of 28,560 results. 81 - 22590 of 28,560 results. Article U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information Several vulnerabilities were reported in Adobe Flash Player. http://energy.gov/cio/articles/u-241-adobe-flash-player-bugs-let-remote-users-execute-arbitrary-code-and-obtain Article Energy Efficiency Upgrades Part of Winning Formula for Oregon School District After a decade of hard economic times, a rural Oregon community celebrates the opening of a new energy-efficient school. http://energy.gov/articles/energy-efficiency-upgrades-part-winning-formula-oregon-school-district Download International Refrigeration: Proposed Penalty (2012-CE-1510) DOE alleged in a Notice of Proposed Civil Penalty that International Refrigeration Products failed to certify a various room air conditioners as

377

Digital Photography with Flash and No-Flash Image Pairs Georg Petschnigg Maneesh Agrawala Hugues Hoppe  

E-Print Network [OSTI]

: This candlelit setting from the wine cave of a castle is difficult to photograph due to its low light nature include denoising and detail transfer (to merge the ambient qualities of the no-flash image with the high demonstrate how these applications can synthesize new images that are of higher quality than either

Cohen, Michael

378

Ionization Chambers in the FLASH Dump Line  

E-Print Network [OSTI]

. 7, 2010FLASH Seminar, Dec. 7, 2010 BPM 13DUMP Dump Line Upgrade 2009Dump Line Upgrade 2009 BPM 9DUMP BPM 5DUMP Toroid 9DUMP OTR screen 9DUMP BLM 14DUMP BLM 13.1DUMP 13.2DUMP BLM 9DUMP BLM 6DUMP BLM 1.1DUMP 1.2DUMP BPM 10DUMP BPM 16DUMP 8 x BHM 16DUMP BLM 14R.DUMP 14L.DUMP 14U.DUMP 14D.DUMP Ionization

379

Policy FLash 2014-36 FAC 2005-75 | Department of Energy  

Energy Savers [EERE]

FLash 2014-36 FAC 2005-75 Policy FLash 2014-36 FAC 2005-75 Questions concerning this policy flash should be directed to Jason Taylor, of the Contract and Financial Assistance...

380

Policy FLash 2013-72 Acqusition Guide 43.2 Change Order ADministration...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

FLash 2013-72 Acqusition Guide 43.2 Change Order ADministration Policy FLash 2013-72 Acqusition Guide 43.2 Change Order ADministration Questions concerning this policy flash should...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Policy Flash 2015-04-Class Deviation: Min Wage | Department of...  

Office of Environmental Management (EM)

Policy Flash 2015-04-Class Deviation: Min Wage Policy Flash 2015-04-Class Deviation: Min Wage Questions concerning this policy flash should be directed to Sharon Archer of the...

382

Policy Flash 2013-45 Source Selection Guide | Department of Energy  

Energy Savers [EERE]

Policy Flash 2013-45 Source Selection Guide Policy Flash 2013-45 Source Selection Guide Questions concerning this policy flash should be directed to Jeff Burgan at (865) 241-2513...

383

Policy_Flash_2011-85__Attachment_2.pdf | Department of Energy  

Energy Savers [EERE]

PolicyFlash2011-85Attachment2.pdf PolicyFlash2011-85Attachment2.pdf PolicyFlash2011-85Attachment2.pdf More Documents & Publications Attachment FY2011-46(1) OPAM...

384

Policy Flash 2014-18 Complex-Wide Strategic Sourcing | Department...  

Broader source: Energy.gov (indexed) [DOE]

Policy Flash 2014-18 Complex-Wide Strategic Sourcing Policy Flash 2014-18 Complex-Wide Strategic Sourcing Questions concerning this policy flash should be directed to Scott Clemons...

385

Policy_Flash_2011-59__Attachment.pdf | Department of Energy  

Energy Savers [EERE]

PolicyFlash2011-59Attachment.pdf PolicyFlash2011-59Attachment.pdf PolicyFlash2011-59Attachment.pdf More Documents & Publications PartnershipAgreementsTraining&0;...

386

767JUNE 2003AMERICAN METEOROLOGICAL SOCIETY | ositive lightning discharges (flashes) are defined  

E-Print Network [OSTI]

767JUNE 2003AMERICAN METEOROLOGICAL SOCIETY | P ositive lightning discharges (flashes) are defined (flashes) that transfer to ground both positive and negative charges are termed bipolar lightning common than positive lightning. Currently available observations of bipolar lightning flashes, which can

Florida, University of

387

AttachmentFlash2011-2 -(2)-OPAM | Department of Energy  

Energy Savers [EERE]

AttachmentFlash2011-2 -(2)-OPAM AttachmentFlash2011-2 -(2)-OPAM REQUESTS BY POLITICAL CANDIDATES TO TOUR DOE FACILITIES AttachmentFlash2011-2 -(2)-OPAM More Documents &...

388

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network [OSTI]

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

389

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

390

Flash Memory Garbage Collection in Hard Real-Time Systems  

E-Print Network [OSTI]

-date behavior and time consuming garbage collection mechanism, NAND-based flash memory is difficult to integrate into hard-real-time embedded systems. In this thesis, I propose a performance model for flash memory garbage collection that can be used...

Lai, Chien-An

2012-10-19T23:59:59.000Z

391

FLASH2011-6-OPAM | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

FLASH2011-6-OPAM FLASH2011-6-OPAM THE SMALL BUSINESS JOBS ACT OF 2010 H.R. 5297 2011-6 Attachment 1 Summary of Public Law 111-240 The Small Business Jobs Act of 2010 2011-6...

392

Terrestrial gamma ray flash production by active lightning leader channels  

E-Print Network [OSTI]

Terrestrial gamma ray flash production by active lightning leader channels B. E. Carlson,1 N. G 28 October 2010. [1] The production of terrestrial gamma ray flashes (TGFs) requires a seed energetic electron source and a strong electric field. Lightning leaders naturally provide seed electrons by cold

Bergen, Universitetet i

393

Microfluidic Flow-Flash: Method for Investigating Protein Dynamics  

E-Print Network [OSTI]

Microfluidic Flow-Flash: Method for Investigating Protein Dynamics Michael W. Toepke, Scott H Institute, Troy, New York 12180 We report a new method, microfluidic flow-flash, for measuring protein reaction kinetics. The method couples a microscope imaging detection system with a microfluidic flow cell

Kenis, Paul J. A.

394

POLICY FLASH 2014-23 Acquisition Guide 13.3 Simplified Acquisition...  

Broader source: Energy.gov (indexed) [DOE]

23 Acquisition Guide 13.3 Simplified Acquisition Procedures POLICY FLASH 2014-23 Acquisition Guide 13.3 Simplified Acquisition Procedures Questions concerning this policy flash...

395

Thermo-fluid Dynamics of Flash Atomizing Sprays and Single Droplet Impacts  

E-Print Network [OSTI]

in two-phase flashing propane jets. Part one: velocitymeasurements in two-phase propane releases . in Proceedingsin two-phase flashing propane jets. Part one: velocity

Vu, Henry

2010-01-01T23:59:59.000Z

396

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

397

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

398

Policy Flash 2012-8 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2-8 2-8 Policy Flash 2012-8 Reference earlier Policy Flash 2011-103, Consent to Subcontracts on Management and Operating Contracts. The Flash had discussed the possibility of an Acquisition Letter and possibly a DEAR amendment to improve Consent to Subcontract efficiency and to ensure we apply our limited resources to those subcontract actions that truly pose the most risk. Closer analysis revealed that only a change to Acquisition Guide Chapter 70.7, Chapter 10, paragraph B, was needed to accomplish these process improvements. Attachment - Acquisition Guide Chapter 70.7, Chapter 10, Subcontractor Management (Revised October 19, 2011) Policy_Flash_2012-08.pdf Policy_Flash_2012-08_Attachment.pdf More Documents & Publications Microsoft Word - Chapter 10_2006_Jun

399

Policy Flash 2012-12 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

12 12 Policy Flash 2012-12 As described in Policy Flash 2011-44, the Office of Federal Procurement Policy (OFPP) memorandum entitled "Myth-Busting: Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process" required agencies to develop and submit a high-level vendor communication plan for OFPP approval. DOE's approved plan is attached. Attachment 1 - DOE Vendor Communication Plan Attachment 2 - Memo from OFPP titled "Myth-Busting": Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process Policy_Flash_2012-12.pdf Policy_Flash_2012-12_Attachment_1.pdf Policy_Flash_2012-12_Attachment_2.pdf More Documents & Publications MEMORANDUM FOR CHIEF ACQUISITION OFFICERS OFPP "Myth-busting" Memo (2/2/11)

400

Policy Flash 2013-29 Leveraging the General Services Administration's  

Broader source: Energy.gov (indexed) [DOE]

9 Leveraging the General Services 9 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Policy Flash 2013-29 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Attached is Policy Flash 2013-29: Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Questions concerning this policy flash should be directed to Denise T. Clarke of the Office of Acquisition and Project Management, Strategic Programs Division at (202) 287-1748 or at DeniseT.Clarke@hq.doe.gov. POLICY_FLASH_2013_28 Leveraging GSA SmartPay2.pdf Signed_Memo with_ attachments.pdf More Documents & Publications Policy Flash 2013-50 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Policy Flash 2012-12 | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

12 12 Policy Flash 2012-12 As described in Policy Flash 2011-44, the Office of Federal Procurement Policy (OFPP) memorandum entitled "Myth-Busting: Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process" required agencies to develop and submit a high-level vendor communication plan for OFPP approval. DOE's approved plan is attached. Attachment 1 - DOE Vendor Communication Plan Attachment 2 - Memo from OFPP titled "Myth-Busting": Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process Policy_Flash_2012-12.pdf Policy_Flash_2012-12_Attachment_1.pdf Policy_Flash_2012-12_Attachment_2.pdf More Documents & Publications MEMORANDUM FOR CHIEF ACQUISITION OFFICERS Attachment FY2011-44 OPAM

402

Policy Flash 2012-44 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4 4 Policy Flash 2012-44 Attached is POLICY FLASH 2012-44 Congressional Notifications- Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2 Section 2.6.1 Questions concerning this policy flash and the acquisition guide chapter should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning this policy flash and the financial assistance guide chapter should be directed to Ellen Colligan at (202) 287-1767 or Ellen.colligan@hq.doe.gov. For STRIPES, ANA System, or iPortal questions, contact the Energy IT Services (EITS) Service Desk at (301) 903-2500 or email EITSServiceDesk@hq.doe.gov. Policy_Flash_2012-44_0.pdf AcqGuide5pt1 for contracts only.pdf Advanced Notification of Awards (ANA) User Guide.pdf

403

Policy Flash 2013-30 Acquisition Letter on Acquisition Planning  

Broader source: Energy.gov (indexed) [DOE]

0 Acquisition Letter on Acquisition Planning 0 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Attached is Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Questions concerning this policy flash should be directed to Jason Taylor of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at (202) 287-1560 or at jason.taylor@hq.doe.gov. Policy Flash_MO Acq Planning AL.pdf AL_ 2013-03 Acq Planning_MO.pdf More Documents & Publications Attachment FY2011-09(3) Policy Flash 2013-78 Acquisition Guide Chapter 7.3 Acquisition Planning in

404

Policy Flash 2012-11 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 1 Policy Flash 2012-11 As part of the Office of Management and Budget (OMB) Acquisition Savings Initiative and the DOE Strategic Sourcing Program, a key challenge has been to address the requirements of reporting cost savings and cost avoidance data. In order for DOE to fully comply with reporting requirements, we are directing that the attached template be utilized for reporting Fiscal Year (FY) 2012 data. Attachment 1 - Memo regarding Standardized Cost Savings Definitions and Reporting Template Attachment 2 - Standardized Cost Savings Definitions and Reporting Template (excel) Policy_Flash_2012-11.pdf Policy_Flash_2012-11_Attachment_1.pdf Policy_Flash_2012-11_Attachment_2.xlsx More Documents & Publications Policy Flash 2012-67 Contractor Purchasing Balanced Scorecard for FY 2012

405

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

406

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

407

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

408

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Broader source: Energy.gov (indexed) [DOE]

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

409

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

410

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

411

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

412

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

413

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

414

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

415

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

416

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

417

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Broader source: Energy.gov (indexed) [DOE]

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

418

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

419

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

420

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

422

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

423

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

7/22/2011 7/22/2011 Table of Contents 1. Commentary Page 1 2. Key Indicators of Generation, Consumption & Stocks Page 2 3. Month-to-Month Comparisons: Generation, Consumption and Stocks (Total) Page 3 4. Net Generation Trends Page 4 5. Fossil Fuel Consumption Trends Page 5 6. Fossil Fuel Stock Trends Page 6 7. Average Number of Days of Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: May 2011 Section 1. Commentary Electric Power Data The contiguous United States experienced temperatures that were slightly below normal in May 2011.

424

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

Burn Non-Lignite Coal Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: October 2010 Section 1. Commentary Electric Power Data In October 2010, the contiguous United States experienced temperatures that were above average. Accordingly, the total population-weighted heating degree days for the United States were 15.6 percent below the October normal. Retail sales of electricity remained relatively unchanged from October 2009. Over the same period, the average U.S. retail price of electricity increased 1.8 percent. For the 12-month period ending October 2010, the average U.S.

425

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

6/24/2011 6/24/2011 Table of Contents 1. Commentary Page 1 2. Key Indicators of Generation, Consumption & Stocks Page 2 3. Month-to-Month Comparisons: Generation, Consumption and Stocks (Total) Page 3 4. Net Generation Trends Page 4 5. Fossil Fuel Consumption Trends Page 5 6. Fossil Fuel Stock Trends Page 6 7. Average Number of Days of Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: April 2011 Section 1. Commentary Electric Power Data The contiguous United States experienced temperatures that were above normal in April 2011.

426

Flash Estimate July 2005 Final.xls  

Gasoline and Diesel Fuel Update (EIA)

and Stock Trends and Stock Trends Page 5 6. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 6 7. Retail Sales Trends Page 7 8. Average Retail Price Trends Page 8 9. Heating and Cooling Degree Days Page 9 10. Documentation Page 10 Monthly Flash Estimates of Data for: May 2005 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the U.S. Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy of the Department of Energy or any other organization. For additional information, contact Orhan Yildiz at 202-287-1586, or at Orhan.Yildiz@eia.doe.gov.

427

DATE: TO: FROM: SUBJECT: SUMMARY: POLICY FLASH  

Broader source: Energy.gov (indexed) [DOE]

TO: TO: FROM: SUBJECT: SUMMARY: POLICY FLASH 2005..19 March 1, 2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management STARS Conversion In April 2005, the Department will be converting to the new Standard Accounting and Reporting System (STARS). Department contractors and vendors will be encouraged to submit invoices early for goods or services to be delivered in March 2005 so they can be processed and paid by the end of the month. For such payment, invoices must be received by the Oak Ridge Financial Service Center not later than March 17,2005, and approving officials must provide their approvals by March 24,2005. Page 1 of2 To ensure a smooth transition, a one-time, limited delegation of Contracting Officer authority has been granted to the Director at Oak Ridge Financial Service Center for the purpose of signing

428

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

9/20/2011 9/20/2011 Table of Contents 1. Commentary Page 1 2. Key Indicators of Generation, Consumption & Stocks Page 2 3. Month-to-Month Comparisons: Generation, Consumption and Stocks (Total) Page 3 4. Net Generation Trends Page 4 5. Fossil Fuel Consumption Trends Page 5 6. Fossil Fuel Stock Trends Page 6 7. Average Number of Days of Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: July 2011 Section 1. Commentary Electric Power Data The contiguous United States experienced temperatures

429

Flash Estimate August 2005 Final.xls  

Gasoline and Diesel Fuel Update (EIA)

and Stock Trends and Stock Trends Page 5 6. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 6 7. Retail Sales Trends Page 7 8. Average Retail Price Trends Page 8 9. Heating and Cooling Degree Days Page 9 10. Documentation Page 10 Monthly Flash Estimates of Data for: June 2005 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the U.S. Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy of the Department of Energy or any other organization. For additional information, contact Orhan Yildiz at 202-287-1586, or at Orhan.Yildiz@eia.doe.gov.

430

Flash photolysis-shock tube studies  

SciTech Connect (OSTI)

Even though this project in the past has concentrated on the measurement of thermal bimolecular reactions of atomic species with stable molecules by the flash or laser photolysis-shock tube (FP- or LP-ST) method using atomic resonance absorption spectrometry (ARAS) as the diagnostic technique, during the past year the authors have concentrated on studies of the thermal decompositions of selected chlorocarbon molecules. These studies are necessary if the degradation of chlorine containing organic molecules by incineration are to be understood at the molecular level. Clearly, destruction of these molecules will not only involve abstraction reactions, when possible, but also thermal decomposition followed by secondary reactions of the initially formed atoms and radicals. Studies on the thermal decomposition of CH{sub 3}Cl are complete, and the curve-of-growth for Cl-atom atomic resonance absorption has been determined. The new thermal decomposition studies are similar to those already reported for CH{sub 3}Cl.

Michael, J.V. [Argonne National Laboratory, IL (United States)

1993-12-01T23:59:59.000Z

431

Article coated with flash bonded superhydrophobic particles  

DOE Patents [OSTI]

A method of making article having a superhydrophobic surface includes: providing a solid body defining at least one surface; applying to the surface a plurality of diatomaceous earth particles and/or particles characterized by particle sizes ranging from at least 100 nm to about 10 .mu.m, the particles being further characterized by a plurality of nanopores, wherein at least some of the nanopores provide flow through porosity, the particles being further characterized by a plurality of spaced apart nanostructured features that include a contiguous, protrusive material; flash bonding the particles to the surface so that the particles are adherently bonded to the surface; and applying a hydrophobic coating layer to the surface and the particles so that the hydrophobic coating layer conforms to the nanostructured features.

Simpson, John T (Clinton, TN) [Clinton, TN; Blue, Craig A (Knoxville, TN) [Knoxville, TN; Kiggans, Jr., James O [Oak Ridge, TN

2010-07-13T23:59:59.000Z

432

Scannerless loss modulated flash color range imaging  

DOE Patents [OSTI]

Scannerless loss modulated flash color range imaging methods and apparatus are disclosed for producing three dimensional (3D) images of a target within a scene. Apparatus and methods according to the present invention comprise a light source providing at least three wavelengths (passbands) of illumination that are each loss modulated, phase delayed and simultaneously directed to illuminate the target. Phase delayed light backscattered from the target is spectrally filtered, demodulated and imaged by a planar detector array. Images of the intensity distributions for the selected wavelengths are obtained under modulated and unmodulated (dc) illumination of the target, and the information contained in the images combined to produce a 3D image of the target.

Sandusky, John V. (Albuquerque, NM); Pitts, Todd Alan (Rio Rancho, NM)

2008-09-02T23:59:59.000Z

433

Scannerless loss modulated flash color range imaging  

DOE Patents [OSTI]

Scannerless loss modulated flash color range imaging methods and apparatus are disclosed for producing three dimensional (3D) images of a target within a scene. Apparatus and methods according to the present invention comprise a light source providing at least three wavelengths (passbands) of illumination that are each loss modulated, phase delayed and simultaneously directed to illuminate the target. Phase delayed light backscattered from the target is spectrally filtered, demodulated and imaged by a planar detector array. Images of the intensity distributions for the selected wavelengths are obtained under modulated and unmodulated (dc) illumination of the target, and the information contained in the images combined to produce a 3D image of the target.

Sandusky, John V. (Albuquerque, NM); Pitts, Todd Alan (Rio Rancho, NM)

2009-02-24T23:59:59.000Z

434

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

435

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

436

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

437

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

438

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

439

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

440

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

442

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

443

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

444

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

445

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Broader source: Energy.gov (indexed) [DOE]

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

446

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

447

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

448

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network [OSTI]

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

449

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network [OSTI]

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

450

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

451

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

452

Policy Flash 2013-36 Update to Congressional Notifications - Acquisition  

Broader source: Energy.gov (indexed) [DOE]

36 Update to Congressional Notifications - 36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Attached is Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Questions concerning this policy flash and the acquisition guide chapter should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning this policy flash and the financial assistance guide chapter should be directed to Ellen Colligan at (202) 287-1776 or ellen.colligan@hq.doe.gov.

453

Policy Flash 2012-14 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4 4 Policy Flash 2012-14 With reference to Policy Flash 2012-02, Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices, and OMB Memorandum M-11-32, "Accelerating Payment to Small Businesses for Goods and Services," established an Executive Branch policy to pay small business invoices as quickly as practicable, with a goal of paying within 15 days. Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices implements this policy. See the attachment below with the DOE response to OMB memorandum. Attachment - Response to OMB Memorandum M-11-32 Accelerating Payments to Small Businesses for Good and Services To see Policy Flash 2012-02 and Acquisition Guide Chapter 32.1. Attachment - Policy Flash 2012-02 and Acquisition Guide Chapter

454

Policy Flash 2012-32 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2 2 Policy Flash 2012-32 Attached is Policy Flash 2012-32 Acquisition Guide Chapter 17.1 - Interagency Acquisitions, Interagency Transactions and Interagency Agreements Questions concerning this policy flash should be directed to Barbara Binney of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Procurement and Assistance Management at (202) 287-1340 or barbara.binney@hq.doe.gov. Policy_Flash_2012-32_0.pdf AcqGuide_17.1_Interagency_Acquisitions_April_9_2012.pdf 17.1_Attachment_1_OFPP_Guidance_Interagence_Acquisitions_June_2008.pdf 17.1_Attachment_2_OFPPbusinesscaseguidance92911.pdf 3a-attachment_IA_FUNDS_OUT_Assisted_Aquisition_Part_A_april_2_2012.pdf 3a-attachment_IA_FUNDS_OUT_Assisted_Aquisition_Part_B_april_2_2012.pdf 3b-attachment_IA_FUNDS_OUT_Interagency_Transaction_Part_A_april_2_2012.pdf

455

Policy Flash 2013-36 Update to Congressional Notifications - Acquisition  

Broader source: Energy.gov (indexed) [DOE]

6 Update to Congressional Notifications - 6 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Attached is Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Questions concerning this policy flash and the acquisition guide chapter should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning this policy flash and the financial assistance guide chapter should be directed to Ellen Colligan at (202) 287-1776 or ellen.colligan@hq.doe.gov.

456

Policy Flashes for FY 2006 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6 6 Policy Flashes for FY 2006 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2006-62 Revision to Chapter 42.5, Contract Management Planning, of the Department of Energy Acquisition Guide 2006-62 Attachment Acquisition Guide Chapter 42.5, Contract Management Planning

457

Policy Flashes for 2009 & 2010 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

for 2009 & 2010 for 2009 & 2010 Policy Flashes for 2009 & 2010 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. Number Topic 2010-83 DOE Acquisition Guide Chapter 23 2010-83 Attachment DOE Acquisition Guide Chapter 23 2010-82 Subaward Reporting For Federal Funding and Transparency Act of 2006 (FFATA)

458

Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation  

Broader source: Energy.gov (indexed) [DOE]

5 Continuing Appropriations Act, 2014 -- 5 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov for the AL or Richard Bonnell at (202) 287-1747 or at richard.bonnell@hq.doe.gov for the FAL. Policy flash 2014-05 CRA Appropriations AL FY2014.pdf More Documents & Publications Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressional

459

POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL  

Broader source: Energy.gov (indexed) [DOE]

POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL IMPLEMENTATION OF ANA SYSTEM POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL IMPLEMENTATION OF ANA SYSTEM An updated copy of the ANA Users Guide is attached and can be found at the ANA iPortal space at https://iportalwc.doe.gov/webcenter/spaces/ANA_SPACE/ The ANA system can be accessed directly at: https://iportalwc.doe.gov/pls/apex/f?p=ANA Questions concerning this policy flash should be directed to Elle Clayton at 202-287-1444 or ellen.clayton@hq.doe.gov. If you have questions or need assistance using the ANA system, please contact the iManage Help Desk Support at (301) 903-2500 and select option 4, option 1, option 1. For Congressional Affairs Support, send an e-mail to CI-ANA@hq.doe.gov.

460

Policy Flash 2012-51 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

policy flash should be directed to John Lucas, Assistant General Counsel for Technology Transfer in the Office of the General Counsel by phone at (202) 586-2939 or by email at...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Policy Flash 2013-77 Contractor Performance Information  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Barbara Binney, of the Office of Acquisition and Project Management Policy at (202) 287-1340 or at Barbara.Binney@hq.doe.gov.

462

Policy Flash 2012-13 | Department of Energy  

Energy Savers [EERE]

3 Policy Flash 2012-13 Attached for your information is a list of FAR amendments published in today's Federal Register (76 FR 68027, November 2, 2011). Attachment - List of Rules...

463

Policy Flash 2015 Revision to the Federal Assistance Reporting...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Revision to the Federal Assistance Reporting Checklist, DOE F 4600.2 (102014). Policy Flash 2015 Revision to the Federal Assistance Reporting Checklist, DOE F 4600.2 (102014)....

464

Policy Flash 2012-64 | Department of Energy  

Office of Environmental Management (EM)

5 Federal Acquisition Circular 61 Questions concerning this policy flash should be directed to Barbara Binney, of the Office of Procurement and Assistance Policy at (202) 287-1340...

465

Policy Flash 2013-29 Leveraging the General Services Administration...  

Broader source: Energy.gov (indexed) [DOE]

General Services Administration's SmartPay2 Program and its Single Use Account Feature Policy Flash 2013-29 Leveraging the General Services Administration's SmartPay2 Program and...

466

Policy Flash 2012-2 | Department of Energy  

Energy Savers [EERE]

Policy Flash 2012-2 OMB Memorandum M-11-32, "Accelerating Payment to Small Businesses for Goods and Services," established an Executive Branch policy to pay small business...

467

Policy Flash 2012-19 | Department of Energy  

Energy Savers [EERE]

9 Policy Flash 2012-19 Attached for your information is a summary of FAR amendments published in the Federal Register (77 FR 33405, January 3, 2012) and a January 11, 2012...

468

Policy Flash 2011-98 | Department of Energy  

Energy Savers [EERE]

8 Policy Flash 2011-98 The attached class deviation from DEAR 970.5244-1(g) has been issued to increase the dollar threshold from 100,000 to 500,000 for: (1) determinations of...

469

Type B Accident Investigation of the Arc Flash at Brookhaven...  

Broader source: Energy.gov (indexed) [DOE]

B Accident Investigation of the Arc Flash at Brookhaven National Laboratory, April 14, 2006 More Documents & Publications DOE-HDBK-1092-1998 DOE-HDBK-1092-2004 DOE-HDBK-1092-2013...

470

Use a Vent Condenser to Recover Flash Steam Energy  

Broader source: Energy.gov [DOE]

This tip sheet on using vent condensers to recover flash steam energy provides how-to advice for improving industrial steam systems using low-cost, proven practices and technologies.

471

Policy Flash 2013-28 Implementation of Indian Energy Preference...  

Energy Savers [EERE]

of Indian Energy Preference Provision in EP Act 2005 and Acquisition Letter 2013-02 Policy Flash 2013-28 Implementation of Indian Energy Preference Provision in EP Act 2005 and...

472

Policy Flash 2012-17 | Department of Energy  

Office of Environmental Management (EM)

Flash 2012-17 The attached Acquisition Letter has been issued to provide guidance to Contracting Officers on the implications of time-limited funding on contract planning, award,...

473

Use a Vent Condenser to Recover Flash Steam Energy (Revised)  

SciTech Connect (OSTI)

This revised ITP tip sheet on vent condenser to recover flash steam energy provides how-to advice for improving industrial steam systems using low-cost, proven practices and technologies.

Not Available

2006-05-01T23:59:59.000Z

474

Policy Flash 2011-73 | Department of Energy  

Energy Savers [EERE]

Continuing Appropriations Act, 2011 Policy Flash 2011-73 Attachment - Acquisition Letter AL-2011-04 - Implementation of Division B, Title I, Section 1101(a)(2) of the Department of...

475

Policy Flash 2012-1 | Department of Energy  

Office of Environmental Management (EM)

1 Policy Flash 2012-1 Acquisition Letter (AL) 2012-01 has been issued. It lists ALs currently in effect and the discontinued ALs, along with the reason why the AL is no longer in...

476

Policy Flash 2012-5 | Department of Energy  

Energy Savers [EERE]

5 Policy Flash 2012-5 This AL is a reissuance under a new AL number of AL 2005-11, Home Office Expenses of Management and Operating Contracts. Attachment - Aquisition Letter...

477

Policy Flash 2012-36 | Department of Energy  

Energy Savers [EERE]

6 Policy Flash 2012-36 The statutory provisions addressed in this AL are a continuation of the provisions effective on the enactment date of the Consolidated Appropriations Act of...

478

Policy Flash 2012-36 | Department of Energy  

Office of Environmental Management (EM)

2-36 Policy Flash 2012-36 The statutory provisions addressed in this AL are a continuation of the provisions effective on the enactment date of the Consolidated Appropriations Act...

479

Configurability of performance and overheads in flash management  

Science Journals Connector (OSTI)

Flash memory has been widely considered as a good alternative for storage system implementations because it offers superior vibration tolerance and power efficiency, compared to hard-disks. Because of its unique characteristics, direct applications of ...

Tei-Wei Kuo; Jen-Wei Hsieh; Li-Pin Chang; Yuan-Hao Chang

2006-01-01T23:59:59.000Z

480

Policy Flash 2012-69 | Department of Energy  

Office of Environmental Management (EM)

Clause Usage Guide Questions concerning this policy flash should be directed to Kevin Smith, of the Office of Procurement and Assistance Policy at (202) 287-1614 or at...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Policy Flash 2012-66 | Department of Energy  

Energy Savers [EERE]

or Template Changes Questions concerning this policy flash should be directed to Kevin Smith at (202) 287- 1614 or kevin.m.smith@hq.doe.gov (for Acquisition) or Ellen Colligan at...

482

Policy Flash 2012-55 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

in STRIPES Questions concerning this policy flash should be directed to Kevin Smith at (202) 287- 1614 or kevin.m.smith@hq.doe.gov (for Acquisition) or Ellen Colligan at...

483

Policy Flash 2012-70 | Department of Energy  

Energy Savers [EERE]

Clause Usage Guide Questions concerning this policy flash should be directed to Kevin Smith, of the Office of Procurement and Assistance Policy at (202) 287-1614 or at...

484

Policy Flash 2013-11 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Plan Process Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at (202) 287-1614 or at...

485

Policy Flashes for FY 2005 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5 5 Policy Flashes for FY 2005 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2005-58 (pdf) - Acquisition Letter 2005-15, Implementation of the Identity Proofing Requirement of HSPD-12 and FIPS Pub 201 2005-58 Attachment (pdf) - Acquisition Letter 2005-16, Implementation of

486

Policy Flash 2012-62 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2 2 Policy Flash 2012-62 Attached is Policy Flash 2012-62 Class Deviation DEAR 950.7006/AL 2012-10, Implementation of the Price-Anderson Act of 2005 Questions concerning this policy flash should be directed to Nancy Harvey of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at Nancy.Harvey@hq.doe.gov. Policy Flash 2012-62 AL 2012-10, Implementation of the Price-Anderson Amendments Act of 2005 Class Deviation Findings and Determination - DEAR 950.7006, Statutory nuclear hazards indemnity agreement More Documents & Publications Microsoft Word - AL2005-15.doc Appendix A. Notice of Inquiry: Preparation of Report to Congress on Price-Anderson Act. 62 Federal Register 68,272 (December 31, 1997)

487

Policy Flash 2012-39 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

39 39 Policy Flash 2012-39 Attached is Policy Flash 2012-39 Department of Energy (DOE) Audit Guidance for For-Profit Recipients Questions concerning this policy flash should be directed to Ellen Colligan of the Contracts and Financial Assistance Policy Division, Office of Policy, Office of Procurement and Assistance Management at (202) 287-1776 or at Ellen.Colligan@hq.doe.gov. Policy_Flash_2012-39.pdf DOE_Audit_Guidance_for_For-Profit_Financial_Assistance_Awards (Part_I)_April_2012_0.pdf DOE_Audit_Guidance_for_For-Profit_Financial_Assistance_Awards (Part_II)_April_2012_0.pdf DOE_Audit_Guidance_for_For-Profit_Financial_Assistance_Awards_(Part_III)_April_2012_0.pdf DOE_Audit_Guidance_for_For-Profit_FA_(Part IV) Matrix_of_Compliance_Requirements_April_2012_0.pdf

488

Policy Flash 2015-07 FAC 2005-78  

Broader source: Energy.gov [DOE]

Questions concerning this policy flash should be directed to Jason Taylor, of the Contract and Financial Assistance Policy Division at (202) 287-1560 or at Jason.Taylor@hq.doe.gov

489

Konfigurasjon av end-flash system for LNG-prosessanlegg; Configuration of end-flash systems for LNG process plant.  

E-Print Network [OSTI]

?? Formålet med masteravhandlingen er å gjennomføre en systematisk evaluering av ulike end-flash løsninger i forhold til kraft- og brenselbalanse, produksjonskapasitet, LNG-produktspesifikasjoner, spesifikt kraftforbruk og… (more)

Haugum, Mathea Korssjøen

2012-01-01T23:59:59.000Z

490

The Gas Attenuator of FLASH at DESY  

SciTech Connect (OSTI)

FLASH (Free electron LASer at Hamburg) as a part of the Deutsches Elektronen Synchroton DESY is the first Free Electron Laser (FEL) user facility for VUV and soft X-ray coherent light experiments. The SASE (Self Amplification by Stimulated Emission) process generates ultra short coherent radiation pulses on the femtosecond time scale with peak powers in the GW range. Several experiments need reliable means to reduce the FEL intensity over many orders of magnitude without changing the photon beam characteristics. Since a reduction of the FEL intensity by variation of machine parameters is not appropriate, a windowless gas-filled cell in combination with differential pumping units is used for attenuating the FEL radiation. This attenuator is placed in the beamline in outside the experimental hall. The total length of the gas cell is 15 m and the maximum gas pressure, which can be handled by the differential pumping units, is about 0.1 mbar. The attenuation range of Nitrogen covers at least 5 orders of magnitude in the spectral range of 19 to 120 nm due to its large absorption cross section. Between 19 and 9 nm and for shorter wavelengths Xenon and Krypton can be used, respectively.

Hahn, Ulrich; Tiedtke, Kai [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, 22603 Hamburg (Germany)

2007-01-19T23:59:59.000Z

491

A Discrete Evolutionary Model for Chess Players' Ratings  

E-Print Network [OSTI]

The Elo system for rating chess players, also used in other games and sports, was adopted by the World Chess Federation over four decades ago. Although not without controversy, it is accepted as generally reliable and provides a method for assessing players' strengths and ranking them in official tournaments. It is generally accepted that the distribution of players' rating data is approximately normal but, to date, no stochastic model of how the distribution might have arisen has been proposed. We propose such an evolutionary stochastic model, which models the arrival of players into the rating pool, the games they play against each other, and how the results of these games affect their ratings. Using a continuous approximation to the discrete model, we derive the distribution for players' ratings at time $t$ as a normal distribution, where the variance increases in time as a logarithmic function of $t$. We validate the model using published rating data from 2007 to 2010, showing that the parameters obtained...

Fenner, Trevor; Loizou, George

2011-01-01T23:59:59.000Z

492

Multi-Level Bitmap Indexes for Flash Memory Storage  

SciTech Connect (OSTI)

Due to their low access latency, high read speed, and power-efficient operation, flash memory storage devices are rapidly emerging as an attractive alternative to traditional magnetic storage devices. However, tests show that the most efficient indexing methods are not able to take advantage of the flash memory storage devices. In this paper, we present a set of multi-level bitmap indexes that can effectively take advantage of flash storage devices. These indexing methods use coarsely binned indexes to answer queries approximately, and then use finely binned indexes to refine the answers. Our new methods read significantly lower volumes of data at the expense of an increased disk access count, thus taking full advantage of the improved read speed and low access latency of flash devices. To demonstrate the advantage of these new indexes, we measure their performance on a number of storage systems using a standard data warehousing benchmark called the Set Query Benchmark. We observe that multi-level strategies on flash drives are up to 3 times faster than traditional indexing strategies on magnetic disk drives.

Wu, Kesheng; Madduri, Kamesh; Canon, Shane

2010-07-23T23:59:59.000Z

493

Pyroprocessing of fine industrial minerals in a suspension flash calciner  

Science Journals Connector (OSTI)

ABSTRACT Suspension flash calcining is well suited for heat treatment of -20 mesh and finer materials at temperatures up to 1400°C. The system has been applied to a number of materials including limestone, dolomite, phosphate and gypsum, which are discussed in this paper. The system operates in a countercurrent mode, incorporating one to three suspension cyclone preheat stages ahead of a suspension flash calciner; followed by one to three suspension cyclone cooling stages. Operating temperatures range from 1100–1200°C for limestone and dolomite, to 800–900°C for phosphate and 150–300°C for gypsum. Fuel is normally fired directly into the suspension flash calciner vessel, or as in the case of gypsum in a separately fired air heater. Flash calcination offers a unique approach to the processing of fine materials. The short residence time of the flash calciner system works to prevent overburning, however the excellent heat transfer that is achieved allows the calcination load to be accomplished. KEYWORDS - Suspension, Calcining, Calcination, Limestone, Dolomite, Gypsum, Phosphate

W.E. Lindquist; S.M. Cohen; B.T. Field

1988-01-01T23:59:59.000Z

494

Analysis of Mass Flow and Enhanced Mass Flow Methods of Flashing Refrigerant-22 from a Small Vessel  

E-Print Network [OSTI]

The mass flow characteristics of flashing Refrigerant-22 from a small vessel were investigated. A flash boiling apparatus was designed and built. It was modeled after the flashing process encountered by the accumulator of air-source heat pump...

Nutter, Darin Wayne

495

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

496

Policy Flash 20012-15 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

12-15 12-15 Policy Flash 20012-15 This AL is a reissuance (under the new AL number of 2012-05) of the AL on Meal Costs in Management and Operating Contracts that was originally issued on August 2, 2005 (under AL number 2005-12). It provides additional application guidance on: understanding the standards for reimbursement of contractor meal costs; applying the standards in determining the allowability of contractor meal costs; and overseeing the Department's and contractors' internal controls applicable to reimbursement of contractor meal costs. Attachment - AL 2012-05, Meal Costs in Management and Operation Contracts Policy_Flash_2012-15.pdf Policy_Flash_2012-15_Attachment.pdf More Documents & Publications Microsoft Word - AL2005-12.doc OPAM Policy Acquisition Guides

497

Policy Flash 20012-15 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

012-15 012-15 Policy Flash 20012-15 This AL is a reissuance (under the new AL number of 2012-05) of the AL on Meal Costs in Management and Operating Contracts that was originally issued on August 2, 2005 (under AL number 2005-12). It provides additional application guidance on: understanding the standards for reimbursement of contractor meal costs; applying the standards in determining the allowability of contractor meal costs; and overseeing the Department's and contractors' internal controls applicable to reimbursement of contractor meal costs. Attachment - AL 2012-05, Meal Costs in Management and Operation Contracts Policy_Flash_2012-15.pdf Policy_Flash_2012-15_Attachment.pdf More Documents & Publications Microsoft Word - AL2005-12.doc OPAM Policy Acquisition Guides

498

PNNL 331 Building Arc Flash Team Investigation Report  

SciTech Connect (OSTI)

On Friday, April 21, 2006, a PNNL electrician was performing repair of an electrical system for the 331 Building chilled water pump (CHWP) No.2, when an electrical arc flash occurred inside a 480V combination motor starter. The electrician was taken to the on-site medical provider for evaluation and was released for return to work without restriction. The electrician was not shocked, but did receive a minor, superficial (first degree) burn on the left wrist. This report, the result of a thorough review by the 331 Building Arc Flash Assessment Team, provides an in-depth look at the steps leading up to the arc-flash and recommendations and opportunities for improvement.

Deichman, Mark L.; Drewrey, John C.; Hodges, Hurtis; Madson, Vernon J.; Minton, Allen L.; Montgomery, Daniel M.; Olson, Marvin E.; Rojas, Pedro H.; Sanan, Sanjay K.; Sharp, Reed D.; Sparks, Bobby R.; Swearingen, Gary L.

2006-06-06T23:59:59.000Z

499

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

500

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Broader source: Energy.gov (indexed) [DOE]

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A