Powered by Deep Web Technologies
Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

2

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

3

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

4

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

5

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

6

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

7

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

8

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

9

V-087: Adobe Flash Player Two Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Two Vulnerabilities 7: Adobe Flash Player Two Vulnerabilities V-087: Adobe Flash Player Two Vulnerabilities February 8, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in Adobe Flash Player PLATFORM: Vulnerabilities are reported in the following versions: Adobe Flash Player versions 11.5.502.146 and earlier for Windows and Macintosh Adobe Flash Player versions 11.2.202.261 and earlier for Linux Adobe Flash Player versions 11.1.115.36 and earlier for Android 4.x Adobe Flash Player versions 11.1.111.31 and earlier for Android 3.x Adobe Flash Player versions 11.5.31.137 and earlier for Chrome users Adobe Flash Player versions 11.3.378.5 and earlier for Internet Explorer 10 users on Windows 8 ABSTRACT: Two vulnerabilities are reported as 0-day which can be exploited by

10

V-087: Adobe Flash Player Two Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Two Vulnerabilities 7: Adobe Flash Player Two Vulnerabilities V-087: Adobe Flash Player Two Vulnerabilities February 8, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in Adobe Flash Player PLATFORM: Vulnerabilities are reported in the following versions: Adobe Flash Player versions 11.5.502.146 and earlier for Windows and Macintosh Adobe Flash Player versions 11.2.202.261 and earlier for Linux Adobe Flash Player versions 11.1.115.36 and earlier for Android 4.x Adobe Flash Player versions 11.1.111.31 and earlier for Android 3.x Adobe Flash Player versions 11.5.31.137 and earlier for Chrome users Adobe Flash Player versions 11.3.378.5 and earlier for Internet Explorer 10 users on Windows 8 ABSTRACT: Two vulnerabilities are reported as 0-day which can be exploited by

11

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

12

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

13

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

14

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

15

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

16

T-627: Adobe Flash Player Memory Corruption | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Memory Corruption 7: Adobe Flash Player Memory Corruption T-627: Adobe Flash Player Memory Corruption May 20, 2011 - 2:50pm Addthis PROBLEM: Adobe Flash Player Memory Corruption, Denial Of Service, Execute Code PLATFORM: Windows, Mac OS X, Linux, and Solaris ABSTRACT: Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file. reference LINKS: CVE Details - CVE-2011-0627 CVE Details - Adobe Flash Player Vulnerability Statistics CVE Details - Adobe Security Vulnerabilities IMPACT ASSESSMENT: High Discussion:

17

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

18

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

19

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

20

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-630: Security update available for Adobe Flash Player | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Security update available for Adobe Flash Player 0: Security update available for Adobe Flash Player T-630: Security update available for Adobe Flash Player May 25, 2011 - 3:35pm Addthis PROBLEM: Vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. PLATFORM: The vulnerabilities are reported in the following versions: Adobe Flash Player 10.2.159.1 and earlier for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.2.154.28 and earlier for Chrome. Adobe Flash Player 10.2.157.51 and earlier for Android. ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.2.159.1 and earlier versions (Adobe Flash Player 10.2.154.28 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, and Adobe

22

T-600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

600: Security Advisory for Adobe Flash Player, Adobe Reader and 600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat April 12, 2011 - 5:19am Addthis PROBLEM: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat PLATFORM: A critical vulnerability exists in Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 10.2.156.12 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems. ABSTRACT: This vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports

23

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Buffer Overflows and Memory Corruption 8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code November 7, 2012 - 6:00am Addthis PROBLEM: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.4.402.287 and prior for Windows and OS X; 11.2.202.243 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-24 SecurityTracker Alert ID: 1027730 CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Adobe Flash Player. A remote user

24

T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Security Advisory for Adobe Flash Player, Adobe Reader and 7: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat March 14, 2011 - 4:05pm Addthis PROBLEM: There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment. PLATFORM: Windows, Macintosh, Linux and Solaris ABSTRACT: A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.13 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1)

25

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

26

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

27

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

28

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities August 6, 2012 - 7:00am Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions 2.0.1.358 and earlier. ABSTRACT: Vulnerabilities in Adobe Flash Player version included with the BlackBerry PlayBook tablet software reference LINKS: BlackBerry Article ID: KB31675 Secunia Advisory SA50164 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

29

V-102: SUSE update for flash-player | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SUSE update for flash-player 2: SUSE update for flash-player V-102: SUSE update for flash-player March 1, 2013 - 6:00am Addthis PROBLEM: SUSE has issued an update for flash-player. PLATFORM: openSUSE 12.1 ABSTRACT: This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52416 openSUSE Adobe Security Bulletin APSB13-08 CVE-2013-0504 CVE-2013-0643 CVE-2013-0648 IMPACT ASSESSMENT: High DISCUSSION: This update resolves: 1. Permissions issue with the Flash Player Firefox sandbox. 2. Vulnerability in the ExternalInterface ActionScript feature, which can be exploited to execute malicious code. 3. Buffer overflow vulnerability in a Flash Player broker service, which can be used to execute malicious code.

30

T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Update: Adobe Acrobat, Reader, and Flash Player SWF File 7: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability April 21, 2011 - 3:03am Addthis PROBLEM: The vulnerability is due to improper processing of Adobe Flash content. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view malicious Flash (.swf) files with the affected software. If successful, the attacker could execute arbitrary code or cause a DoS condition on the targeted system. PLATFORM: Adobe Flash Player versions prior to 10.2.153.1 for Microsoft Windows, Apple Macintosh, Linux, and Solaris systems Adobe Flash Player versions prior to 10.2.156.12 for Android systems

31

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

32

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

33

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

34

T-604: Google Chrome updated version of the Adobe Flash player | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome updated version of the Adobe Flash player 4: Google Chrome updated version of the Adobe Flash player T-604: Google Chrome updated version of the Adobe Flash player April 15, 2011 - 4:30am Addthis PROBLEM: Chrome Stable and Beta channels have been updated to 10.0.648.134 for Windows, Mac, Linux and Chrome Frame PLATFORM: Windows, Mac, Linux and Chrome Frame ABSTRACT: The Chrome Stable channel has been updated to 10.0.648.205 for Windows, Mac, Linux and Chrome Frame. This release contains a new version of Adobe Flash 0-Day CVE-2011-0611. Update also includes a fix for a security vulnerability Critical CVE-2011-1300: Off-by-three in GPU process, CVE-2011-1301: Use-after-free in the GPU process, and CVE-2011-1302: Heap overflow in the GPU process. OTHER LINKS: Google Chrome Releases - Google Chrome Browser

35

T-638: Security update available for Adobe Flash Player | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Security Bulletin IMPACT ASSESSMENT: High Discussion: An important vulnerability has been identified in Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.22 and earlier versions for Android. This universal cross-site scripting vulnerability (CVE-2011-2107) could be used to take actions on a user's behalf on any website or webmail provider, if the user visits a malicious website. There are reports that this vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message. Adobe recommends users of Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris update to

36

T-638: Security update available for Adobe Flash Player | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Security Bulletin IMPACT ASSESSMENT: High Discussion: An important vulnerability has been identified in Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.22 and earlier versions for Android. This universal cross-site scripting vulnerability (CVE-2011-2107) could be used to take actions on a user's behalf on any website or webmail provider, if the user visits a malicious website. There are reports that this vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message. Adobe recommends users of Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris update to

37

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities May 17, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in BlackBerry Tablet OS PLATFORM: BlackBerry Tablet OS 2.x ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53453 Blackberry Security Advisory KB34161 CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265

38

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

39

This content requires Flash - Business Cards  

This content requires Flash. To view this content, JavaScript must be enabled, and you need the latest version of the Adobe Flash Player. Download the ...

40

Bug Wars: a competitive exercise to find bugs in code  

Science Conference Proceedings (OSTI)

Software bugs are a common problem that students encounter in any Computer Science program. "Bug Wars" is a fun and competitive class exercise for student teams to identify bugs in code. To prepare for the competition, the instructor provides several ...

Renee Bryce

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

42

Trendy Bugs Topic Trends in the Android Bug Reports  

E-Print Network (OSTI)

Trendy Bugs Topic Trends in the Android Bug Reports Lee Martie, Vijay Krishna Palepu, Hitesh {lmartie, vpalepu, hsajnani, lopes}@ics.uci.edu Abstract--Studying vast volumes of bug and issue public issue tracker. This informs us of the features or parts of the project that are more problematic

Jones, James A.

43

Mining succinct predicated bug signatures  

Science Conference Proceedings (OSTI)

A bug signature is a set of program elements highlighting the cause or effect of a bug, and provides contextual information for debugging. In order to mine a signature for a buggy program, two sets of execution profiles of the program, one capturing ... Keywords: bug signature, feature selection, statistical debugging

Chengnian Sun; Siau-Cheng Khoo

2013-08-01T23:59:59.000Z

44

Efficient concurrency-bug detection across inputs  

Science Conference Proceedings (OSTI)

In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, ... Keywords: bug detection, concurrency bugs, multi-threaded software, software testing

Dongdong Deng, Wei Zhang, Shan Lu

2013-10-01T23:59:59.000Z

45

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

46

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

47

POLICY FLASH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 6 DATE: TO: FROM: January 28,2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management SUBJECT: Changes in Small Business Contracting Policy SUMMARY: This Policy Flash forwards changes to the Small Disadvantaged Business (SDB) price evaluation adjustment, new guidance from the U.S. Small Business Administration (SBA) on improving subcontracting opportunities with small businesses, and the requirement for recertification of small business status. Page 1 of3 POLICY FLASH 2005-16 1. The statute for the SDB price evaluation adjustment implemented in FAR Subpart 19.11 is no longer in effect for civilian agencies, except the National Aeronautics and Space Administration and Coast Guard. See the attached Civilian Agency Acquisition Council Letter, dated December 27,2004: ~ CAAC Letter 2004-04, Expirationc

48

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

49

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

50

POLICY FLASH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 DATE: TO: FROM: February 10,2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management SUBJECT: Acquisition Guide Updates SUMMARY: This Policy Flash advises you of changes being made to five chapters of the Department of Energy Acquisition Guide. These changes are as follows: Pagel of 2 -_un - --- n__- Chapter 26.1 Energy Policy Act hnplementation - The changes to this chapter were updates and editorial style changes. Chapter 26.2 Energy Policy Act Cost Sharing Requirements - The changes to this chapter were updates and editorial style changes. Chapter 37.1 Support Service Contracting - Revisions were made to recognize performance based service acquisition. Other changes were updates and editorial style changes. Chapter39.1 Acquisitionof InformationResources- The changesto this chapterwere updates

51

Distribution Arc Flash  

Science Conference Proceedings (OSTI)

Arc flash from faults on 480-V circuits is a safety issue that can impact utility work. This report covers results from tests of arc flash and fabric performance from faults in 480-V network protectors and padmounted transformers. It supplements EPRI report 1018694, Distribution Arc Flash: Industry Practices and EPRI report 1018693, Distribution Arc Flash: Analysis Methods and Arc Characteristics.

2009-08-31T23:59:59.000Z

52

Dark flash photography  

Science Conference Proceedings (OSTI)

Camera flashes produce intrusive bursts of light that disturb or dazzle. We present a prototype camera and flash that uses infra-red and ultra-violet light mostly outside the visible range to capture pictures in low-light conditions. This "dark" flash ... Keywords: computational photography, dark flash, multi-spectral imaging, spectral image correlations

Dilip Krishnan; Rob Fergus

2009-07-01T23:59:59.000Z

53

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

54

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

55

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

56

Finding and understanding bugs in C compilers  

Science Conference Proceedings (OSTI)

Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs ... Keywords: automated testing, compiler defect, compiler testing, random program generation, random testing

Xuejun Yang; Yang Chen; Eric Eide; John Regehr

2011-06-01T23:59:59.000Z

57

AOCS USB Flash Drive  

Science Conference Proceedings (OSTI)

1 GB flash drive. AOCS logo printed on aluminum cover. AOCS USB Flash Drive Membership Merchandise Membership Merchandise 7F95621DF44FEA960BA8EE1D1E39CED4 1 GB USB flash drive. AOCS logo printed on aluminum cover. M-USB 17770

58

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

59

Flash code: studying astrophysical thermonuclear flashes  

Science Conference Proceedings (OSTI)

The Center for Astrophysical Thermonuclear Flashes is constructing a new generation of codes designed to study runaway thermonuclear burning on the surface or in the interior of evolved compact stars.

Robert Rosner; Alan Calder; Jonathan Dursi; Bruce Fryxell; Donald Q. Lamb; Jens C. Niemeyer; Kevin Olson; Paul Ricker; Frank X. Timmes; James W. Truran; Henry Tufo; Yuan-Nan Young; Michael Zingale; Ewing Lusk; Rick Stevens

2000-03-01T23:59:59.000Z

60

Flash protection controller  

DOE Patents (OSTI)

A controller provides a high voltage to maintain an electro-optic shutter in a transparent condition until a flash of light which would be harmful to personnel is sensed by a phototransistor. The controller then shorts the shutter to ground to minimize light transmission to the user and maintains light transmission at the pre-flash level for a predetermined time to allow the flash to subside. A log converter and differential trigger circuit keep the controller from being triggered by other light flashes which are not dangerous.

Galbraith, Lee K. (Mountain View, CA)

1981-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Flash protection controller  

DOE Patents (OSTI)

A controller provides a high voltage to maintain an electro-optic shutter in a transparent condition until a flash of light which would be harmful to personnel is sensed by a phototransistor. The controller then shorts the shutter to ground to minimize light transmission to the user and maintains light transmission at the pre-flash level for a predetermined time to allow the flash to subside. A log converter and differential trigger circuit keep the controller from being triggered by other light flashes which are not dangerous.

Galbraith, L.K.

1979-12-07T23:59:59.000Z

62

EM News Flashes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

flashes Office of Environmental Management 1000 Independence Ave., SW Washington, DC 20585 202-586-7709 en Waste Isolation Pilot Plant's Excavated Salt Agreement Supports...

63

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

64

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis...

65

Policy Flashes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acrobat, the format type will be noted after the number of the Flash. View the archive of Policy Flashes for FY 2013. Earlier Policy Flashes can be found in the right bar of this...

66

Mining Bug Databases for Unidentified Software Vulnerabilities  

SciTech Connect

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

2012-06-01T23:59:59.000Z

67

Flash Storage Today  

Science Conference Proceedings (OSTI)

Can flash memory become the foundation for a new tier in the storage hierarchy? The past few years have been an exciting time for flash memory. The cost has fallen dramatically as fabrication has become more efficient and the market has grown; the density ...

Adam Leventhal

2008-07-01T23:59:59.000Z

68

Distribution Arc Flash  

Science Conference Proceedings (OSTI)

Arc flash from faults on distribution circuits is a safety issue that can impact work practices, protection requirements for line and substation workers, and relay and other overcurrent protection settings and practices. This report describes analysis methods and test results for EPRI-sponsored research on arc flash conducted in 2008.

2009-03-18T23:59:59.000Z

69

Policy Flash 2013-14  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2013-14 Class Deviation – Extending the Biobased Product Reporting Requirement

70

HEADQUARTERS POLICY FLASH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

----- - ----- - HEADQUARTERS POLICY FLASH DATE: June 29,2005 TO: Procurement Directors FROM: Office of Procurement and Assistance Policy, ME-6 1 Office of Procurement and Assistance Management SUBJECT: Department of Energy Rulemaking on Research Misconduct SUMMARY: This Policy Flash distributes the Department's interim final rules on research misconduct that were published in the Federal Register on June 28, 2005 and are effective on July 28, 2005. These rules includes a general statement of policy and standard financial assistance and procurement requirements that implement the government-wide policy on research misconduct issued by the White IIouse Office of Science and Technology Page 1 of 2 POLICY FLASH 2005-41 The attached Federal Register Notice promulgates a new 10 CFR Part 733, "Allegations of

71

Policy Flash 2013-08  

Energy.gov (U.S. Department of Energy (DOE))

Attached: Policy Flash 2013-08 Major Disaster and Emergency Declarations for Specific States from Hurricane Sandy

72

Policy Flash 2012-52  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2012-52 The Deputy Secretary’s Memorandum on Reporting Conference Related Activities and Spending

73

Policy Flash 2012-60  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2012-60 Acquisition Guide Chapter 13.1, Purchase Card Policy and Operating Procedures

74

Policy Flashes | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Policy Flashes Policy Flashes The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. View the archive of Policy Flashes for FY 2013. Earlier Policy Flashes can be found in the right bar of this screen. Number Topic 2014-11 Federal Acquisition Circular (FAC) 2005-71

75

FLASH2002-16.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FLASH2002-16.pdf FLASH2002-16.pdf FLASH2002-16.pdf More Documents & Publications Flash2002-28.pdf FLASH2002-12.pdf Flash2002-03...

76

MMORPG player behavior model based on player action categories  

Science Conference Proceedings (OSTI)

In this paper we present the modeling of player behavior for Massively Multiplayer Online Role-Playing Games (MMORPGs). We have performed action specific measurements of player sessions in terms of the previously defined action categories for MMORPGs ...

Mirko Suznjevic; Ivana Stupar; Maja Matijasevic

2011-10-01T23:59:59.000Z

77

Recovery News Flashes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

news-flashes Office of Environmental news-flashes Office of Environmental Management 1000 Independence Ave., SW Washington, DC 20585 202-586-7709 en "TRU" Success: SRS Recovery Act Prepares to Complete Shipment of More Than 5,000 Cubic Meters of Nuclear Waste to WIPP http://energy.gov/em/downloads/tru-success-srs-recovery-act-prepares-complete-shipment-more-5000-cubic-meters-nuclear "TRU" Success: SRS Recovery Act Prepares to Complete Shipment of More Than 5,000 Cubic Meters of Nuclear Waste to WIPP

78

Flash Steam Recovery Project  

E-Print Network (OSTI)

One of the goals of Vulcan's cost reduction effort is to reduce energy consumption in production facilities through energy optimization. As part of this program, the chloromethanes production unit, which produces a wide variety of chlorinated organic compounds, was targeted for improvement. This unit uses a portion of the high-pressure steam available from the plant's cogeneration facility. Continuous expansions within the unit had exceeded the optimum design capacity of the unit's steam/condensate recovery system, resulting in condensate flash steam losses to the atmosphere. Using computer simulation models and pinch analysis techniques, the Operational Excellence Group (Six Sigma) was able to identify a project to recover the flash steam losses as a supplemental low-pressure steam supply. The project was designed and implemented at no capital cost using existing instrumentation and controls. On an annualized basis steam usage per ton of product fell by about three percent. Absolute savings were about 15,800 million Btu.

Bronhold, C. J.

2000-04-01T23:59:59.000Z

79

An approach to detecting duplicate bug reports using natural language and execution information  

Science Conference Proceedings (OSTI)

An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an ... Keywords: duplicate bug report, execution information, information retrieval

Xiaoyin Wang; Lu Zhang; Tao Xie; John Anvik; Jiasu Sun

2008-05-01T23:59:59.000Z

80

Distribution Arc Flash  

Science Conference Proceedings (OSTI)

Arc flash from faults on distribution circuits is a safety issue that can impact work practices, protection requirements for line and substation workers, and relay and other overcurrent protection settings and practices. Highlights of the research results are the following: Arcs did not sustain in any of the tests at 120/208 V in network protectors or meters. Because of low incident energies, only single-layer flame-retardant clothing is needed. Testing on medium-voltage equipment showed wide variability...

2011-03-08T23:59:59.000Z

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Flash hydrogenation of biomass  

DOE Green Energy (OSTI)

It is proposed to obtain process chemistry information on the rapid hydrogenation of biomass (wood and other agricultural products) to produce light liquid and gaseous hydrocarbon fuels and feedstocks. The process is referred to as Flash Hydropyrolysis. The information will be of use in the design and evaluation of processes for the conversion of biomass to synthetic fuels and petrochemical feedstocks. Results obtained in an initial experiment are discussed.

Steinberg, M

1980-01-01T23:59:59.000Z

82

Policy Flash 2012-51  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2012-51 Guidance for Fast-Track Cooperative Research and Development Agreement (CRADA) Programs at DOE Facilities.

83

Policy Flash 2005-53  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

operational- managementprocurement-and-acquisitionpolicy-flashes. When the updated STRIPES User Guide becomes available, the STRIPES Training Team will send a notice to the...

84

Policy Flash 2012-55  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Division Office of Acquisition and Project Management SUBJECT: Requisitions in STRIPES SUMMARY: This Policy Flash disseminates updated guidance to STRIPES users on the use...

85

Policy Flash 2012-25  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2012-25 - Acquisition Career Management Program Handbook, Partial Revision of Chapter 11, Contracting Officer’s Representative and related documents.

86

Policy Flash 2013-10  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2013-10 Hurricane Sandy Contingency Operation --Increase in Micro-Purchase and Simplified Acquisition Thresholds for Specific States and Counties

87

Flash Lighting with Fluorescent Lamp.  

E-Print Network (OSTI)

??A flash lighting circuit with the fluorescent lamp is designed to produce lighting flicker by means of controlling the operating frequency and the duty-ratio of… (more)

Hsieh, Horng

2005-01-01T23:59:59.000Z

88

Policy Flash 2012-61  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 DATE: August 16, 2012 TO: Procurement Directors FROM: Director Contract and Financial Assistance Policy Division Office of Policy Office of Acquisition and Project Management SUBJECT: COR Toolkit SUMMARY: The COR Toolkit cited in the attachments to Policy Flash 2012-25 and posted to/linked from various DOE Internet pages has been withdrawn until further notice. This Flash will be available online at the following website: http://energy.gov/management/office-management/operational- management/procurement-and-acquisition/policy-flashes. Questions concerning this policy flash should be directed to

89

FLASH2011-52 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FLASH2011-52 FLASH2011-52 FPDS-NG National Interest Action (NIA) Code to Track Procurement Actions Made in Support of the Pacific Earthquake and Tsunami FLASH2011-52 More Documents...

90

Vacuum flash evaporated polymer composites  

DOE Patents (OSTI)

A method for fabrication of polymer composite layers in a vacuum is disclosed. More specifically, the method of dissolving salts in a monomer solution, vacuum flash evaporating the solution, condensing the flash evaporated solution as a liquid film, and forming the condensed liquid film into a polymer composite layer on a substrate is disclosed.

Affinito, John D. (Kennewick, WA); Gross, Mark E. (Pasco, WA)

1997-01-01T23:59:59.000Z

91

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

92

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

93

Green Flash Project Runs First Prototype Successfully  

NLE Websites -- All DOE Office Websites (Extended Search)

Facebook Find us "in the news" Home News & Publications News Center News Green Flash Project Runs First Prototype Successfully Green Flash Project Runs First...

94

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service V-065: Adobe Flash Player Buffer Overflow...

95

Flash2010-16.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16.pdf Flash2010-16.pdf Flash2010-16.pdf More Documents & Publications Flash2010-16Attachment.pdf Flash2010-05.pdf Flash2008-67...

96

Flash2008-16.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16.pdf Flash2008-16.pdf Flash2008-16.pdf More Documents & Publications Flash2008-46.pdf.pdf Flash2008-04.pdf Flash2008-43...

97

Flash2005-16.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.pdf Flash2005-16.pdf Flash2005-16.pdf More Documents & Publications flash2005-18.pdf flash2005-17.pdf Flash2005-19...

98

Flash2007-16.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.pdf Flash2007-16.pdf Flash2007-16.pdf More Documents & Publications Flash2007-01.pdf Flash2007-36.pdf Flash2007-24...

99

Flash2010-75.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5.pdf Flash2010-75.pdf Flash2010-75.pdf More Documents & Publications AttachmentFlash2010-75.pdf Flash2010-01.pdf Flash2010-05...

100

Flash2009-75.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

75.pdf Flash2009-75.pdf Flash2009-75.pdf More Documents & Publications Flash2010-43.pdf Flash2008-61.pdf Flash2010-07...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

SRS CAB - Viewers and Players  

NLE Websites -- All DOE Office Websites (Extended Search)

Viewers and Players Adobe PDF Reader http:www.adobe.comproductsreader Google Hangouts Tutorial Microsoft Office LiveMeeting http:www.livemeeting.comccsrsemeetings For Apple...

102

Policy Flash 2005-53  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38 38 DATE: February 3, 2011 TO: Procurement Directors FROM: Director, Policy Division Office of Procurement and Assistance Policy Office of Procurement and Assistance Management SUBJECT: Acquisition Career Management Handbook Change 2011-01 SUMMARY: A recent review of the Department of Energy (DOE) Acquisition Career Management Program (ACMP), Financial Assistance Program certification identified opportunities for updating the courses required for Level I, Level II, and Level III certification. This Policy Flash and its attachment will be available online at the following website: http://www.management.energy.gov/policy_guidance/policy_flashes.htm. Questions concerning this policy flash should be directed to the Acquisition Career

103

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

104

V-016: HP Performance Insight Bugs with Sybase Database Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let...

105

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

106

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am...

107

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

108

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis...

109

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final...  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 DOENETL-20101406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This...

110

Policy Flash 2005-53  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

out templates are scheduled to be pushed into production the night of April 12, 2012. STRIPES will send out a notice. Page 2 This flash may be viewed at http:energy.gov...

111

Policy Flash 2013-65  

Energy.gov (U.S. Department of Energy (DOE))

Questions concerning this policy flash should be directed to Mike Larson of the Office of Acquisition and Project Management, Strategic Programs Division at (202) 287-1426 or at Michael.Larson@hq...

112

Policy Flash 2005-53  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to include changes to the Scientific and Technical Information website and DOE Order 241.1 B. This flash and the attachment may be viewed at http:management.energy.gov...

113

Bed bugs are blood-sucking insects in the family Cimicidae. Both nymphs  

E-Print Network (OSTI)

- trol this pest. IDENTIFICATION AND LIFE CYCLE Adult bed bugs (Figure 1) are oval, wing- less, about 1/5 inch long, and rusty red or mahogany. Their bodies are flattened, they have well-developed antennae, conenose bugs (also known as kissing bugs), by their smaller size, more rounded shape, and lack of wings

Hammock, Bruce D.

114

ConAir: featherweight concurrency bug recovery via single-threaded idempotent execution  

Science Conference Proceedings (OSTI)

Many concurrency bugs are hidden in deployed software and cause severe failures for end-users. When they finally manifest and become known by developers, they are difficult to fix correctly. To support end-users, we need techniques that ... Keywords: bug fixing, concurrency bugs, failure recovery, idempotency, static analysis

Wei Zhang; Marc de Kruijf; Ang Li; Shan Lu; Karthikeyan Sankaralingam

2013-04-01T23:59:59.000Z

115

Policy Flash 2012-59 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications Policy Flash 2012-22 Policy Flash 2013-20 Policy Flash 2013-18 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

116

Policy Flash 2012-31 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications Policy Flash 2012-33 Policy Flash 2012-41 Policy Flash 2013-04 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

117

Policy Flash 2012-14 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications Policy Flash 2012-2 Policy Flash 2012-30 Policy Flash 2012-9 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

118

Policy Flash 2012-48 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications Policy Flash 2012-44 Policy Flash 2012-49 Policy Flash 2012-46 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

119

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

120

Flash Steam Power Plant | Open Energy Information  

Open Energy Info (EERE)

Flash Steam Power Plant Flash Steam Power Plant (Redirected from Flash Steam Power Plants) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Flash Steam Power Plants General List of Flash Steam Plants Flash Steam power plant process diagram - DOE EERE 2012 Flash steam plants are the most common type of geothermal power generation plants in operation in the world today. Fluid at temperatures greater than 360°F (182°C) is pumped under high pressure into a tank at the surface held at a much lower pressure, causing some of the fluid to rapidly vaporize, or "flash." The vapor then drives a turbine, which drives a generator. If any liquid remains in the tank, it can be flashed again in a second tank to extract even more energy.[1] Facility Name Owner Capacity (MW) Facility

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

DATE: TO: FROM: POLICY FLASH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 5,2008 June 5,2008 Procurement Directors Office of Procurement and Assistance Policy, MA-61 Office of Procurement and Assistance Management SUBJECT: DOE 0 540.1B - Departmental Business Instrument Numbering System for Actions Conducted Outside of the Strategic Integrated Procurement Enterprise System (STRIPES) SUMMARY: This Policy flash is to inform you that the above listed Directive was issued on May 23,2008. This Order prescribes procedures for assigning identifying numbers to all new business instruments processed outside the Strategic Integrated Procurement Enterprise System. This Flash may be viewed online at the following website: http://mananement.energy.~ov/policy ~idance/policy flashes.htm. Questions regarding this Guide should be directed to the office identified in the "Contact"

122

Policy Flash 2005-53  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 DATE: March 16, 2011 TO: Procurement Directors FROM: Director, Policy Division Office of Procurement and Assistance Policy Office of Procurement and Assistance Management SUBJECT: Acquisition Guide Chapters 4.1 - Procurement and Assistance Data System (PADS) and 4.3 - Requirements for the Industry Interactive Procurement System (IIPS) SUMMARY: With the implementation of Strategic Integrated Procurement Enterprise System (STRIPES), Acquisition Guide Chapters 4.1 - Procurement and Assistance Data System (PADS) and 4.3 - Requirements for the Industry Interactive Procurement System (IIPS) are hereby rescinded. This flash may be viewed at http://management.energy.gov/policy_guidance/policy_flashes.htm. Questions concerning this policy flash should be directed to Barbara Binney at (202) 287-1340

123

Policy Flash 2012-61 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flash 2012-61 More Documents & Publications Policy Flash 2012-55 Policy Flash 2012-49 Policy Flash 2012-60 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

124

flash2004-16.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.pdf flash2004-16.pdf flash2004-16.pdf More Documents & Publications flash2004-16attachment.pdf Al2000-12.pdf Flash2004-13.pdf...

125

Policy Flash 2011-92 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Policy Flash 2011-92 Federal Acquisition Circular 2005-53. PolicyFlash2011-92.pdf PolicyFlash2011-92Attachment.pdf More Documents & Publications PolicyFlash2011-59Attach...

126

Flash2011-37 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 OPAM Flash2011-37 OPAM DOE O 413.2B Admin Chg 1, Laboratory Directed Research and Development Flash2011-37 OPAM More Documents & Publications Flash2011-70 OPAM Policy Flash...

127

Flash2011-71 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 OPAM Flash2011-71 OPAM DOE O 436.1 Departmental Sustainability Flash2011-71 OPAM More Documents & Publications Policy Flash 2011-47 OPAM Flash2011-76...

128

Policy Flash 2012-68  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68 68 DATE: September 21, 2012 TO: Procurement Directors FROM: Director, Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management SUBJECT: Political Activity SUMMARY: Policy Flash 2011-2, issued October 5, 2010, provided information on the prohibition on using Government property and facilities to conduct political activities. Recently, there was an alleged misuse of the Department of Energy (DOE) e-mail system to conduct political activities by a DOE contractor. This Policy Flash serves as a reminder on political activities in the workplace during this election season. Government property and facilities are not authorized for political activity. DOE contractors are restricted from using Government property

129

Flash2011-79 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 Flash2011-79 DOE O 456.1, The Safe Handling of Unbound engineered Nanoparticles DOE O 458.1 Change 2, Radiation Protection of the Public and the Environment Flash2011-79 More...

130

Flash Photography Enhancement via Intrinsic Relighting  

E-Print Network (OSTI)

We enhance photographs shot in dark environments by combining a picture taken with the available light and one taken with the flash. We preserve the ambiance of the original lighting and insert the sharpness from the flash ...

Eisemann, Elmar

131

Flash Steam Power Plant | Open Energy Information  

Open Energy Info (EERE)

Flash Steam Power Plant Flash Steam Power Plant Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Flash Steam Power Plants General List of Flash Steam Plants Flash Steam power plant process diagram - DOE EERE 2012 Flash steam plants are the most common type of geothermal power generation plants in operation in the world today. Fluid at temperatures greater than 360°F (182°C) is pumped under high pressure into a tank at the surface held at a much lower pressure, causing some of the fluid to rapidly vaporize, or "flash." The vapor then drives a turbine, which drives a generator. If any liquid remains in the tank, it can be flashed again in a second tank to extract even more energy.[1] Facility Name Owner Capacity (MW) Facility Type Commercial Online Date Geothermal Area

132

Cooling Fusion in a Flash | Princeton Plasma Physics Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooling Fusion in a Flash American Fusion News Category: U.S. Universities Link: Cooling Fusion in a Flash...

133

Brown Marmorated The brown marmorated stink bug (BMSB), Halyomorpha  

E-Print Network (OSTI)

abdominal edge extending beyond wings MATURE NYMPH Banded antennae Spines in front of eyes and on shoulder edges Banded legs Dark bands on wing tips Blue-green metallic depressions on head and shoulder,UC JACKKELLYCLARK,UC RED SHOULDERED STINK BUG Edgeofabdomenconcealed;antennal bands, if present, are not white; less

Ishida, Yuko

134

Is this a bug or an obsolete test?  

Science Conference Proceedings (OSTI)

In software evolution, developers typically need to identify whether the failure of a test is due to a bug in the source code under test or the obsoleteness of the test code when they execute a test suite. Only after finding the cause of a failure can ...

Dan Hao, Tian Lan, Hongyu Zhang, Chao Guo, Lu Zhang

2013-07-01T23:59:59.000Z

135

Macro-modeling and energy efficiency studies of file management in embedded systems with flash memory  

E-Print Network (OSTI)

Technological advancements in computer hardware and software have made embedded systems highly affordable and widely used. Consumers have ever increasing demands for powerful embedded devices such as cell phones, PDAs and media players. Such complex and feature-rich embedded devices are strictly limited by their battery life- time. Embedded systems typically are diskless and use flash for secondary storage due to their low power, persistent storage and small form factor needs. The energy efficiency of a processor and flash in an embedded system heavily depends on the choice of file system in use. To address this problem, it is necessary to provide sys- tem developers with energy profiles of file system activities and energy efficient file systems. In the first part of the thesis, a macro-model for the CRAMFS file system is established which characterizes the processor and flash energy consumption due to file system calls. This macro-model allows a system developer to estimate the energy consumed by CRAMFS without using an actual power setup. The second part of the thesis examines the effects of using non-volatile memory as a write-behind buffer to improve the energy efficiency of JFFS2. Experimental results show that a 4KB write-behind buffer significantly reduces energy consumption by up to 2-3 times for consecutive small writes. In addition, the write-behind buffer conserves flash space since transient data may never be written to flash.

Goyal, Nitesh

2005-05-01T23:59:59.000Z

136

Raqs Media Collective Flash Force  

E-Print Network (OSTI)

extended only to a couple of inches. With the invention of light bulbs, scientists started detonatingRaqs Media Collective Flash Force: A Visual History of Might, Right and Light Perhaps the greatest of light and divorcing these from the potent explosions that initially produced them. It is a history

Canales, Jimena

137

Multi-stage flash degaser  

DOE Patents (OSTI)

A multi-stage flash degaser is incorporated in an energy conversion system having a direct-contact, binary-fluid heat exchanger to remove essentially all of the noncondensable gases from geothermal brine ahead of the direct-contact binary-fluid heat exchanger in order that the heat exchanger and a turbine and condenser of the system can operate at optimal efficiency.

Rapier, P.M.

1980-06-26T23:59:59.000Z

138

Policy Flashes FY 2013 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flashes FY 2013 Flashes FY 2013 Policy Flashes FY 2013 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. View the archive of Policy Flashes for FY 2012. Number Topic 2013-79 Professional and Consultant service costs (FAR 31.205-33) 2013-78 Acquisition Guide Chapter 7.3 Acquisition Planning in the M&O Enviroment

139

Guidebook for preparing players' handbooks  

SciTech Connect

This Guidebook has been written to assist DOE in planning and developing Players' Handbooks for test exercises. The Guidebook is focused especially on the AST, CERM and WINTEX-CIMEX exercises, but may be useful for planning and developing Players' Handbooks for other tests. The main features of the Guidebook include Handbook Checklists and Model Shells for common sections of the AST, CERM and WINTEX-CIMEX Handbooks. The Checklist is a planning and organizing tool. The Model Shells provide much of the text for five common sections of the Handbooks. Prompts, which indicate the placement and type of insertions required for specific handbooks, are imbedded in the Model Shells. These are available as WordPerfect 5.0 files and feature an automatic search routine which locates all prompts for the user. Model Shells had been developed for the Exercise Plan (EXPLAN), Player Directory, Test Schedule, Communications Plan and Evaluation Plan (EVPLAN) sections of the Handbooks. 2 figs., 6 tabs.

Not Available

1989-09-01T23:59:59.000Z

140

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

142

Multi-stage flash degaser  

DOE Patents (OSTI)

A multi-stage flash degaser (18) is incorporated in an energy conversion system (10) having a direct-contact, binary-fluid heat exchanger to remove essentially all of the noncondensable gases from geothermal brine ahead of the direct-contact binary-fluid heat exchanger (22) in order that the heat exchanger (22) and a turbine (48) and condenser (32) of the system (10) can operate at optimal efficiency.

Rapier, Pascal M. (Richmond, CA)

1982-01-01T23:59:59.000Z

143

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

DK, Weiss R: Synthetic biology: new engineering rules for anfrom bugs to synthetic biology to fuels Sung Kuk Lee, Howardengineering and synthetic biology will provide new tools for

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

144

DON'T LET THE BED BUGS BITE We've all heard the saying, "sleep tight, don't let the bed bugs bite." Most of us have never  

E-Print Network (OSTI)

and appear bright red after feeding. The wings of bed bugs are vestigial, so they cannot fly. Bed bugs can. Small, flat, or raised bumps on the skin are the most common sign; redness, swelling, and itching

Bertini, Robert L.

145

FLASH2011-16-OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FLASH2011-16-OPAM FLASH2011-16-OPAM DOE M 470.4-4A Change 1, Information Security Manual FLASH2011-16-OPAM More Documents & Publications FLASH2011-17-OPAM Policy Flash 2011-47 OPAM...

146

Optical Characteristics of OTD Flashes and the Implications for Flash-Type Discrimination  

Science Conference Proceedings (OSTI)

Flashes detected by the Optical Transient Detector (OTD) that occur over the continental United States (CONUS) are intercompared with data from the National Lightning Detection Network (NLDN) in order to partition the OTD flashes into ground and ...

W. J. Koshak

2010-11-01T23:59:59.000Z

147

Green Flash: Embedded Microprocessor Technology for HPC  

NLE Websites -- All DOE Office Websites (Extended Search)

Green Flash Exascale Computing Performance & Monitoring Tools Petascale Initiative Science Gateway Development Storage and IO Technologies Testbeds Home R & D Energy...

148

Study of falling-jet flash evaporators  

DOE Green Energy (OSTI)

Experimental results of flash evaporation from sheets of water, 3.2 mm and 6.3 mm thick and 27.9 cm wide, falling freely in the presence of their own vapor, are reported. With no flashing the jets fall in coherent sheets, but with flashing the jets were observed to spread and break up into droplets. Flashing was characterized by an effectiveness parameter, which was found to increase with increasing water temperature and jet length. Variations in water flow rate and heat flux did not influence the effectiveness appreciably.

Kreith, F.; Olson, D.A.; Bharathan, D.; Green, H.J.

1982-11-01T23:59:59.000Z

149

Policy Flash 2005-53  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 DATE: November 4, 2011 TO: Procurement Directors FROM: Director Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management SUBJECT: Accelerating Payment to Small Businesses for Goods and Services SUMMARY: With reference to Policy Flash 2012-02, Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices, and OMB Memorandum M-11-32, "Accelerating Payment to Small Businesses for Goods and Services," established an Executive Branch policy to pay small business invoices as quickly as practicable, with a goal of paying within 15 days. Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices implements this

150

Policy Flash 2013-04 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SBA 8(a) MOU.pdf More Documents & Publications Policy Flash 2013-13 Policy Flash 2013-09 Policy Flash 2013-15 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

151

Policy Flash 2012-56 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Other Agencies You are here Home Policy Flash 2012-56 Policy Flash 2012-56 Attached is Policy Flash 2012-56- Incorporation of the Department of Energy Acquisition Guide Chapter...

152

Policy Flash 2012-50 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Other Agencies You are here Home Policy Flash 2012-50 Policy Flash 2012-50 Attached Policy Flash 2012-50 Department of Energy Audit Guide for For-Profit Recipients Questions...

153

Policy Flash 2012-43 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2012 FINAL.pdf More Documents & Publications Policy Flash 2013-08 Policy Flash 2012-49 Policy Flash 2012-46 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

154

Policy Flash 2013-13 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

III..pdf More Documents & Publications Policy Flash 2013-04 Policy Flash 2013-09 Policy Flash 2013-15 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

155

Policy Flash 2012-26 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2012-26 Policy Flash 2012-26 Below is Policy Flash 2012-26, Release of Department of Energy Award Fee and Incentive Fee Reports PolicyFlash2012-26.pdf More Documents &...

156

Policy Flash 2012-40 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

than NASA.pdf More Documents & Publications Policy Flash 2012-69 Policy Flash 2012-70 Policy Flash 2013-11 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

157

Policy Flash 2012-41 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

memo (1)0.pdf More Documents & Publications Policy Flash 2012-12 Policy Flash 2012-33 Policy Flash 2012-31 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

158

Policy Flash 2013-09 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2Nov12 CLEAN.pdf More Documents & Publications Policy Flash 2013-13 Policy Flash 2013-04 Policy Flash 2013-15 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

159

Policy Flash 2013-06 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Contracts.pdf More Documents & Publications Policy Flash 2012-37 Policy Flash 2013-05 Policy Flash 2012-62 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

160

Policy Flash 2012-66 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Clause or Template Changes More Documents & Publications Policy Flash 2012-55 POLICY FLASH 2013-58 Revised Guide for Financial Assistance Policy Flash 2013-46 Awardee in STRIPES...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Policy Flash 2012-55 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 Policy Flash 2012-55 Attached is Policy Flash 2012-55 Requisitions in STRIPES Questions concerning this policy flash should be directed to Kevin Smith at (202) 287- 1614 or...

162

Policy Flash 2013-11 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Policy Flash 2013-11 Attached is Policy Flash 2013-11 STRIPES New Milestone Plan Process Questions concerning this policy flash should be directed to Kevin M. Smith, of the...

163

Flash2011-8 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPAM Flash2011-8 OPAM Sustainable Acquisition, Federal and Department of Energy Acquisition Regulation Amendments Flash2011-8 OPAM More Documents & Publications Flash2011-51 OPAM...

164

Policy Flash 2012-58 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Policy Flash 2012-58 Attached is Policy Flash 2012-58 Federal Acquisition Circular 2005-60 Questions concerning this policy flash should be directed to Richard Langston, of the...

165

Policy Flash 2007-28 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Policy Flash 2007-28 Federal Acquisition Circular 2005-17 Policy Flash 2007-28 More Documents & Publications Federal Acquisition Circulars 17, 18 and 20 flash2005-17.pdf Policy...

166

Policy Flash 2013-19 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 Policy Flash 2013-19 Attached is Policy Flash 2013-19 Federal Acquisition Circular 2005-64 Questions concerning this policy flash should be directed to Barbara Binney, of the...

167

Policy Flash 2013-17 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 Policy Flash 2013-17 Attached is Policy Flash 2013-17 Federal Acquisition Circular 2005-62 Questions concerning this policy flash should be directed to Barbara Binney, of the...

168

Policy Flash 2012-42 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Policy Flash 2012-42 Attached is Policy flash 2012-42 Federal Acquisition Circular 2005-59 Questions concerning this policy flash should be directed to Richard Langston, of the...

169

Policy Flash 2013-18 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Policy Flash 2013-18 Attached is Policy Flash 2013-18 Federal Acquisition Circular 2005-63 Questions concerning this policy flash should be directed to Barbara Binney, of the...

170

Policy Flash 2012-70 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70 Policy Flash 2012-70 Attached is Policy Flash 2012-70 Department of Energy Federal Acquisition Regulation Clause Usage Guide Questions concerning this policy flash should be...

171

Policy Flash 2012-69 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 Policy Flash 2012-69 Attached is Policy Flash 2012-69 Department of Energy Federal Acquisition Regulation Clause Usage Guide Questions concerning this policy flash should be...

172

FLASH2011-35-OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5-OPAM FLASH2011-35-OPAM DOE O 413.3B PROGTRAM AND PROJECT MANAGEMENT FOR THE ACQUISITION OF CAPITAL ASSETS FLASH2011-35-OPAM More Documents & Publications Flash2011-26 OPAM...

173

Policy Flash 2012-57 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2012-57 Attached is Policy Flash 2012-57 Communication to All Department of Energy Contractors Questions concerning this policy flash should be directed to Richard...

174

Policy Flash 2012-63 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Policy Flash 2012-63 Attached is Policy Flash 2012-63 Update Department of Energy Acquisition Guide Chapter 22.1 Labor Standards Questions concerning this policy flash should be...

175

Policy Flash 2013-03 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flash 2013-03 Attached is Policy Flash 2013-03 Responding to solicitations under DOE's Work for Others Program (WFO) Questions concerning this policy flash should be directed to...

176

Policy Flash 2012-68 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Flash 2012-68 Contractor Political Activity Q&A Requests by Political Candidates to Tour DOE Facilities More Documents & Publications Policy Flash 2012-47 Policy Flash 2012-45...

177

Flash2010-25.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25.pdf Flash2010-25.pdf Flash2010-25.pdf More Documents & Publications OPAM Policy Acquisition Guides Flash2010-62v1.pdf SEBMonthlyStatusReportingRequirement...

178

Flash2010-25.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5.pdf Flash2010-25.pdf Flash2010-25.pdf More Documents & Publications Flash2010-62v1.pdf OPAM Policy Acquisition Guides SEBMonthlyStatusReportingRequirement.pdf...

179

Policy Flash 2011-49 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home Policy Flash 2011-49 OPAM Policy Flash 2011-49 OPAM DOE O 458.1 Admin Chg 1, Radiation Protection of the Public and the Environment Policy Flash 2011-49 OPAM More...

180

Flash2011-45 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Other Agencies You are here Home Flash2011-45 OPAM Flash2011-45 OPAM DOE O 458.1 Radiation Protection of the Public and the Environment Flash2011-45 OPAM More Documents &...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

AttachmentFlash2010-75.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5.pdf AttachmentFlash2010-75.pdf AttachmentFlash2010-75.pdf More Documents & Publications DEAR952.204-2SecrutiyClause(AUG2009)RequirementFactSheet.pdf Flash2010-75.pdf...

182

Policy Flash 2012-28 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Attached is Policy Flash Policy Flash 2012-28 DOE Federal Acquisition Regulation Clause Usage Guide PolicyFlash2012-28.pdf FARClauseMatrix6.pdf More Documents & Publications...

183

Flash2011-15 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Other Agencies You are here Home Flash2011-15 OPAM Flash2011-15 OPAM FAR Dollar Threshold Changes 2011-15 Attachment FAR Dollar Threshold Changes Flash2011-15 OPAM...

184

WuKong: automatically detecting and localizing bugs that manifest at large system scales  

Science Conference Proceedings (OSTI)

A key challenge in developing large scale applications is finding bugs that are latent at the small scales of testing, but manifest themselves when the application is deployed at a large scale. Here, we ascribe a dual meaning to "large scale"---it could ... Keywords: feature reconstruction, program behavior prediction, scale-dependent bug

Bowen Zhou; Jonathan Too; Milind Kulkarni; Saurabh Bagchi

2013-06-01T23:59:59.000Z

185

Catch me if you can: performance bug detection in the wild  

Science Conference Proceedings (OSTI)

Profilers help developers to find and fix performance problems. But do they find performance bugs -- performance problems that real users actually notice? In this paper we argue that -- especially in the case of interactive applications -- traditional ... Keywords: latency bug, perceptible performance, profiling

Milan Jovic; Andrea Adamoli; Matthias Hauswirth

2011-10-01T23:59:59.000Z

186

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

187

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

188

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

189

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

190

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

191

A transactional flash file system for microcontrollers  

Science Conference Proceedings (OSTI)

We present a transactional file system for flash memory devices. The file system is designed for embedded microcontrollers that use an on-chip or on-board NOR flash device as a persistent file store. The file system provides atomicity to arbitrary sequences ...

Eran Gal; Sivan Toledo

2005-04-01T23:59:59.000Z

192

Flash Center for Computational Science The University of Chicago  

NLE Websites -- All DOE Office Websites (Extended Search)

Flash Center for Computational Science Flash Center for Computational Science The University of Chicago Flash Center for Computational Science Mira Early Science Project Conference Argonne National Laboratory 15 May 2013 Carlo Graziani Flash Center University of Chicago New Insights Into Buoyancy-Driven Turbulent Nuclear Combustion from Large-Scale 3D FLASH Simulations Flash Center for Computational Science The University of Chicago What are Type Ia supernovae? Supernova Cosmology Project Flash Center for Computational Science The University of Chicago What are Type Ia supernovae? Supernova Cosmology Project Peak luminosities of most Type Ia SNe are similar - making them excellent "cosmic yardsticks" Flash Center for Computational Science The University of Chicago

193

Policy Flash 2013-25 Acquisition Certifications Program Handbook...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2013-25 Acquisition Certifications Program Handbook 3rd Edition released Policy Flash 2013-25 Acquisition Certifications Program Handbook 3rd Edition released Attached...

194

Flash2010-54.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications Policy Flash 2009-01 Tips for Processing Financial Assistance Actions in STRIPES Policy Flash 2009-01 Tips for Processing Financial Assistance Actions in STRIPES...

195

Flash2009-01.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications Policy Flash 2009-01 Tips for Processing Financial Assistance Actions in STRIPES Policy Flash 2009-01 Tips for Processing Financial Assistance Actions in STRIPES...

196

Policy Flash 2011-104 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 Policy Flash 2011-104 Policy Flash 2011-104 - Sources for Office Supplies. The Department of Energy (DOE) supports utilization of: (1) the General Service Administration's...

197

Changes related to "A Flashing Binary Combined Cycle For Geothermal...  

Open Energy Info (EERE)

Twitter icon Changes related to "A Flashing Binary Combined Cycle For Geothermal Power Generation" A Flashing Binary Combined Cycle For Geothermal Power Generation...

198

Policy Flash 2013-54 Acquisition Certification Program Handbook...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2013-54 Acquisition Certification Program Handbook 4th Edition Policy Flash 2013-54 Acquisition Certification Program Handbook 4th Edition Acquisition Certifications...

199

Policy Flash 2013-54 Acquisition Certification Program Handbook...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54 Acquisition Certification Program Handbook 4th Edition Policy Flash 2013-54 Acquisition Certification Program Handbook 4th Edition Questions concerning this policy flash should...

200

Guidebook for preparing players' handbooks  

SciTech Connect

This Addendum to the Guidebook for Preparing Players' Handbooks contains several documents that can be inserted into handbooks for future test exercises. Descriptions of these documents are provided in Section 4 of the Guidebook. While the documents are general enough to be included in handbooks with little or no editing, it is recommended the handbook preparers review the documents to determine whether the language is appropriate for a specific future exercise. Some of the documents refer to specific sections or tab numbers which may be inappropriate if future handbooks are organized differently from past handbooks.

Not Available

1989-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Policy Flash 2012-59  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 9 DATE: August 6, 2012 TO: Procurement Directors/Contracting Officers FROM: Director Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management SUBJECT: Section 311 Revised Template August 2012 SUMMARY: Attached are 3 revised templates for sending the Section 311 notices to Congress as prescribed in Acquisition Letter (AL) 2012-07 and Financial Assistance Letter (FAL) 2012-01. The template revises the first bullet to use of the program name and subprogram name found in the appropriations, instead of the treasury account number. If there are multiple program names and/or subprogram names, then these will need to be listed. This Flash will be available online at the following website:

202

NUCLEAR FLASH TYPE STEAM GENERATOR  

DOE Patents (OSTI)

A nuclear steam generating apparatus is designed so that steam may be generated from water heated directly by the nuclear heat source. The apparatus comprises a pair of pressure vessels mounted one within the other, the inner vessel containing a nuclear reactor heat source in the lower portion thereof to which water is pumped. A series of small ports are disposed in the upper portion of the inner vessel for jetting heated water under pressure outwardly into the atmosphere within the interior of the outer vessel, at which time part of the jetted water flashes into steam. The invention eliminates the necessity of any intermediate heat transfer medium and components ordinarily required for handling that medium. (AEC)

Johns, F.L.; Gronemeyer, E.C.; Dusbabek, M.R.

1962-09-01T23:59:59.000Z

203

Professional Flash Lite Mobile Development, 1st edition  

Science Conference Proceedings (OSTI)

Discover how to create Flash Lite mobile apps from the ground up Adobe Flash is an ideal choice for developing rich interactive content for "Flash-enabled" mobile devices; and with this book, you'll learn how to create unique applications with Flash ...

J. G. Anderson

2010-03-01T23:59:59.000Z

204

Policy Flashes FY 2004 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Policy Flashes FY 2004 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2004-26 (pdf) - Discretionary Set-Aside Authority 2004-26 Attachment (pdf) - Memorandum from Richard Hopf on Discretionary Set-Aside Authority 2004-25 (pdf) - Nepotism in Contracting (with attachment)

205

Policy Flashes for 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 Policy Flashes for 2007 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2007-62 Executive Order 13423, Strengthening Federal Environmental, Energy and Transportation Management 2007-62 Attachment Acquisition Letter 2007-12, Executive Order 13423, Strengthening Federal Environmental, Energy and Transportation Management

206

Policy Flashes FY 2003 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 Policy Flashes FY 2003 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2003-32 (pdf) Amendment of the Department of Energy Acquisition Regulation (DEAR) to Revise Conditional Payment of Fee Clause 2003-31 (pdf) Federal Acquisition Circular (FAC) 2001-16 -

207

CRB Policy Flashes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRB Policy Flashes CRB Policy Flashes CRB Policy Flashes In addition to granting certifications for DOE project management personnel, the Board is also tasked with developing and updating the policies that define the requisite knowledge, skills, and abilities needed to fulfill the Departmental mission for the effective management of capital asset projects as defined in DOE O 413.3B. To that end, the Board also establishes PMCDP certification requirements and publishes them in the Certification and Equivalency Guideline. In an effort to better inform the various participating program offices of changes within the PMCDP and the various certification requirements needed for each level of PMCDP certification, the Board publishes policy flash documents that are available for download here on the PMCDP Web site. New

208

Indian Point-2 Flash Photography Event  

Science Conference Proceedings (OSTI)

This report presents the results of an independent assessment by the EPRI Electromagnetic & Radio Frequency Interference Working Group on a flash photography event at the Indian Point-2 (IP-2) nuclear power plant.

2009-03-17T23:59:59.000Z

209

POLICY FLASH 2013-67 FAC-68  

Energy.gov (U.S. Department of Energy (DOE))

Questions concerning this policy flash should be directed to Barbara Binney, of the Office of Acquisition and Project Management Policy at (202) 287-1340 or at Barbara.Binney@hq.doe.gov.

210

Policy Flashes for 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 Policy Flashes for 2008 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2008-67 Federal Acquisition Circular (FAC) 2005-27 2008-67 Attachment 1 Federal Acquisition Circular (FAC) 2005-27 2008-67 Attachment 2 Federal Register Notice of September 17, 2008 2008-66 Revised Acquisition Guide Chapter 71.1 Headquarters Business

211

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

212

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

213

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

214

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

215

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

216

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

217

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

218

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

219

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

220

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

222

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

223

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

224

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

225

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

226

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

227

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

228

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

229

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

230

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

231

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

232

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

233

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

234

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

235

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

236

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

237

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

238

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

239

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

240

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

242

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

243

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

244

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

245

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

246

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

247

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

248

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

249

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

250

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

251

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

252

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

253

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

254

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

255

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

256

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

257

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

258

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

259

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

260

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

262

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

263

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

264

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

265

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

266

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

267

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

268

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

269

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

270

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

271

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

272

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

273

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

274

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

275

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

276

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

277

ConMem: detecting severe concurrency bugs through an effect-oriented approach  

Science Conference Proceedings (OSTI)

Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly ... Keywords: concurrency bugs, software testing

Wei Zhang; Chong Sun; Shan Lu

2010-03-01T23:59:59.000Z

278

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

279

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

280

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

282

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

283

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15, 2011 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

284

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 15, 2011 November 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

285

Single Particle Difraction at FLASH  

SciTech Connect

Single-pulse coherent diffraction patterns have been collected from randomly injected single particles with a soft X-ray free-electron laser (FEL). The intense focused FEL pulse gives a high-resolution low-noise coherent diffraction pattern of the object before that object turns into a plasma and explodes. A diffraction pattern of a single particle will only be recorded when the particle arrival into the FEL interaction region coincides with FEL pulse arrival and detector integration. The properties of the experimental apparatus coinciding with these three events set the data acquisition rate. For our single particle FLASH diffraction imaging experiments: (1) an aerodynamic lens stack prepared a particle beam that consisted of particles moving at 150-200 m/s positioned randomly in space and time, (2) the 10 fs long FEL pulses were delivered at a fixed rate, and (3) the detector was set to integrate and readout once every two seconds. The effect of these experimental parameters on the rate of data acquisition using randomly injected particles will be discussed. Overall, the ultrashort FEL pulses do not set the limit of the data acquisition, more important is the effective interaction time of the particle crossing the FEL focus, the pulse sequence structure and the detector readout rate. Example diffraction patterns of randomly injected ellipsoidal iron oxide nanoparticles in different orientations are presented. This is the first single particle diffraction data set of identical particles in different orientations collected on a shot-to-shot basis. This data set will be used to test algorithms for recovering 3D structure from single particle diffraction.

Bogan, M.; Boutet, S.; Starodub, Dmitri; Decorwin-Martin, Philippe; /SLAC; Chapman, H.; Bajt, S.; Schulz, J.; /DESY; Hajdu, Janos; Seibert, M.M.; Iwan, Bianca; Timneanu, Nicusor; /Uppsala U.; Marchesini, Stefano; /LBL, Berkeley; Barty, Anton; Benner, W.Henry; Frank, Matthias; Hau-Riege, Stefan P.; Woods, Bruce; /LLNL, Livermore; Rohner, Urs; /Tofwerk AG, Thun

2010-06-11T23:59:59.000Z

286

Policy Flashes FY 2012 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2012 FY 2012 Policy Flashes FY 2012 Archive of Policy Flashes issued in FY 2012. Number Topic 2012-70 Department of Energy Federal Acquisition Regulation Clause Usage Guide 2012-69 DEAR Contract Clause Matrix 2012-68 Political Activity 2012-67 Acquisition Savings Reporting Guidance 2012-66 Attachment to Policy Flash on New Procedures for Submitting Clause or Template Changes 2012-65 Federal Acquisition Circular 61 2012-64 Contract Clause Matrix 2012-63 Update Department of Energy Acquisition Guide Chapter 22.1 Labor Standards 2012-62 Class Deviation DEAR 950.7006/AL 2012-10, Implementation of the Price-Anderson Act of 2005 2012-61 DOE COR Toolkit Recission 2012-60 Acquisition Guide Chapter 13.1, Purchase Card Policy and Operating Procedures 2012-59 Section 311 Revised Template August 2012

287

Recovery News Flashes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery News Flashes Recovery News Flashes Recovery News Flashes RSS September 1, 2011 Workers Complete Asbestos Removal at West Valley to Prepare Facility for Demolition American Recovery and Reinvestment Act workers safely cleared asbestos from more than 5,500 feet of piping in the Main Plant Process Building. Project completion is an important step in preparing the former commercial nuclear fuel reprocessing building for demolition. August 29, 2011 Idaho Workers Complete Last of Transuranic Waste Transfers Funded by Recovery Act American Recovery and Reinvestment Act workers successfully transferred 130 containers of remote-handled transuranic waste – each weighing up to 15 tons – to a facility for repackaging and shipment to a permanent disposal location.

288

Recovery News Flashes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery News Flashes Recovery News Flashes Recovery News Flashes RSS January 29, 2013 "TRU" Success: SRS Recovery Act Prepares to Complete Shipment of More Than 5,000 Cubic Meters of Nuclear Waste to WIPP With the American Recovery and Reinvestment Act funding, Savannah River Site (SRS) continues to safely treat and dispose of radioactive waste created while producing materials for nuclear weapons throughout the Cold War. The DOE site in Aiken, S.C., is safely, steadily, and cost-effectively making progress to analyze, measure, and then carefully cleanup or dispose of legacy transuranic (TRU) waste remaining at SRS after the lengthy nuclear arms race. November 2, 2012 Recovery Act Exceeds Major Cleanup Milestone, DOE Complex Now 74 Percent Remediated The Office of Environmental Management's (EM) American Recovery and

289

EM News Flashes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

News Flashes News Flashes EM News Flashes RSS December 23, 2013 Aspen Cass, a relative of an EM Carlsbad Field Office (CBFO) employee, holds donated coats with Farok Sharif (left), president and project manager of Nuclear Waste Partnership, the WIPP management and operating contractor, and Joe Franco, manager of CBFO. EM Waste Isolation Pilot Plant Team's Holiday Spirit Shines CARLSBAD, N.M. - Children in the Carlsbad area are warmer this holiday season thanks to the generosity of EM's Waste Isolation Pilot Plant (WIPP) team of employees. December 11, 2013 Jim Kopotic and his daughter Lauren pause for a photo after a race that raised money for cancer research and treatment. 'Can Do' Attitude Brings EM Family Together OAK RIDGE, Tenn. - It's 7:51 a.m. on a Tuesday morning. A white,

290

Policy Flashes - FY 2001 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Policy Flashes - FY 2001 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. To obtain any Policy Flash listed below please contact Office of Policy at DOE_OAPM@hq.doe.gov or on (202) 287-1330. Number Topic 2001-29 Biological Etiologic Agents Notice 450.7 Implementation 2001-28 Greening the Government Executive Orders 2001-27 Implementation of New Advance Award Notification System 2001-26 Federal Acquisition Circular 2001-01 2001-25 Financial Assistance Letter (FAL) 2001-04 and Acquisition Letter 2001-05 2001-24 Financial Assistance Letter (FAL) 2001-03 and e-Digest 2001-23 Restrictions on Management and Operating and Support Services Contracting 2001-22 New Acquisition Guide Chapter 2001-21 Acquisition Letter (AL) 2001-04

291

EM News Flashes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

News Flashes News Flashes EM News Flashes RSS September 13, 2012 Pictured here is the Integrated Waste Treatment Unit's off-gas filter following the June incident. Idaho Site Launches Corrective Actions Before Restarting Waste Treatment Facility IDAHO FALLS, Idaho - The Idaho site and its cleanup contractor have launched a series of corrective actions they will complete before safely resuming startup operations at the Integrated Waste Treatment Unit (IWTU) following an incident in June that caused the new waste treatment facility to shut down. September 11, 2012 Wastren-EnergX Mission Support (WEMS) Senior Safety Engineer Marsha Bevins, left, stands with DOE Director of Worker Safety and Health Brad Davy while holding her Voluntary Protection Program Contractor Champion of the Year award and the 2012 Star of Excellence award WEMS received.

292

Policy Flashes - FY 2002 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Policy Flashes - FY 2002 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. To obtain any Policy Flash listed below please contact Office of Policy at DOE_OAPM@hq.doe.gov or on (202) 287-1330. 2002-42 Federal Acquisition Circular 2001-10 2002-42 Attachment Federal Acquisition Circular 2001-10 2002-41 Revisions and Additions to the Department of Energy (DOE) Acquisition Guide - Chapter 7, Acquisition Planning, and Chapter 71, Headquarters Review of Contract and Financial Assistance Actions 2002-40 Extension of Price-Anderson Act - 1) Awarded Contracts, 2) Proposed Awards, and 3) Reinstatement of Acquisition Letter (AL) 2002-04 2002-39 Financial Assistance Letter (FAL) 2002-03, Implementation of DOE's Industry Interactive Procurement System (IIPS)

293

ACOUSTIC SIGNATURES OF THE HELIUM CORE FLASH  

SciTech Connect

All evolved stars with masses M {approx}< 2 M{sub Sun} undergo an initiating off-center helium core flash in their M{sub c} Almost-Equal-To 0.48 M{sub Sun} He core as they ascend the red giant branch (RGB). This off-center flash is the first of a few successive helium shell subflashes that remove the core electron degeneracy over 2 Myr, converting the object into a He-burning star. Though characterized by Thomas over 40 years ago, this core flash phase has yet to be observationally probed. Using the Modules for Experiments in Stellar Astrophysics (MESA) code, we show that red giant asteroseismology enabled by space-based photometry (i.e., Kepler and CoRoT) can probe these stars during the flash. The rapid ({approx}< 10{sup 5} yr) contraction of the red giant envelope after the initiating flash dramatically improves the coupling of the p-modes to the core g-modes, making the detection of l = 1 mixed modes possible for these 2 Myr. This duration implies that 1 in 35 stars near the red clump in the H-R diagram will be in their core flash phase. During this time, the star has a g-mode period spacing of {Delta}P{sub g} Almost-Equal-To 70-100 s, lower than the {Delta}P{sub g} Almost-Equal-To 250 s of He-burning stars in the red clump, but higher than the RGB stars at the same luminosity. This places them in an underpopulated part of the large frequency spacing ({Delta}{nu}) versus {Delta}P{sub g} diagram that should ease their identification among the thousands of observed red giants.

Bildsten, Lars; Paxton, Bill; Moore, Kevin; Macias, Phillip J. [Kavli Institute for Theoretical Physics and Department of Physics Kohn Hall, University of California, Santa Barbara, CA 93106 (United States)

2012-01-15T23:59:59.000Z

294

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

,000 of its Prius hybrid vehicles following reports of vehicle warning lights illuminating for no reason, the root of the Prius issue wasn't a hardware problem -- it was a programming error in the smart car's embedded code. The Prius had a software bug. With that recall, the Pruis joined the ranks of the buggy

Overstreet, C. Michael

295

Policy Flash 2013-16 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Determinations: Requirement to Obtain Acquisition Executive's Input Policy Flash 2012-52 Policy Flash 2013-68 Acquisition Guide 42.101 Energy.gov Careers & Internships For Staff &...

296

Policy Flash 2009-01 Tips for Processing Financial Assistance...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09-01 Tips for Processing Financial Assistance Actions in STRIPES Policy Flash 2009-01 Tips for Processing Financial Assistance Actions in STRIPES Attached is Policy Flash 2009-01...

297

Policy Flash 2012-66 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on New Procedures for Submitting Clause or Template Changes More Documents & Publications Policy Flash 2012-55 Policy Flash 2013-46 Awardee in STRIPES STRIPESPDSlidesApril2010.pdf...

298

POlicy Flash 2013-60 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management and Security of Personally Identifiable Information POLICY FLASH 2013-55 FPDS-NG Change Management Notice for the Oklahoma Tornado and Storm Policy Flash 2013-74...

299

Theory and Observations of Controls on Lightning Flash Size Spectra  

Science Conference Proceedings (OSTI)

Previous analyses of very high frequency (VHF) Lightning Mapping Array (LMA) observations relative to the location of deep convective updrafts have noted a systematic pattern in flash characteristics. In and near strong updrafts, flashes tend to ...

Eric C. Bruning; Donald R. MacGorman

2013-12-01T23:59:59.000Z

300

Policy Flash 2013-27 Federal Acquisition Circular (FAC) 2005...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 Federal Acquisition Circular (FAC) 2005-65 Policy Flash 2013-27 Federal Acquisition Circular (FAC) 2005-65 Attached is Policy Flash 2013-27 Federal Acquisition Circular (FAC)...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Policy Flash 2013-63 Federal Acquisition Circular (FAC) 2005...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Federal Acquisition Circular (FAC) 2005-67 Policy Flash 2013-63 Federal Acquisition Circular (FAC) 2005-67 Questions concerning this policy flash should be directed to Barbara...

302

Policy Flash 2013-37 Federal Acquisition Circular (FAC) 2005...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 Federal Acquisition Circular (FAC) 2005-66 Policy Flash 2013-37 Federal Acquisition Circular (FAC) 2005-66 Attached is Policy Flash 2013-37 Federal Acquisition Circular (FAC)...

303

Policy Flash 2012-4 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

4 Policy Flash 2012-4 This Flash is issued to provide you an Acquisition Letter containing information and guidance regarding application of labor standards at the Department of...

304

Theory and observations of controls on lightning flash size spectra  

Science Conference Proceedings (OSTI)

Previous analyses of VHF Lightning Mapping Array (LMA) observations relative to the location of deep convective updrafts have noted a systematic pattern in flash characteristics. In and near strong updrafts, flashes tend to be smaller and more ...

Eric C. Bruning; Donald R. MacGorman

305

Policy Flash 2012-33 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Policy Flash 2012-33 Attached Policy Flash 2012-33 DOE O 580.1A Department of Energy Personal Property Management Program. Questions regarding the contracts intended to be...

306

FLASH2011-2-OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

includes updated attachments 2011-2 Attachment 2 Requests by Political Candidates to tour DOE facilities FLASH2011-2-OPAM More Documents & Publications AttachmentFlash2011-2...

307

Flash2008-64.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications PolicyFlash2010-17.pdf Policy Flash 2013-70 Acqusition Guides 42.15 Contractor Performance Infromation and 42.16 reporting Other Contractor...

308

Flash2011-73 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

B, Title I, Section 1418 of the Department of Defense and Full-Year Continuing Appropriations Act, 2011 Flash2011-73 OPAM More Documents & Publications Policy Flash 2011-73...

309

Intellectual property strategy : analysis of the flash memory industry  

E-Print Network (OSTI)

This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

Ogura, Tomoko H

2006-01-01T23:59:59.000Z

310

Flash2001-16.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flash2001-16.pdf Flash2001-16.pdf Flash2001-16.pdf More Documents & Publications AcqGuide70pt31.doc&0; Microsoft Word - AcqGuide70pt31A.doc Microsoft Word - Appendix A2006Jun...

311

A low power, variable resolution two-step flash ADC  

Science Conference Proceedings (OSTI)

In this paper, a new low power and configurable resolution two step flash ADC is proposed. Comparators of conventional flash ADC are replaced with CMOS inverters whose threshold can be varied dynamically. A novel peak-detector circuit is employed to ... Keywords: low power, two-step flash ADC, variable resolution

Mahesh Kumar Adimulam; Krishna Kumar Movva; Sreehari Veeramachaneni; N. Moorthy Muthukrishnan; M. B. Srinivas

2010-05-01T23:59:59.000Z

312

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

313

A spatially distributed flash flood forecasting model  

Science Conference Proceedings (OSTI)

This paper presents a distributed model that is in operational use for forecasting flash floods in northern Austria. The main challenge in developing the model was parameter identification which was addressed by a modelling strategy that involved a model ... Keywords: Distributed modelling, Dominant processes concept, Floods, Forecasting, Kalman Filter, Model accuracy, Parameter identification, Stream routing

Günter Blöschl; Christian Reszler; Jürgen Komma

2008-04-01T23:59:59.000Z

314

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

315

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

316

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

317

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

318

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

319

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

320

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

322

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

323

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

324

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

325

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

326

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

327

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

328

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

329

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

330

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

331

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

332

Policy Flash 2012-2 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2012-2 Policy Flash 2012-2 Policy Flash 2012-2 OMB Memorandum M-11-32, "Accelerating Payment to Small Businesses for Goods and Services," established an Executive Branch policy to pay small business invoices as quickly as practicable, with a goal of paying within 15 days. Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices is revised to implement this policy. Attachment 1 - Acquisition Guide Chapter 32.1, Reviewing and Approving Contractor Invoices (updated October 2011) Attachment 2 - Memo from OMB M-11-32, Accelerating Payment to Small Businesses for Goods and Services Policy_Flash_2012-02.pdf Policy_Flash_2012-02_Attachment_1_0.pdf Policy_Flash_2012-02_Attachment_2_0.pdf More Documents & Publications Policy Flash 2012-14 Chapter 32 - Contract Financing

333

Policy Flash 2014-10 Update to Congressional Notifications - Full  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 Update to Congressional Notifications - Full 0 Update to Congressional Notifications - Full Implementation of Advanced Notification of Awards (ANA) System Policy Flash 2014-10 Update to Congressional Notifications - Full Implementation of Advanced Notification of Awards (ANA) System The ANA system can be accessed directly at: https://iportalwc.doe.gov/pls/apex/f?p=ANA This flash and its attachments may be viewed at http://management.energy.gov/policy_guidance/policy_flashes.htm. Questions concerning this policy flash should be directed to Elle Clayton at 202-287-1444 or ellen.clayton@hq.doe.gov. New Policy_Flash_2013- ANA1172013 ec.pdf ANA User's Guide.pdf More Documents & Publications POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL IMPLEMENTATION OF ANA SYSTEM Policy Flash 2013-36 Update to Congressional Notifications - Acquisition

334

Rules of Engagment for Exercise Players  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Washington, DC 20585 Rules of Engagement for Exercise Players Rules of engagement (ROE) provide for control of an exercise while allowing maximum free play in a tactical setting and enable evaluators to objectively monitor a participant's performance. Use of engagement simulation systems (ESSs) promotes realistic simulation of real-world response actions, which is vital to performance testing and evaluation. ROE govern the activities of all players (participants, controllers, and evaluators) throughout the exercise period, regardless of the organization, the identified training or evaluation objectives, or the particular scenario. ROE also apply to all personnel who participate in, support, observe, or control exercises. Only the Test

335

Flash2006-23Attachment.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORRECTION NOTICE FLASH 2005-23 CORRECTION NOTICE FLASH 2005-23 SUMMARY OF CHANGES IN MAKE-OR-BUY ELIMINATION A study of the Make-or-Buy process concluded that it was costly to administer and did not produce the expected benefits. 1. Section 901.105 is amended to remove the reference to the Make-or-Buy paperwork clearance under the Paperwork Reduction Act. 2. Section 970.1504-4-1, Make-or-Buy Plans, is removed. It included 970.1504-4-2, Policy, and 970.1504-3, Requirements. 3. Section 970.1504-5(b) is removed. It was the instruc tion for use of the Make-or-Buy Plan clause. 4. Section 970.5203-1, Management Controls, is amended to include outsourcing of functions as a consideration of efficient and effective operations. 5. Section 970.5203-2, Performance improvement and collaboratio

336

F POLICY FLASH 2009-24  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY FLASH 2009-24 POLICY FLASH 2009-24 1 DATE: TO: FROM: r February 12,2009 Procurement Directors Office of Procurement and Assistance Management SUBJECT: Management of Excess Weapons Inventories and Selective Sensitive Equipment SUMMARY: A recent Office of Inspector General (OIG) audit identified opportunities for improving the Department of Energy (DOE) management of excess weapons and its processes for identifying and tracking of sensitive items. Specifically, the OIG recommended that DOE amend existing guidance to ensure that appropriate processes are in place to effectively manage excess inventories of weapons, and to ensure the timely declaration of excess weapons. The OIG also recommended that DOE update its guidance regarding the identification of high risklsensitive equipment.

337

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

338

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

339

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

340

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

342

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

343

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

344

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

345

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

346

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

347

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

348

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

349

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

350

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

351

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

352

Policy Flash 2013-01 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3-01 3-01 Policy Flash 2013-01 Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov for the AL or Richard Bonnell at (202) 287-1747 or at richard.bonnell@hq.doe.gov for the FAL. Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov for the AL or Richard Bonnell at (202) 287-1747 or at richard.bonnell@hq.doe.gov for the FAL. More Documents & Publications Policy Flash 2013-1 Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Policy Flash 2013-31 Class Deviation from the Federal Acquisition

353

Policy Flash 2013-12 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Policy Flash 2013-12 Attached is Policy Flash 2013-12 Section 301(b) Congressional Notification of Multi-year Contract Award Report Revision for Fiscal Year 2013 Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning completing the spreadsheet should be directed to Casey Pearce at (202) 287-5810 or at casey.pearce@hq.doe.gov. Policy Flash 2013-12 FY 2013 301(b) reporting revision.pdf Updated 301(b) Spreadsheet.xlsx More Documents & Publications Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Policy Flash 2013-53 Implementation of Division F, Title I, II, III AL

354

Policy Flash 2013-05 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 Policy Flash 2013-05 Attached is Policy Flash 2013-05 Class Deviation from the Federal Acquisition Regulation (FAR) to Implement Office of Management and Budget (OMB) Policy Memorandum M-12-16, Providing Prompt Payment to Small Business Subcontractors. Questions concerning this policy flash should be directed to Nancy Harvey of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at Nancy.Harvey@hq.doe.gov. Class Deviation -Providing Prompt Payment 2013-05.pdf Signed Deviation Bosco-Waddell w-attachement.pdf More Documents & Publications Policy Flash 2014-11 Federal Acquisition Circular (FAC) 2005-71 Policy Flashes FY 2013 Policy Flash 2013-69 Extension of Policy to Provide accelerated payment to

355

Policy Flash 2013-20 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Policy Flash 2013-20 Attached is Policy Flash 2013-20 Section 311 Revised Template January 4 2013 Questions concerning this policy flash should be directed to Barbara Binney, Office of Contract and Financial Assistance Policy Division at (202) 287-1340 or at Barbara.Binney@hq.doe.gov. Attachment 1 DOE Section 311 Contract Award Letter revised Jan 4 2013.pdf Attachment 2A DOE Section 311 Financial Assistance Letter revised Jan 4 2013.pdf Attachment 2B DOE Section 311 Financial Assistance Letter revised Jan 4 2013.pdf Policy flash 2013-20 Section 311 revised templateJan 4 2013.pdf More Documents & Publications Policy Flash 2013-22 Section 311 Revised Template January 24 2013 Policy Flash 2012-59 Letter to Congress RE: Office of Civilian Radioactive Waste Management's

356

A Flashing Binary Combined Cycle For Geothermal Power Generation | Open  

Open Energy Info (EERE)

Flashing Binary Combined Cycle For Geothermal Power Generation Flashing Binary Combined Cycle For Geothermal Power Generation Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A Flashing Binary Combined Cycle For Geothermal Power Generation Details Activities (0) Areas (0) Regions (0) Abstract: The performance of a flashing binary combined cycle for geothermal power generation is analysed. It is proposed to utilize hot residual brine from the separator in flashing-type plants to run a binary cycle, thereby producing incremental power. Parametric variations were carried out to determine the optimum performance of the combined cycle. Comparative evaluation with the simple flashing plant was made to assess its thermodynamic potential and economic viability. Results of the analyses indicate that the combined cycle can generate 13-28% more power than the

357

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 22590 of 28,560 results. 81 - 22590 of 28,560 results. Article U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information Several vulnerabilities were reported in Adobe Flash Player. http://energy.gov/cio/articles/u-241-adobe-flash-player-bugs-let-remote-users-execute-arbitrary-code-and-obtain Article Energy Efficiency Upgrades Part of Winning Formula for Oregon School District After a decade of hard economic times, a rural Oregon community celebrates the opening of a new energy-efficient school. http://energy.gov/articles/energy-efficiency-upgrades-part-winning-formula-oregon-school-district Download International Refrigeration: Proposed Penalty (2012-CE-1510) DOE alleged in a Notice of Proposed Civil Penalty that International Refrigeration Products failed to certify a various room air conditioners as

358

Arc Flash Issues in Transmission and Substation Environments  

Science Conference Proceedings (OSTI)

Arc flashes are a serious hazard that may potentially put people in life-threatening situations and cause great damage to existing assets. National Electrical Safety Code and Occupational Safety and Health Administration safety rules have introduced requirements for electric utilities to perform arc-flash hazard analysis of all electric facilities operating at and above 1000 volts. Most methods available at this time for analyzing the arc-flash incident thermal energy were developed for low- and medium-v...

2011-06-20T23:59:59.000Z

359

Policy Flash 2012-2 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Extension of Policy to Provide accelerated payment to small business subcontractors Policy Flash 2012-30 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

360

Policy Flash 2012-34 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34-Waiver of Mandatory Use of the Strategic Integrated Procurement Enterprise System (STRIPES) for GSA Global Supply Service Transactions Questions concerning this policy flash...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Policy Flash 2012-37 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Identifying Numbers Outside of the Strategic Integrated Procurement Enterprise System (STRIPES) Questions concerning this policy flash should be directed to Nancy Harvey of the...

362

Flash2011-30 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Waiver of Mandatory Use of the Strategic Integrated Procurement Enterprise System (STRIPES) for Certain Purchase Card Transactions Flash2011-30 OPAM More Documents &...

363

Flash2011-30(1).pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Waiver of Mandatory Use of the Strategic Integrated Procurement Enterprise System (STRIPES) for Certain Purchase Card Transactions Flash2011-30(1).pdf More Documents &...

364

POLICY FLASH 2013-58 Revised Guide for Financial Assistance  

Energy.gov (U.S. Department of Energy (DOE))

Questions concerning this policy flash should be directed to Ellen Colligan at (202) 287-1776 or Ellen.colligan@hq.doe.gov.

365

Policy Flash 2013-49 Updating Reporting Requirement Checklist...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 Updating Reporting Requirement Checklist including the research performance progress report Policy Flash 2013-49 Updating Reporting Requirement Checklist including the research...

366

Flash2011-44 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 OPAM Flash2011-44 OPAM Improving Communication with Industry during the Acquisition Process 2011-44 Attachment "Myth-Busting": Addressing Misconceptions to Improve Communication...

367

Policy Flash 2011-100 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department issued Contractor Requirements Documents (CRDs) for the subject Directives on August 30, 2011. PolicyFlash2011-100.pdf More Documents & Publications Policy...

368

Comparison of the Organic Flash Cycle (OFC) to other advanced ...  

Comparison of the Organic Flash Cycle (OFC) to other advanced vapor cycles for intermediate and high temperature waste heat reclamation and solar thermal

369

Policy Flash 2013-47 Management and Security of Personally Identifiabl...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications POlicy Flash 2013-60 POLICY FLASH 2013-55 FPDS-NG Change Management Notice for the Oklahoma Tornado and Storm Policy Flash 2013-74...

370

Policy Flash 2013-75 Federal Acquisition Circular 2005-69 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flash 2013-75 Federal Acquisition Circular 2005-69 Policy Flash 2013-75 Federal Acquisition Circular 2005-69 Questions concerning this policy flash should be directed to Barbara...

371

Lighting Ground Flash Density in the Contiguous United States: 1992–95  

Science Conference Proceedings (OSTI)

Cloud-to-ground lightning data for the years 1992–95 have been analyzed for geographical distribution of total flashes, positive flashes, and the percentage of flashes that lower positive charge to ground. In the contiguous United States the ...

Richard E. Orville; Alan C. Silver

1997-04-01T23:59:59.000Z

372

Microsoft Word - Policy Flash_2010-02_Deputy_FPD_Certification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - Policy Flash 2008-06.doc Microsoft Word - Policy Flash2010-01January2011PMCDPCurriculumFINAL.doc Microsoft Word - PolicyFlash 0901L1Safetycourse...

373

Microsoft Word - Policy_Flash_ 09_01_L1_Safety_course.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - PolicyFlash 0903ACOR.doc Microsoft Word - PolicyFlash0902InterimCertification.doc Microsoft Word - Flash09-05PMCDPCourseCurriculumChanges.doc...

374

The Daily Cloud-to-Ground Lightning Flash Density in the Contiguous United States and Finland  

Science Conference Proceedings (OSTI)

A method is developed to quantify thunderstorm intensity according to cloud-to-ground lightning flashes (hereafter ground flashes) determined by a lightning-location sensor network. The method is based on the ground flash density ND per ...

Antti Mäkelä; Pekka Rossi; David M. Schultz

2011-05-01T23:59:59.000Z

375

Flash vacuum pyrolysis of lignin model compounds  

DOE Green Energy (OSTI)

Despite the extensive research into the pyrolysis of lignin, the underlying chemical reactions that lead to product formation are poorly understood. Detailed mechanistic studies on the pyrolysis of biomass and lignin under conditions relevant to current process conditions could provide insight into utilizing this renewable resource for the production of chemicals and fuel. Currently, flash or fast pyrolysis is the most promising process to maximize the yields of liquid products (up to 80 wt %) from biomass by rapidly heating the substrate to moderate temperatures, typically 500{degrees}C, for short residence times, typically less than two seconds. To provide mechanistic insight into the primary reaction pathways under process relevant conditions, we are investigating the flash vacuum pyrolysis (FVP) of lignin model compounds that contain a {beta}-ether. linkage and {alpha}- or {gamma}-alcohol, which are key structural elements in lignin. The dominant products from the FVP of PhCH{sub 2}CH{sub 2}OPh (PPE), PhC(OH)HCH{sub 2}OPh, and PhCH{sub 2}CH(CH{sub 2}OH)OPh at 500{degrees}C can be attributed to homolysis of the weakest bond in the molecule (C-O bond) or 1,2-elimination. Surprisingly, the hydroxy-substituent dramatically increases the decomposition of PPE. It is proposed that internal hydrogen bonding is accelerating the reaction.

Cooney, M.J.; Britt, P.F.; Buchanan, A.C. III

1997-03-01T23:59:59.000Z

376

Ground Truth: A Positive Cloud-to-Ground Lightning Flash  

Science Conference Proceedings (OSTI)

We describe the circumstances and effects of a cloud-to-ground lightning flash that lowered positive charge and struck a residential home near Albany, New York. The characteristics of the flash were detected and recorded by a wide-band magnetic ...

Vincent P. Idone; Richard E. Orville; Ronald W. Henderson

1984-07-01T23:59:59.000Z

377

Pages that link to "A Flashing Binary Combined Cycle For Geothermal...  

Open Energy Info (EERE)

Twitter icon Pages that link to "A Flashing Binary Combined Cycle For Geothermal Power Generation" A Flashing Binary Combined Cycle For Geothermal Power Generation...

378

Thermo-fluid Dynamics of Flash Atomizing Sprays and Single Droplet Impacts  

E-Print Network (OSTI)

in two-phase flashing propane jets. Part one: velocitymeasurements in two-phase propane releases . in Proceedingsin two-phase flashing propane jets. Part one: velocity

Vu, Henry

2010-01-01T23:59:59.000Z

379

Policy Flash 2012-8 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-8 2-8 Policy Flash 2012-8 Reference earlier Policy Flash 2011-103, Consent to Subcontracts on Management and Operating Contracts. The Flash had discussed the possibility of an Acquisition Letter and possibly a DEAR amendment to improve Consent to Subcontract efficiency and to ensure we apply our limited resources to those subcontract actions that truly pose the most risk. Closer analysis revealed that only a change to Acquisition Guide Chapter 70.7, Chapter 10, paragraph B, was needed to accomplish these process improvements. Attachment - Acquisition Guide Chapter 70.7, Chapter 10, Subcontractor Management (Revised October 19, 2011) Policy_Flash_2012-08.pdf Policy_Flash_2012-08_Attachment.pdf More Documents & Publications Microsoft Word - Chapter 10_2006_Jun

380

Policy Flash 2013-29 Leveraging the General Services Administration's  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 Leveraging the General Services 9 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Policy Flash 2013-29 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Attached is Policy Flash 2013-29: Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Questions concerning this policy flash should be directed to Denise T. Clarke of the Office of Acquisition and Project Management, Strategic Programs Division at (202) 287-1748 or at DeniseT.Clarke@hq.doe.gov. POLICY_FLASH_2013_28 Leveraging GSA SmartPay2.pdf Signed_Memo with_ attachments.pdf More Documents & Publications Policy Flash 2013-50 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Policy Flash 2012-12 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

12 12 Policy Flash 2012-12 As described in Policy Flash 2011-44, the Office of Federal Procurement Policy (OFPP) memorandum entitled "Myth-Busting: Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process" required agencies to develop and submit a high-level vendor communication plan for OFPP approval. DOE's approved plan is attached. Attachment 1 - DOE Vendor Communication Plan Attachment 2 - Memo from OFPP titled "Myth-Busting": Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process Policy_Flash_2012-12.pdf Policy_Flash_2012-12_Attachment_1.pdf Policy_Flash_2012-12_Attachment_2.pdf More Documents & Publications MEMORANDUM FOR CHIEF ACQUISITION OFFICERS Attachment FY2011-44 OPAM

382

Policy Flash 2012-44 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Policy Flash 2012-44 Attached is POLICY FLASH 2012-44 Congressional Notifications- Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2 Section 2.6.1 Questions concerning this policy flash and the acquisition guide chapter should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning this policy flash and the financial assistance guide chapter should be directed to Ellen Colligan at (202) 287-1767 or Ellen.colligan@hq.doe.gov. For STRIPES, ANA System, or iPortal questions, contact the Energy IT Services (EITS) Service Desk at (301) 903-2500 or email EITSServiceDesk@hq.doe.gov. Policy_Flash_2012-44_0.pdf AcqGuide5pt1 for contracts only.pdf Advanced Notification of Awards (ANA) User Guide.pdf

383

Policy Flash 2013-30 Acquisition Letter on Acquisition Planning  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 Acquisition Letter on Acquisition Planning 0 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Attached is Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Questions concerning this policy flash should be directed to Jason Taylor of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at (202) 287-1560 or at jason.taylor@hq.doe.gov. Policy Flash_MO Acq Planning AL.pdf AL_ 2013-03 Acq Planning_MO.pdf More Documents & Publications Attachment FY2011-09(3) Policy Flash 2013-78 Acquisition Guide Chapter 7.3 Acquisition Planning in

384

Policy Flash 2012-12 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12 12 Policy Flash 2012-12 As described in Policy Flash 2011-44, the Office of Federal Procurement Policy (OFPP) memorandum entitled "Myth-Busting: Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process" required agencies to develop and submit a high-level vendor communication plan for OFPP approval. DOE's approved plan is attached. Attachment 1 - DOE Vendor Communication Plan Attachment 2 - Memo from OFPP titled "Myth-Busting": Addressing Misconceptions to Improve Communication with Industry during the Acquisition Process Policy_Flash_2012-12.pdf Policy_Flash_2012-12_Attachment_1.pdf Policy_Flash_2012-12_Attachment_2.pdf More Documents & Publications MEMORANDUM FOR CHIEF ACQUISITION OFFICERS OFPP "Myth-busting" Memo (2/2/11)

385

Policy Flash 2012-11 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Policy Flash 2012-11 As part of the Office of Management and Budget (OMB) Acquisition Savings Initiative and the DOE Strategic Sourcing Program, a key challenge has been to address the requirements of reporting cost savings and cost avoidance data. In order for DOE to fully comply with reporting requirements, we are directing that the attached template be utilized for reporting Fiscal Year (FY) 2012 data. Attachment 1 - Memo regarding Standardized Cost Savings Definitions and Reporting Template Attachment 2 - Standardized Cost Savings Definitions and Reporting Template (excel) Policy_Flash_2012-11.pdf Policy_Flash_2012-11_Attachment_1.pdf Policy_Flash_2012-11_Attachment_2.xlsx More Documents & Publications Policy Flash 2012-67 Contractor Purchasing Balanced Scorecard for FY 2012

386

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

387

V-053: Adobe Shockwave player installs Xtras without prompting | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe Shockwave player installs Xtras without prompting 3: Adobe Shockwave player installs Xtras without prompting V-053: Adobe Shockwave player installs Xtras without prompting December 24, 2012 - 12:15am Addthis PROBLEM: Adobe Shockwave player installs Xtras without prompting PLATFORM: Adobe Shockwave Player ABSTRACT: A vulnerability was reported in Adobe Shockwave. REFERENCE LINKS: Vulnerability Note VU#519137 SecurityTracker Alert ID: 1027903 Bugtraq ID: 56972 CVE-2012-6271 IMPACT ASSESSMENT: Medium DISCUSSION: Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra. IMPACT: By convincing a user to view a specially crafted Shockwave content, an attacker may be able to execute arbitrary code with the privileges of the

388

Lightning Ground Flashes Associated with Summer 1990 Flash Floods and Streamflow in Tucson, Arizona: An Exploratory Study  

Science Conference Proceedings (OSTI)

Eight flash flood events occurred in the Tucson area of southeastern Arizona during the 1990 summer when a high-resolution lightning detection network was operated in the region. A total of 3479 cloud-to-ground lightning flashes was composited ...

Ronald L. Holle; Shawn P. Bennett

1997-07-01T23:59:59.000Z

389

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

390

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

391

Individual player developmental model in ice-hockey.  

E-Print Network (OSTI)

??In the past few years, there has been plenty of discussion about individual player development in Finnish hockey hockey-scene. Rarely you hear the actual models… (more)

Varmanen, Jukka

2011-01-01T23:59:59.000Z

392

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

7/22/2011 7/22/2011 Table of Contents 1. Commentary Page 1 2. Key Indicators of Generation, Consumption & Stocks Page 2 3. Month-to-Month Comparisons: Generation, Consumption and Stocks (Total) Page 3 4. Net Generation Trends Page 4 5. Fossil Fuel Consumption Trends Page 5 6. Fossil Fuel Stock Trends Page 6 7. Average Number of Days of Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: May 2011 Section 1. Commentary Electric Power Data The contiguous United States experienced temperatures that were slightly below normal in May 2011.

393

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

Burn Non-Lignite Coal Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: October 2010 Section 1. Commentary Electric Power Data In October 2010, the contiguous United States experienced temperatures that were above average. Accordingly, the total population-weighted heating degree days for the United States were 15.6 percent below the October normal. Retail sales of electricity remained relatively unchanged from October 2009. Over the same period, the average U.S. retail price of electricity increased 1.8 percent. For the 12-month period ending October 2010, the average U.S.

394

DATE: TO: FROM: SUBJECT: SUMMARY: POLICY FLASH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TO: TO: FROM: SUBJECT: SUMMARY: POLICY FLASH 2005..19 March 1, 2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management STARS Conversion In April 2005, the Department will be converting to the new Standard Accounting and Reporting System (STARS). Department contractors and vendors will be encouraged to submit invoices early for goods or services to be delivered in March 2005 so they can be processed and paid by the end of the month. For such payment, invoices must be received by the Oak Ridge Financial Service Center not later than March 17,2005, and approving officials must provide their approvals by March 24,2005. Page 1 of2 To ensure a smooth transition, a one-time, limited delegation of Contracting Officer authority has been granted to the Director at Oak Ridge Financial Service Center for the purpose of signing

395

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

9/20/2011 9/20/2011 Table of Contents 1. Commentary Page 1 2. Key Indicators of Generation, Consumption & Stocks Page 2 3. Month-to-Month Comparisons: Generation, Consumption and Stocks (Total) Page 3 4. Net Generation Trends Page 4 5. Fossil Fuel Consumption Trends Page 5 6. Fossil Fuel Stock Trends Page 6 7. Average Number of Days of Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: July 2011 Section 1. Commentary Electric Power Data The contiguous United States experienced temperatures

396

Flash Estimate August 2005 Final.xls  

Gasoline and Diesel Fuel Update (EIA)

and Stock Trends and Stock Trends Page 5 6. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 6 7. Retail Sales Trends Page 7 8. Average Retail Price Trends Page 8 9. Heating and Cooling Degree Days Page 9 10. Documentation Page 10 Monthly Flash Estimates of Data for: June 2005 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the U.S. Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy of the Department of Energy or any other organization. For additional information, contact Orhan Yildiz at 202-287-1586, or at Orhan.Yildiz@eia.doe.gov.

397

Scannerless loss modulated flash color range imaging  

SciTech Connect

Scannerless loss modulated flash color range imaging methods and apparatus are disclosed for producing three dimensional (3D) images of a target within a scene. Apparatus and methods according to the present invention comprise a light source providing at least three wavelengths (passbands) of illumination that are each loss modulated, phase delayed and simultaneously directed to illuminate the target. Phase delayed light backscattered from the target is spectrally filtered, demodulated and imaged by a planar detector array. Images of the intensity distributions for the selected wavelengths are obtained under modulated and unmodulated (dc) illumination of the target, and the information contained in the images combined to produce a 3D image of the target.

Sandusky, John V. (Albuquerque, NM); Pitts, Todd Alan (Rio Rancho, NM)

2009-02-24T23:59:59.000Z

398

Scannerless loss modulated flash color range imaging  

SciTech Connect

Scannerless loss modulated flash color range imaging methods and apparatus are disclosed for producing three dimensional (3D) images of a target within a scene. Apparatus and methods according to the present invention comprise a light source providing at least three wavelengths (passbands) of illumination that are each loss modulated, phase delayed and simultaneously directed to illuminate the target. Phase delayed light backscattered from the target is spectrally filtered, demodulated and imaged by a planar detector array. Images of the intensity distributions for the selected wavelengths are obtained under modulated and unmodulated (dc) illumination of the target, and the information contained in the images combined to produce a 3D image of the target.

Sandusky, John V. (Albuquerque, NM); Pitts, Todd Alan (Rio Rancho, NM)

2008-09-02T23:59:59.000Z

399

Monthly Flash Estimates of Electric Power Data  

Gasoline and Diesel Fuel Update (EIA)

6/24/2011 6/24/2011 Table of Contents 1. Commentary Page 1 2. Key Indicators of Generation, Consumption & Stocks Page 2 3. Month-to-Month Comparisons: Generation, Consumption and Stocks (Total) Page 3 4. Net Generation Trends Page 4 5. Fossil Fuel Consumption Trends Page 5 6. Fossil Fuel Stock Trends Page 6 7. Average Number of Days of Burn Non-Lignite Coal Page 7 8. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 8 9. Retail Sales Trends Page 9 10. Average Retail Price Trends Page 10 11. Heating and Cooling Degree Days Page 11 12. Documentation Page 12 Monthly Flash Estimates of Data for: April 2011 Section 1. Commentary Electric Power Data The contiguous United States experienced temperatures that were above normal in April 2011.

400

Flash Estimate July 2005 Final.xls  

Gasoline and Diesel Fuel Update (EIA)

and Stock Trends and Stock Trends Page 5 6. Month-to-Month Comparisons: Electric Power Retail Sales and Average Prices Page 6 7. Retail Sales Trends Page 7 8. Average Retail Price Trends Page 8 9. Heating and Cooling Degree Days Page 9 10. Documentation Page 10 Monthly Flash Estimates of Data for: May 2005 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the U.S. Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy of the Department of Energy or any other organization. For additional information, contact Orhan Yildiz at 202-287-1586, or at Orhan.Yildiz@eia.doe.gov.

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Analysis of Repetitive Flash Stimulation Frequencies and Record Periods to Detect Migraine Using Artificial Neural Network  

Science Conference Proceedings (OSTI)

Different kind of methods has been applied to detect the migraine by using flash stimulation. Especially frequency analysis of EEG signal is the most preferred method to detect the migraine by using flash stimulation. Different flash stimulation frequencies ... Keywords: Artificial neural network (ANN), Electroencephalography (EEG), Flash stimulation, Migraine

Selahaddin Batuhan Akben; Abdulhamit Subasi; Deniz Tuncel

2012-04-01T23:59:59.000Z

402

PolFlash10-31_attach2.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

attach2.pdf PolFlash10-31attach2.pdf PolFlash10-31attach2.pdf More Documents & Publications OPAM Policy Acquisition Guides PolFlash10-31attach1.pdf PolFlash10-31...

403

Policy Flash 2013-36 Update to Congressional Notifications - Acquisition  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

36 Update to Congressional Notifications - 36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Attached is Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Questions concerning this policy flash and the acquisition guide chapter should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning this policy flash and the financial assistance guide chapter should be directed to Ellen Colligan at (202) 287-1776 or ellen.colligan@hq.doe.gov.

404

Policy Flash 2012-14 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Policy Flash 2012-14 With reference to Policy Flash 2012-02, Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices, and OMB Memorandum M-11-32, "Accelerating Payment to Small Businesses for Goods and Services," established an Executive Branch policy to pay small business invoices as quickly as practicable, with a goal of paying within 15 days. Acquisition Guide Chapter 32.1 - Reviewing and Approving Contract Invoices implements this policy. See the attachment below with the DOE response to OMB memorandum. Attachment - Response to OMB Memorandum M-11-32 Accelerating Payments to Small Businesses for Good and Services To see Policy Flash 2012-02 and Acquisition Guide Chapter 32.1. Attachment - Policy Flash 2012-02 and Acquisition Guide Chapter

405

Policy Flash 2012-32 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Policy Flash 2012-32 Attached is Policy Flash 2012-32 Acquisition Guide Chapter 17.1 - Interagency Acquisitions, Interagency Transactions and Interagency Agreements Questions concerning this policy flash should be directed to Barbara Binney of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Procurement and Assistance Management at (202) 287-1340 or barbara.binney@hq.doe.gov. Policy_Flash_2012-32_0.pdf AcqGuide_17.1_Interagency_Acquisitions_April_9_2012.pdf 17.1_Attachment_1_OFPP_Guidance_Interagence_Acquisitions_June_2008.pdf 17.1_Attachment_2_OFPPbusinesscaseguidance92911.pdf 3a-attachment_IA_FUNDS_OUT_Assisted_Aquisition_Part_A_april_2_2012.pdf 3a-attachment_IA_FUNDS_OUT_Assisted_Aquisition_Part_B_april_2_2012.pdf 3b-attachment_IA_FUNDS_OUT_Interagency_Transaction_Part_A_april_2_2012.pdf

406

Policy Flashes for FY 2006 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 6 Policy Flashes for FY 2006 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2006-62 Revision to Chapter 42.5, Contract Management Planning, of the Department of Energy Acquisition Guide 2006-62 Attachment Acquisition Guide Chapter 42.5, Contract Management Planning

407

Policy Flashes for 2009 & 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for 2009 & 2010 for 2009 & 2010 Policy Flashes for 2009 & 2010 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. Number Topic 2010-83 DOE Acquisition Guide Chapter 23 2010-83 Attachment DOE Acquisition Guide Chapter 23 2010-82 Subaward Reporting For Federal Funding and Transparency Act of 2006 (FFATA)

408

Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 Continuing Appropriations Act, 2014 -- 5 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Policy Flash 2014-05 Continuing Appropriations Act, 2014 -- Implementation of Division F, Title I, Title II, and Title III, and Division G, Consolidated and Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6 Questions concerning the policy flash should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov for the AL or Richard Bonnell at (202) 287-1747 or at richard.bonnell@hq.doe.gov for the FAL. Policy flash 2014-05 CRA Appropriations AL FY2014.pdf More Documents & Publications Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressional

409

POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL IMPLEMENTATION OF ANA SYSTEM POLICY FLASH 2014-10 UPDATE TO CONGRESSIONAL NOTIFICATION_ FULL IMPLEMENTATION OF ANA SYSTEM An updated copy of the ANA Users Guide is attached and can be found at the ANA iPortal space at https://iportalwc.doe.gov/webcenter/spaces/ANA_SPACE/ The ANA system can be accessed directly at: https://iportalwc.doe.gov/pls/apex/f?p=ANA Questions concerning this policy flash should be directed to Elle Clayton at 202-287-1444 or ellen.clayton@hq.doe.gov. If you have questions or need assistance using the ANA system, please contact the iManage Help Desk Support at (301) 903-2500 and select option 4, option 1, option 1. For Congressional Affairs Support, send an e-mail to CI-ANA@hq.doe.gov.

410

Policy Flashes for FY 2005 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 Policy Flashes for FY 2005 The following is a list of Policy Flashes issued by the Office of Procurement and Assistance Policy. These files are in PDF (Portable Document Files) format. To read PDF files you must have Adobe Acrobat Reader, which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. If a Policy Flash and/or attachment is in a different format than Adobe Acrobat, the format type will be noted after the number of the Flash. 2005-58 (pdf) - Acquisition Letter 2005-15, Implementation of the Identity Proofing Requirement of HSPD-12 and FIPS Pub 201 2005-58 Attachment (pdf) - Acquisition Letter 2005-16, Implementation of

411

Policy Flash 2012-62 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Policy Flash 2012-62 Attached is Policy Flash 2012-62 Class Deviation DEAR 950.7006/AL 2012-10, Implementation of the Price-Anderson Act of 2005 Questions concerning this policy flash should be directed to Nancy Harvey of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at Nancy.Harvey@hq.doe.gov. Policy Flash 2012-62 AL 2012-10, Implementation of the Price-Anderson Amendments Act of 2005 Class Deviation Findings and Determination - DEAR 950.7006, Statutory nuclear hazards indemnity agreement More Documents & Publications Microsoft Word - AL2005-15.doc Appendix A. Notice of Inquiry: Preparation of Report to Congress on Price-Anderson Act. 62 Federal Register 68,272 (December 31, 1997)

412

Policy Flash 2013-15 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Indian Energy Preference Provision in EP Act 2005 and Acquisition Letter 2013-02 Policy Flash 2013-04 Energy.gov Careers & Internships For Staff & Contractors Contact Us...

413

The Madison County, Virginia, Flash Flood of 27 June 1995  

Science Conference Proceedings (OSTI)

Between 25 and 27 June 1995, excessive rainfall and associated flash flooding across portions of western Virginia resulted in three fatalities and millions of dollars in damage. Although many convective storms occurred over this region during ...

Michael D. Pontrelli; George Bryan; J. M. Fritsch

1999-06-01T23:59:59.000Z

414

Policy Flash 2013-77 Contractor Performance Information  

Energy.gov (U.S. Department of Energy (DOE))

Questions concerning this policy flash should be directed to Barbara Binney, of the Office of Acquisition and Project Management Policy at (202) 287-1340 or at Barbara.Binney@hq.doe.gov.

415

POLICY FLASH 2014-12 Executive Compensation Cap  

Energy.gov (U.S. Department of Energy (DOE))

Questions concerning this policy flash should be directed to Carol Jenkins, of the Office of Acquisition and Project Management Policy at 202-287-1827 or at Carol.Jenkins@hq.doe.gov.

416

Flash2011-3 OPAM | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Acquisitions 2011-3 Attachment 3 Interagency Agreement 2011-3 Attachment 3A - STRIPES Templates 2011-3 Attachment 3B - Requirements & Funding Information Flash2011-3 OPAM...

417

The Limiting Accuracy of Long Wavelength Lightning Flash Location  

Science Conference Proceedings (OSTI)

Many recently developed systems for lightning flash location use frequencies of hundreds of kHz or higher to achieve enhanced precision, although this reduces potential range. However, for coherent systems operating at high signal-to-noise ratios ...

Anthony C. L. Lee

1989-02-01T23:59:59.000Z

418

Microsoft Word - Policy Flash 2006-35.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Small Business Conference, Continuing Learning Points (CLP), June 27-30, 2006, in Seattle, Washington SUMMARY: This Flash is to inform you that based on the agenda, GS-1102...

419

Policy Flash 2011-97 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 Policy Flash 2011-97 The Department issued a Contractor Requirements Document (CRD) to DOE N 435.1 Contact-Handled and Remote-Handled Transuranic Waste Packaging. Contracting...

420

Flash2011-38 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 OPAM Flash2011-38 OPAM Acquisition Career Management Handbook Change 2011-01 2011-38 Attachment ACMP Handbook Change 2011-01-Revised Financial Assistance Certification...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Flash Memory Garbage Collection in Hard Real-Time Systems  

E-Print Network (OSTI)

Due to advances in capacity, speed, and economics, NAND-based flash memory technology is increasingly integrated into all types of computing systems, ranging from enterprise servers to embedded devices. However, due to its unpredictable up-date behavior and time consuming garbage collection mechanism, NAND-based flash memory is difficult to integrate into hard-real-time embedded systems. In this thesis, I propose a performance model for flash memory garbage collection that can be used in conjunction with a number of different garbage collection strategies. I describe how to model the cost of reactive (lazy) garbage collection and compare it to that of more proactive schemes. I develop formulas to assess the schedulability of hard real- time periodic task sets under simplified memory consumption models. Results show that I prove the proactive schemes achieve the larger maximum schedulable utilization than the traditional garbage collection mechanism for hard real-time systems in flash memory.

Lai, Chien-An

2011-08-01T23:59:59.000Z

422

Modeling the Flash Rate of Thunderstorms. Part I: Framework  

Science Conference Proceedings (OSTI)

In this study a straightforward theoretical approach to determining the flash rate in thunderstorms is presented. A two-plate capacitor represents the basic dipole charge structure of a thunderstorm, which is charged by the generator current and ...

Johannes M. L. Dahl; Hartmut Höller; Ulrich Schumann

2011-10-01T23:59:59.000Z

423

The Minneapolis Flash Flood: Meteorological Analysis and Operational Response  

Science Conference Proceedings (OSTI)

The evolution of the synoptic- and meso-?-scale meteorological setting for the 23 July 1987 Minneapolis flash flood is described. Analyses of conventional upper-air data, including quasi-geostrophic processes, are employed to identify the large-...

Barry E. Schwartz; Charles F. Chappell; William E. Togstad; Xiao-Ping Zhong

1990-03-01T23:59:59.000Z

424

Policy Flash 2012-13 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Policy Flash 2012-13 Attached for your information is a list of FAR amendments published in today's Federal Register (76 FR 68027, November 2, 2011). Attachment - List of Rules...

425

Policy Flash 2012-64 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 Federal Acquisition Circular 61 Questions concerning this policy flash should be directed to Barbara Binney, of the Office of Procurement and Assistance Policy at (202) 287-1340...

426

Flash Smelting: Analysis, Control, and Optimization (2nd Ed) TABLE ...  

Science Conference Proceedings (OSTI)

3.4 Basic Inco Flash Furnace Control Strategy [pp. 47-50]. 3.5 Cu-in-Slag .... Temperature, Heat Losses, Electric Heating and Hydrocarbon Fuels. 15.1 Product ...

427

Policy Flash 2013-23 Department of Energy Acquisition Regulation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Department of Energy Acquisition Regulation (DEAR) Final Rule for changes to Parts 908, 945, 952, and 970 regarding Government Property Policy Flash 2013-23 Department of Energy...

428

Policy Flash 2013-28 Implementation of Indian Energy Preference...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Implementation of Indian Energy Preference Provision in EP Act 2005 and Acquisition Letter 2013-02 Policy Flash 2013-28 Implementation of Indian Energy Preference Provision in EP...

429

Policy Flash 2013-03 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Acquisition and Project Management at (202) 287-1507 or at Andrew.Geary@hq.doe.gov. Policy Flash 2013-03 Responding to Solicitations Under DOE Work For Others Program More...

430

Policy Flash 2012-36 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 Policy Flash 2012-36 The statutory provisions addressed in this AL are a continuation of the provisions effective on the enactment date of the Consolidated Appropriations Act of...

431

Use a Vent Condenser to Recover Flash Steam Energy (Revised)  

Science Conference Proceedings (OSTI)

This revised ITP tip sheet on vent condenser to recover flash steam energy provides how-to advice for improving industrial steam systems using low-cost, proven practices and technologies.

Not Available

2006-05-01T23:59:59.000Z

432

Policy Flash 2011-73 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

B, Title I, Section 1418 of the Department of Defense and Full-Year Continuing Appropriations Act, 2011 Policy Flash 2011-73 Attachment - Acquisition Letter AL-2011-04 -...

433

Flash Flood Forecasting: An Ingredients-Based Methodology  

Science Conference Proceedings (OSTI)

An approach to forecasting the potential for flash flood-producing storms is developed, using the notion of basic ingredients. Heavy precipitation is the result of sustained high rainfall rates. In turn, high rainfall rates involve the rapid ...

Charles A. Doswell III; Harold E. Brooks; Robert A. Maddox

1996-12-01T23:59:59.000Z

434

Policy Flash 2012-1 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2012-1 Acquisition Letter (AL) 2012-01 has been issued. It lists ALs currently in effect and the discontinued ALs, along with the reason why the AL is no longer in...

435

Flash2011-75 OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 OPAM Flash2011-75 OPAM Acquisition Guide Chapter 8.4 - Federal Supply Schedules and Chapter 16.5 - Multiple-award Contracts and Governmentwide Acquisition Contracts Including...

436

Policy Flash 2012-64 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

at (202) 287-1339 or at Richard.Langston@hq.doe.gov. Policy Flash 2012-64 Department of Energy Acquisition Regulation Solicitation Provision and Contract Clause Matrix More...

437

Policy Flash 2013-36 Update to Congressional Notifications - Acquisition  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 Update to Congressional Notifications - 6 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Attached is Policy Flash 2013-36 Update to Congressional Notifications - Acquisition Guide Chapter 5.1 and Guide to Financial Assistance Chapter 2, Section 2.6.1 Questions concerning this policy flash and the acquisition guide chapter should be directed to Barbara Binney at (202) 287-1340 or barbara.binney@hq.doe.gov. Questions concerning this policy flash and the financial assistance guide chapter should be directed to Ellen Colligan at (202) 287-1776 or ellen.colligan@hq.doe.gov.

438

Policy Flash 2012-39 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39 39 Policy Flash 2012-39 Attached is Policy Flash 2012-39 Department of Energy (DOE) Audit Guidance for For-Profit Recipients Questions concerning this policy flash should be directed to Ellen Colligan of the Contracts and Financial Assistance Policy Division, Office of Policy, Office of Procurement and Assistance Management at (202) 287-1776 or at Ellen.Colligan@hq.doe.gov. Policy_Flash_2012-39.pdf DOE_Audit_Guidance_for_For-Profit_Financial_Assistance_Awards (Part_I)_April_2012_0.pdf DOE_Audit_Guidance_for_For-Profit_Financial_Assistance_Awards (Part_II)_April_2012_0.pdf DOE_Audit_Guidance_for_For-Profit_Financial_Assistance_Awards_(Part_III)_April_2012_0.pdf DOE_Audit_Guidance_for_For-Profit_FA_(Part IV) Matrix_of_Compliance_Requirements_April_2012_0.pdf

439

ORISE: Beryllium Awareness for Employees and Families (Video...  

NLE Websites -- All DOE Office Websites (Extended Search)

Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player Transcript (MS-Word)...

440

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Validation of ice skating protocol to predict aerobic power in hockey players.  

E-Print Network (OSTI)

??Validation ofan Ice Skating Protocol to Predict Aerobic Power in Hockey Players In assessing the physiological capacity of ice hockey players, researchers have often reported… (more)

Petrella, Nicholas J.

2006-01-01T23:59:59.000Z

442

Arc Flash Phase II Work Practices Survey Report  

Science Conference Proceedings (OSTI)

The Arc Flash Phase II Work Practices Survey was conducted as part of an EPRI project aimed at helping utilities understand and prepare for changing National Electrical Safety Code (NESC) and Occupational Safety and Safety Administration (OSHA) arc flash regulations. These changes can have significant implications for utility work practices, protective schema, and personal protection. The results of this survey are summarized in this report. The Phase II Survey is the second of two surveys EPRI has condu...

2009-12-18T23:59:59.000Z

443

A game-based corpus for analysing the interplay between game context and player experience  

Science Conference Proceedings (OSTI)

Recognizing players' affective state while playing video games has been the focus of many recent research studies. In this paper we describe the process that has been followed to build a corpus based on game events and recorded video sessions from human ... Keywords: game-based corpus, player behavior, player experience, player's affective state

Noor Shaker; Stylianos Asteriadis; Georgios N. Yannakakis; Kostas Karpouzis

2011-10-01T23:59:59.000Z

444

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

445

Performance Analysis of a Flash-Crowd Management System  

E-Print Network (OSTI)

Dr. Guillaume PierreFlash-crowds are a growing obstacle to the further expansion of the Internet. One of the solutions to this problem is to replicate the most popular documents to different web servers and to redirect client requests to these replicas. In this thesis we present a performance analysis of a flash-crowd management system based on RaDaR. We adjust the architecture of RaDaR to focus more on adaptability rather than scalability, to give the system a better chance against a flash-crowd by using algorithms from another system by the same authors, ACDN. Because existing benchmarks do not show realistic behavior, we first propose our own synthetic benchmark. Finally we use the benchmark tool to replay requests from a trace of an actual flash-crowd. Our results are three-fold: first we show how to dimension a RaDaR-like system. Second, we demonstrate based on a synthetic benchmark as well as a trace-based benchmark that the RaDaR-like system adjusts to a flash-crowd in a timely and efficient fashion. Finally, we identify an inherent instability in the replica placement

Reinoud Esser

2006-01-01T23:59:59.000Z

446

Flash pyrolysis of oil shale with various gases  

DOE Green Energy (OSTI)

The flash pyrolysis of Colorado Oil Shale with methane at a temperature of 800/sup 0/C and pressure of 500 psi appears to give the highest yield of hydrocarbon gas and liquid followed by hydrogen and lowest with helium. In the methane pyrolysis over 54.5% of the carbon in the kerogen is converted to ethylene and benzene. The flash pyrolysis with hydrogen (flash hydropyrolysis) of the oil shale at increasing temperatures showed a rapidly increasing amount of methane formed and a decrease in ethane formation, while the BTX (benzene mainly) yield remained at approximately 10%. At 950/sup 0/C and 500 psi almost all (97.0%) of the carbon in the kerogen is converted to liquid and gaseous hydrocarbons. Experiments with a mixture of a New Mexico sub-bituminous coal and oil shale under flash hydropyrolysis and methane pyrolysis conditions indicated higher yields of methane and ethylene and slightly lower yields of benzene than predicted by partial additive calculations. These exploratory experiments appear to be of sufficient interest to warrant a fuller investigation of the interaction of the natural resources, oil shale, coal and natural gas under flash pyrolysis conditions.

Steinberg, M.; Fallon, P.T.

1983-10-01T23:59:59.000Z

447

Multi-Level Bitmap Indexes for Flash Memory Storage  

SciTech Connect

Due to their low access latency, high read speed, and power-efficient operation, flash memory storage devices are rapidly emerging as an attractive alternative to traditional magnetic storage devices. However, tests show that the most efficient indexing methods are not able to take advantage of the flash memory storage devices. In this paper, we present a set of multi-level bitmap indexes that can effectively take advantage of flash storage devices. These indexing methods use coarsely binned indexes to answer queries approximately, and then use finely binned indexes to refine the answers. Our new methods read significantly lower volumes of data at the expense of an increased disk access count, thus taking full advantage of the improved read speed and low access latency of flash devices. To demonstrate the advantage of these new indexes, we measure their performance on a number of storage systems using a standard data warehousing benchmark called the Set Query Benchmark. We observe that multi-level strategies on flash drives are up to 3 times faster than traditional indexing strategies on magnetic disk drives.

Wu, Kesheng; Madduri, Kamesh; Canon, Shane

2010-07-23T23:59:59.000Z

448

Flash photolysis of rhodopsin in the cat retina  

SciTech Connect

The bleaching of rhodopsin by short-duration flashes of a xenon discharge lamp was studied in vivo in the cat retina with the aid of a rapid, spectral-scan fundus reflectometer. Difference spectra recorded over a broad range of intensities showed that the bleaching efficacy of high-intensity flashes was less than that of longer duration, steady lights delivering the same amount of energy. Both the empirical results and those derived from a theoretical analysis of flash photolysis indicate that, under the conditions of these experiments, the upper limit of the flash bleaching of rhodopsin in cat is approximately 90%. Although the fact that a full bleach could not be attained is attributable to photoreversal, i.e., the photic regeneration of rhodopsin from its light-sensitive intermediates, the 90% limit is considerably higher than the 50% (or lower) value obtained under other experimental circumstances. Thus, it appears that the duration (approximately 1 ms) and spectral composition of the flash, coupled with the kinetic parameters of the thermal and photic reactions in the cat retina, reduce the light-induced regeneration of rhodopsin to approximately 10%.

Ripps, H.; Mehaffey, L.; Siegel, I.M.; Ernst, W.; Kemp, C.M.

1981-03-01T23:59:59.000Z

449

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

450

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

451

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

452

This Bug Man Is a Pest George Ledin teaches students how to write viruses, and it makes  

E-Print Network (OSTI)

's going on in Ledin's classroom. He has been likened to A.Q. Khan, the Pakistani scientist who sold--and the http://www.newsweek.com/2008/08/01/this-bug-man-is-a-pest.prin... 1 of 2 #12;hackers. "We've changed

Ravikumar, B.

453

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

454

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

455

A Statistical Comparison of the Properties of Flash Flooding and Nonflooding Precipitation Events in Portions of New York and Pennsylvania  

Science Conference Proceedings (OSTI)

Flash floods reported for the forecast area of the National Weather Service Forecast Office at Binghamton, New York (BGM), are compared with similar significant precipitation and flash flood watch events not corresponding to flash flood reports. ...

Stephen M. Jessup; Arthur T. DeGaetano

2008-02-01T23:59:59.000Z

456

Policy Flash 20012-15 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12-15 12-15 Policy Flash 20012-15 This AL is a reissuance (under the new AL number of 2012-05) of the AL on Meal Costs in Management and Operating Contracts that was originally issued on August 2, 2005 (under AL number 2005-12). It provides additional application guidance on: understanding the standards for reimbursement of contractor meal costs; applying the standards in determining the allowability of contractor meal costs; and overseeing the Department's and contractors' internal controls applicable to reimbursement of contractor meal costs. Attachment - AL 2012-05, Meal Costs in Management and Operation Contracts Policy_Flash_2012-15.pdf Policy_Flash_2012-15_Attachment.pdf More Documents & Publications Microsoft Word - AL2005-12.doc OPAM Policy Acquisition Guides

457

Policy Flash 20012-15 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

012-15 012-15 Policy Flash 20012-15 This AL is a reissuance (under the new AL number of 2012-05) of the AL on Meal Costs in Management and Operating Contracts that was originally issued on August 2, 2005 (under AL number 2005-12). It provides additional application guidance on: understanding the standards for reimbursement of contractor meal costs; applying the standards in determining the allowability of contractor meal costs; and overseeing the Department's and contractors' internal controls applicable to reimbursement of contractor meal costs. Attachment - AL 2012-05, Meal Costs in Management and Operation Contracts Policy_Flash_2012-15.pdf Policy_Flash_2012-15_Attachment.pdf More Documents & Publications Microsoft Word - AL2005-12.doc OPAM Policy Acquisition Guides

458

Policy Flash 2013-64 Acquisition Letter 10 and Class Deviation for  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2013-64 Acquisition Letter 10 and Class Deviation for Policy Flash 2013-64 Acquisition Letter 10 and Class Deviation for Nondisplacement of Qualified Workers Policy Flash 2013-64 Acquisition Letter 10 and Class Deviation for Nondisplacement of Qualified Workers Questions concerning this policy flash should be directed to Jason Taylor of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at (202) 287-1560 or at jason.taylor@hq.doe.gov. Policy Flash_Nondisplacement.pdf SIGNED_classdeviation970.5244-1.pdf AL nondisplacement of qualified workers.pdf More Documents & Publications Policy Flash 2013-79 Professional and Consultant service cost (FAR 31.205-33) Policy Flash 2013-41 Contracts Periods of Performance Exceeding 5 Years Policy Flashes FY 2013

459

POLICY FLASH 2013-55 FPDS-NG Change Management Notice for the Oklahoma  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 FPDS-NG Change Management Notice for the 5 FPDS-NG Change Management Notice for the Oklahoma Tornado and Storm POLICY FLASH 2013-55 FPDS-NG Change Management Notice for the Oklahoma Tornado and Storm This Flash will be available online at the following website: http://energy.gov/management/office-management/operational-management/procurement-and-acquisition/policy-flashes Questions concerning this policy flash should be directed to Kevin M. Smith, of the Contract and Financial Assistance Policy Division, at Kevin.M.Smith@hq.doe.gov, or at (202) 287-1614. Policy Flash 2013-55_Oklahoma Tornado FPDS.pdf More Documents & Publications Policy Flash 2013-47 Management and Security of Personally Identifiable Information POlicy Flash 2013-60 Policy Flash 2013-74 Quarterly Notification of the DOE's Differing

460

Policy Flash 2013-74 Quarterly Notification of the DOE's Differing...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2013-47 Management and Security of Personally Identifiable Information POLICY FLASH 2013-55 FPDS-NG Change Management Notice for the Oklahoma Tornado and Storm POlicy Flash 2013-60...

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Policy Flash 2013-38 Revised Merit Review Guide For Financial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3-38 Revised Merit Review Guide For Financial Assistance Policy Flash 2013-38 Revised Merit Review Guide For Financial Assistance Attached is Policy Flash 2013-38 Revised Merit...

462

On the use of NAND flash memory in high-performance relational databases  

E-Print Network (OSTI)

High-density NAND flash storage has become relatively inexpensive due to the popularity of various consumer electronics. Recently, several manufacturers have released IDE-compatible NAND flash-based drives in sizes up to ...

Myers, Daniel (Daniel Sumers)

2008-01-01T23:59:59.000Z

463

Lightning Flash Rates as an Indicator of Tropical Cyclone Genesis in the Eastern North Pacific  

Science Conference Proceedings (OSTI)

Lightning flashes in convective tropical clusters of the eastern North Pacific Ocean are detected by the Long-Range Lightning Detection Network and are analyzed for temporal patterns in electrical activity. The rates of lightning flash discharge ...

Lesley A. Leary; Elizabeth A. Ritchie

2009-10-01T23:59:59.000Z

464

Microsoft Word - PolicyFlash_2010-01_January_2011_PMCDP_Curriculum...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1January2011PMCDPCurriculumFINAL.doc Microsoft Word - Policy Flash2010-01January2011PMCDPCurriculumFINAL.doc Microsoft Word - Policy Flash2010-01January2011PMCDPCur...

465

Microsoft Word - Flash_09-05_PMCDP_Course_Curriculum_Changes...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5PMCDPCourseCurriculumChanges.doc Microsoft Word - Flash09-05PMCDPCourseCurriculumChanges.doc Microsoft Word - Flash09-05PMCDPCourseCurriculumChanges.doc More...

466

Policy Flash 2013-33 Department of Energy Order 206.2 Identity...  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Flash 2013-33 Department of Energy Order 206.2 Identity, Credential and Access Managment (ICAM) Policy Flash 2013-33 Department of Energy Order 206.2 Identity, Credential...

467

POLICY FLASH 2013-66 Revised Merit Review Guide for FInancail...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY FLASH 2013-66 Revised Merit Review Guide for FInancail Assistance, July 2013 POLICY FLASH 2013-66 Revised Merit Review Guide for FInancail Assistance, July 2013 Questions...

468

Policy Flash 2013-32 Fiscal Year 2013 Small Business Contracting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Fiscal Year 2013 Small Business Contracting Goals Policy Flash 2013-32 Fiscal Year 2013 Small Business Contracting Goals Attached is Policy Flash 2013-32 Fiscal Year 2013 Small...

469

AttachmentFlash2011-2 -(2)-OPAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-(2)-OPAM AttachmentFlash2011-2 -(2)-OPAM REQUESTS BY POLITICAL CANDIDATES TO TOUR DOE FACILITIES AttachmentFlash2011-2 -(2)-OPAM More Documents & Publications...

470

V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

471

Policy_Flash_2011-62__Attachment.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

sh2011-62Attachment.pdf PolicyFlash2011-62Attachment.pdf More Documents & Publications PolicyFlash2011-62.pdf OPAM Policy Acquisition Guides Microsoft Word - AL2006-07.doc...

472

Evaluation of Tools Used for Monitoring and Forecasting Flash Floods in the United States  

Science Conference Proceedings (OSTI)

This paper evaluates, for the first time, flash-flood guidance (FFG) values and recently developed gridded FFG (GFFG) used by the National Weather Service (NWS) to monitor and predict imminent flash flooding, which is the leading storm-related ...

Jonathan J. Gourley; Jessica M. Erlingis; Yang Hong; Ernest B. Wells

2012-02-01T23:59:59.000Z

473

A Mixed Exponential Distribution Model for Retrieving Ground Flash Fraction from Satellite Lightning Imager Data  

Science Conference Proceedings (OSTI)

A Bayesian inversion method is introduced for retrieving the fraction of ground flashes in a set of flashes observed from a (low earth orbiting or geostationary) satellite lightning imager. The method employs a constrained mixed exponential ...

W. J. Koshak

2011-04-01T23:59:59.000Z

474

Organization of Flash-Flood-Producing Precipitation in the Northeast United States  

Science Conference Proceedings (OSTI)

Heavy precipitation and flash flooding have been extensively studied in the central United States, but less so in the Northeast. This study examines 187 warm-season flash flood events identified in Storm Data to better understand the structure of ...

Stephen M. Jessup; Stephen J. Colucci

2012-04-01T23:59:59.000Z

475

Policy Flash 2013-45 Source Selection Guide | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide Questions concerning this policy flash should be directed to Jeff Burgan at (865) 241-2513 or jeffrey.burgan@hq.doe.gov. Policy Flash 2013-45.pdf Acquisition Guide 15.1...

476

POLICY FLASH 2013-55 FPDS-NG Change Management Notice for the Oklahoma Tornado and Storm  

Energy.gov (U.S. Department of Energy (DOE))

This Flash will be available online at the following website:  http://energy.gov/management/office-management/operational-management/procurement-and-acquisition/policy-flashes

477

Policy Flash: 2013-52 Contractor Legal Management Requirements: Final Rule  

Energy.gov (U.S. Department of Energy (DOE))

Questions concerning this policy flash should be directed to Michael Righi of the Contract and Financial Assistance

478

Radio emissions from terrestrial gamma-ray flashes Joseph R. Dwyer1  

E-Print Network (OSTI)

. Introduction 1.1. TGF Theory Overview [2] Terrestrial gamma-ray flashes (TGFs) are bright bursts of gamma raysRadio emissions from terrestrial gamma-ray flashes Joseph R. Dwyer1 and Steven A. Cummer2 Received frequency (RF) emissions by terrestrial gamma-ray flashes (TGFs) is developed. These radio emissions, which

Cummer, Steven A.

479

SAW: system-assisted wear leveling on the write endurance of NAND flash devices  

Science Conference Proceedings (OSTI)

The write endurance of NAND flash memory adversely impacts the lifetime of flash devices. A flash cell is likely to wear out after undergoing excessive program/erase (P/E) flips. Wear leveling is hence employed to spread erase operations as evenly ...

Chundong Wang, Weng-Fai Wong

2013-05-01T23:59:59.000Z

480

CMOS flash analog-to-digital converter for high speed and low voltage applications  

Science Conference Proceedings (OSTI)

A CMOS flash analog-to-digital converter (ADC) designed for high speed and low voltage is presented. Using the Threshold Inverter Quantization (TIQ) comparator technique, a flash ADC can be applied to low supply voltage. A fat tree encoder that has signal ... Keywords: TIQ comparator, analog-to-digital converter, fat tree encoder, flash ADC, high speed, low voltage

Jincheol Yoo; Kyusun Choi; Jahan Ghaznavi

2003-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "flash player bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Leveraging value locality in optimizing NAND flash-based SSDs  

Science Conference Proceedings (OSTI)

NAND flash-based solid-state drives (SSDs) are increasingly being deployed in storage systems at different levels such as buffer-caches and even secondary storage. However, the poor reliability and performance offered by these SSDs for write-intensive ...

Aayush Gupta; Raghav Pisolkar; Bhuvan Urgaonkar; Anand Sivasubramaniam

2011-02-01T23:59:59.000Z

482

Method and apparatus for flash evaporation of liquids  

DOE Patents (OSTI)

A vertical tube flash evaporator for introducing a superheated liquid into a flash evaporation chamber includes a vertical inlet tube with a flared diffuser portion at its upper outlet end. A plurality of annular screens are positioned in axially spaced-apart relation to each other around the periphery of the vertical tube and below the diffuser portion thereof. The screens are preferably curved upward in a cup-shaped configuration. These flash evaporators are shown in an ocean thermal energy conversion unit designed for generating electric power from differential temperature gradients in ocean water. The method of use of the flash evaporators of this invention includes flowing liquid upwardly through the vertical tube into the diffuser where initial expansion and boiling occurs quite violently and explosively. Unvaporized liquid sheets and drops collide with each other to enhance surface renewal and evaporation properties, and liquid flowing over the outlet end of the diffuser falls onto the curved screens for further surface renewal and evaporation.

Bharathan, Desikan (Lakewood, CO)

1984-01-01T23:59:59.000Z

483

A Small Updraft Producing a Fatal Lightning Flash  

Science Conference Proceedings (OSTI)

Just prior to 1900 UTC 25 July 2000, an 18-year-old male was fatally wounded by a lightning flash on the summit of Pikes Peak, Colorado. This case is believed to be unique in that radar and satellite data indicated that the cell that produced the ...

Stephen Hodanish; Ronald L. Holle; Daniel T. Lindsey

2004-06-01T23:59:59.000Z

484

Modeling the Flash Rate of Thunderstorms. Part II: Implementation  

Science Conference Proceedings (OSTI)

In Part I of this two-part paper a new method of predicting the total lightning flash rate in thunderstorms was introduced. In this paper, the implementation of this method into the convection-permitting Consortium for Small Scale Modeling (COSMO) ...

Johannes M. L. Dahl; Hartmut Höller; Ulrich Schumann

2011-10-01T23:59:59.000Z

485

Performance Testing of Window Installation and Flashing Details  

E-Print Network (OSTI)

Protection of interface at windows and other penetrations from rainwater intrusion is a primary need of building structures. This is especially true when the building is in a high weather exposure location or in a climate in which the ability for walls to dry may be limited. Two areas of specific concern are: 1) the bottom corners of windows where damage is most commonly seen, and 2) the area around curved, arched or round-top windows where it is difficult to install the standard flashing materials. This paper reviews performance testing of window flashing installation methods commonly used in the trade, as well as improved methods made possible by recent advancements in flashing products. A series of laboratory tests were designed to determine water resistance, air leakage resistance and durability of several installation methods with different flashing materials. Windows were installed in test wall sections using several methods. The installations were monitored and evaluated for ease of installation and then tested for air leakage and water resistance using ASTM E283 and ASTM E331. The durability of the installations was then evaluated by subjecting the walls to thermal cycling (0 to 160oF) and retesting for water resistance using ASTM E331. Recommendations for best practice installation based on the testing results and key material selection issues are presented.

Weston, T. A.; Herrin, J.

2002-01-01T23:59:59.000Z

486

Method and apparatus for flash evaporation of liquids  

DOE Patents (OSTI)

A vertical tube flash evaporator for introducing a super-heated liquid into a flash evaporation chamber includes a vertical inlet tube with a flared diffuser portion at its upper outlet end. A plurality of annular screens are positioned in axially spaced-apart relation to each other around the periphery of the vertical tube and below the diffuser portion thereof. The screens are preferably curved upward in a cup-shaped configuration. These flash evaporators are shown in an ocean thermal energy conversion unit designed for generating electric power from differential temperature gradients in ocean water. The method of use of the flash evaporators of this invention includes flowing liquid upwardly through the vertical tube into the diffuser where initial expansion and boiling occurs quite violently and explosively. Unvaporized liquid sheets and drops collide with each other to enhance surface renewal and evaporation properties, and liquid flowing over the outlet end of the diffuser falls onto the curved screens for further surface renewal and evaporation.

Bharathan, D.

1984-01-01T23:59:59.000Z

487

Spectral unfolds of PITHON Flash X-ray source.  

SciTech Connect

Using a differential absorption spectrometer we obtained experimental spectral information for the PITHON Flash X-ray Machine located in San Leandro, California at L-3 Communications. Spectral information we obtained pertained to the 200 keV to 800 keV endpoint operation of PITHON. We also obtained data on the temporal behavior of high energy and low energy spectral content.

Zarick, Thomas Andrew; Sheridan, Timothy J.; Hartman, E. Frederick; Riordan, John C. (L-3 Pulse Sciences)

2007-11-01T23:59:59.000Z

488

CATA: a garbage collection scheme for flash memory file systems  

Science Conference Proceedings (OSTI)

The problem of flash memory is that it cannot be overwritten unless erased in advance. In order to avoid having to erase during every update, non-in-place-update schemes have been widely used. In case of non-in-place update mechanism, garbage collection ...

Longzhe Han; Yeonseung Ryu; Keunsoo Yim

2006-09-01T23:59:59.000Z

489

A Unified Flash Flood Database across the United States  

Science Conference Proceedings (OSTI)

Despite flash flooding being one of the most deadly and costly weather-related natural hazards worldwide, individual datasets to characterize them in the United States are hampered by limited documentation and can be difficult to access. This study is the ...

Jonathan J. Gourley; Yang Hong; Zachary L. Flamig; Ami Arthur; Robert Clark; Martin Calianno; Isabelle Ruin; Terry Ortel; Michael E. Wieczorek; Pierre-Emmanuel Kirstetter; Edward Clark; Witold F. Krajewski

2013-06-01T23:59:59.000Z

490

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

491

Policy Flash 2013-25 Acquisition Certifications Program Handbook 3rd  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2013-25 Acquisition Certifications Program Handbook Policy Flash 2013-25 Acquisition Certifications Program Handbook 3rd Edition released Policy Flash 2013-25 Acquisition Certifications Program Handbook 3rd Edition released Attached is Policy Flash 2013-25 Acquisition Certifications Program Handbook 3rd Edition released The Handbook is available online at the following website: http://energy.gov/management/downloads/acquisition-certifications-program-handbook Questions concerning this policy flash should be directed to Linda Ott of the Office of Acquisition and Project Management, Professional Development Division, at (202) 287-5310 or at linda.ott@hq.doe.gov. Policy Flash 2013_25 AMCP Handbook 3rd Edition Released.pdf More Documents & Publications Policy Flash 2013-54 Acquisition Certification Program Handbook 4th Edition

492

Policy Flash 2013-31 Class Deviation from the Federal Acquisition  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Class Deviation from the Federal Acquisition 1 Class Deviation from the Federal Acquisition Regulation (FAR) 13.5, Test Program for Certain Commercial Items Policy Flash 2013-31 Class Deviation from the Federal Acquisition Regulation (FAR) 13.5, Test Program for Certain Commercial Items Attached is Policy Flash 2013-31 Class Deviation from the Federal Acquisition Regulation (FAR) 13.5, Test Program for Certain Commercial Items Questions concerning this policy flash should be directed to Richard Bonnell of the Contract and Financial Assistance Policy Division at (202) 287-1747 or at richard.bonnell@hq.doe.gov. Flash 2013-31 Class Deviation FAR 13 5 (2-25).pdf Signed_Class Deviation.pdf More Documents & Publications Policy Flash 2013-01 Policy Flashes FY 2013 Policy Flash 2013-66 Revised Merit Review Guide for Financial Assistance,

493

V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Flash Plug-in Lets Remote Users Conduct 4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 - 12:56am Addthis PROBLEM: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028694 CVE-2013-2866 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted Flash content that, when loaded by the target user, will display the Flash settings in a transparent manner, which may allow the remote user to cause the target user to modify their Flash settings. This may allow the remote user to obtain potentially

494

Optimizing the FLASH code: preparing for Mira BG/Q and improving the laser  

NLE Websites -- All DOE Office Websites (Extended Search)

Optimizing FLASH Optimizing FLASH Optimizing the FLASH code: preparing for Mira BG/Q and improving the laser ray trace April 30, 2013 6km25100off0650 CS Seminar: Optimizing the FLASH code: preparing for Mira BG/Q and improving the laser ray trace Christopher Daley The Flash Center for Computational Science, University of Chicago Tuesday, April 30, 2013 10:00-11:00 PDT Oakland Scientific Facility Room 238 FLASH is a multi-physics, component-based scientific code which has been used on the largest HPC platforms over the last decade. It has been cumulatively used by over a thousand researchers to investigate problems in astrophysics, cosmology, and in some areas of basic physics, such as turbulence. The core capabilities in FLASH include Adaptive Mesh Refinement (AMR) and solvers for hydrodynamics and magneto-hydrodynamics. There are

495

Policy Flash 2013-46 Awardee in STRIPES | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 Awardee in STRIPES 6 Awardee in STRIPES Policy Flash 2013-46 Awardee in STRIPES Attached is Policy Flash 2013-46 Awardee in STRIPES This Flash will be available online at the following website: http://energy.gov/management/office-management/operational-management/procurement-and-acquisition/policy-flashes. Questions concerning this policy flash should be directed to Ellen Colligan at (202) 287-1776 or ellen.colligan@hq.doe.gov of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management. Policy Flash 2013-46.pdf FAADS FAADS Plus dollar amounts.pdf Awardee Share Procedures.pdf asst agreement form from STRIPES.pdf More Documents & Publications Policy Flash 2013-36 Update to Congressional Notifications - Acquisition

496

Policy Flash 2013-51 311 Notice Aquisition Letter 2013-05 Financial  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Flash 2013-51 311 Notice Aquisition Letter 2013-05 Financial Policy Flash 2013-51 311 Notice Aquisition Letter 2013-05 Financial Assistance Letter 2013-03 Policy Flash 2013-51 311 Notice Aquisition Letter 2013-05 Financial Assistance Letter 2013-03 Questions concerning this policy flash should be directed to Barbara Binney of the Contract and Financial Assistance Policy Division, at Barbara Binney@hq.doe.gov or at (202) 287-1340 Policy Flash 2013-51.pdf Policy Flash 2013- Attachment AL 2013-05 FAL 2013-03 April 24 2013 final.pdf Attachment 1 DOE Section 311 Contract Award letter FY2013 April 26.pdf Attachment 2A DOE Section 311 Financial Assistance Letter FY2013 April 26.pdf Attachment 2B DOE Section 311 Financial Assistance Letter FY2013 April 26.pdf More Documents & Publications Policy Flash 2014-04 Continuing Appropriations Act, 2014 -- Congressional

497

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

498

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 19, 2013 March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 15, 2013 V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. March 14, 2013 V-111: Multiple vulnerabilities have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. March 11, 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 Microsoft Security Bulletin Advance Notification for March 2013. Microsoft

499

Policy Flash 2012-22 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Policy Flash 2012-22 Attached is Policy Flash 2012-22 - Acquisition Letter AL 2012-07/Financial Acquisition Letter FAL 2012-01 Congressional Notification of Pending Award of a Contract Action, Announcement of Selected Applications for Negotiation of Financial Assistance Awards, or to Award a Financial Assistance Action in Excess of $1 Million AL 2012-07/FAL 2012-01 (AL/FAL) implements statutory Congressional notification of pending award of a contract action, announcement of selected applications for negotiation of financial assistance awards, or to award a financial assistance action in excess of $1 million. The total value of the award includes options, budget periods and cost share. The AL/FAL implements Division B, Consolidated Appropriations Act, Fiscal Year

500

Microsoft Word - POLICY FLASH version 2 1.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY FLASH 2009-74 POLICY FLASH 2009-74 DATE: September 21, 2009 TO: Procurement Directors FROM: Office of Procurement and Assistance Policy, MA-61 Office of Procurement and Assistance Management SUBJECT: Update to the DOE Implementation Guide for the American Recovery and Reinvestment Act (ARRA) of 2009 SUMMARY: As previously stated, the subject Guide is intended to be a "living document" that will be periodically updated, as necessary. This current update includes additional information in multiple parts of the Guide, and as such, the Guide is being reissued, in its entirety, as Version 2.1. In particular, Version 2.1 includes new information on reporting, amended conflicts of interest guidance relating to merit review, and Buy American requirements. Sections that are