National Library of Energy BETA

Sample records for heap overflow lets

  1. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  2. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  3. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain ... AnyConnect VPN Client Two Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws ...

  4. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in ...

  5. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  6. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  7. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  8. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  9. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute ... The vendor has issued a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer ...

  10. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  11. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  12. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  13. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  14. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute ... Lets Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid ...

  15. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  16. T-548: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow

    Broader source: Energy.gov [DOE]

    Novell ZENworks Handheld Management (ZHM) is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the ZfHIPCnd.exe Access Point process. By sending a specially-crafted request to TCP port 2400, a remote attacker could overflow a buffer and execute arbitrary code on the system with SYSTEM privileges or cause the application to crash.

  17. Nuclear reactor overflow line

    DOE Patents [OSTI]

    Severson, Wayne J.

    1976-01-01

    The overflow line for the reactor vessel of a liquid-metal-cooled nuclear reactor includes means for establishing and maintaining a continuous bleed flow of coolant amounting to 5 to 10% of the total coolant flow through the overflow line to prevent thermal shock to the overflow line when the reactor is restarted following a trip. Preferably a tube is disposed concentrically just inside the overflow line extending from a point just inside the reactor vessel to an overflow tank and a suction line is provided opening into the body of liquid metal in the reactor vessel and into the annulus between the overflow line and the inner tube.

  18. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS ...

  19. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  20. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  1. T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

  2. Overflow control valve

    DOE Patents [OSTI]

    Hundal, Rolv; Kessinger, Boyd A.; Parlak, Edward A.

    1984-07-24

    An overflow control valve for use in a liquid sodium coolant pump tank which valve can be extended to create a seal with the pump tank wall or retracted to break the seal thereby accommodating valve removal. An actuating shaft which controls valve disc position also has cams which bear on roller surfaces to force retraction of a sliding cylinder against spring tension to retract the cylinder from sealing contact with the pump tank.

  3. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  4. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis...

  5. Power-law connections: From Zipf to Heaps and beyond

    SciTech Connect (OSTI)

    Eliazar, Iddo I.; Cohen, Morrel H.

    2013-05-15

    In this paper we explore the asymptotic statistics of a general model of rank distributions in the large-ensemble limit; the construction of the general model is motivated by recent empirical studies of rank distributions. Applying Lorenzian, oligarchic, and Heapsian asymptotic analyses we establish a comprehensive set of closed-form results linking together rank distributions, probability distributions, oligarchy sizes, and innovation rates. In particular, the general results reveal the fundamental underlying connections between Zipfs law, Paretos law, and Heaps lawthree elemental empirical power-laws that are ubiquitously observed in the sciences. -- Highlights: ? The large-ensemble asymptotic statistics of rank distributions are explored. ? Lorenzian, oligarchic, and Heapsian asymptotic analyses are applied. ? Associated oligarchy sizes and induced innovation rates are analyzed. ? General elemental statistical connections are established. ? The underlying connections between Zipfs, Paretos and Heaps laws are unveiled.

  6. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  7. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  8. Event heap: a coordination infrastructure for dynamic heterogeneous application interactions in ubiquitous computing environments

    DOE Patents [OSTI]

    Johanson, Bradley E.; Fox, Armando; Winograd, Terry A.; Hanrahan, Patrick M.

    2010-04-20

    An efficient and adaptive middleware infrastructure called the Event Heap system dynamically coordinates application interactions and communications in a ubiquitous computing environment, e.g., an interactive workspace, having heterogeneous software applications running on various machines and devices across different platforms. Applications exchange events via the Event Heap. Each event is characterized by a set of unordered, named fields. Events are routed by matching certain attributes in the fields. The source and target versions of each field are automatically set when an event is posted or used as a template. The Event Heap system implements a unique combination of features, both intrinsic to tuplespaces and specific to the Event Heap, including content based addressing, support for routing patterns, standard routing fields, limited data persistence, query persistence/registration, transparent communication, self-description, flexible typing, logical/physical centralization, portable client API, at most once per source first-in-first-out ordering, and modular restartability.

  9. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system.

  10. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability August 16, 2013 - 5:52am Addthis...

  11. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    54: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am ...

  12. U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system.

  13. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  14. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability | Department of Energy 54: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am Addthis PROBLEM: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability PLATFORM: Versions 7.1.1 through 7.1.2.5, 8.0, and 8.0.0.1. ABSTRACT: A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target

  15. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  16. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  17. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  18. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  19. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  20. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  1. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  2. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  3. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  4. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  5. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  6. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  7. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  8. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login ... and Local Users Gain Elevated Privileges V-076: Cisco Wireless LAN Controller Bugs Let ...

  9. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  10. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  11. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  12. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  13. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Workforce ...neighborhoods 2 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big ...

  14. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  15. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of ...

  16. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  17. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  18. T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

  19. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  20. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code ... Lets Local Users Gain Elevated Privileges T-536: Cisco ASA Multiple Flaws Let Remote ...

  1. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  2. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  3. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  4. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  5. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  6. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  7. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  8. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  9. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  10. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  11. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  12. Solar Decathlon 2013: Let the Building Begin | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Begin Solar Decathlon 2013: Let the Building Begin Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village ...

  13. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  14. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  15. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  16. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  17. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  18. FROM HOT JUPITERS TO SUPER-EARTHS VIA ROCHE LOBE OVERFLOW

    SciTech Connect (OSTI)

    Valsecchi, Francesca; Rasio, Frederic A.; Steffen, Jason H.

    2014-09-20

    Through tidal dissipation in a slowly spinning host star, the orbits of many hot Jupiters may decay down to the Roche limit. We expect that the ensuing mass transfer will be stable in most cases. Using detailed numerical calculations, we find that this evolution is quite rapid, potentially leading to the complete removal of the gaseous envelope in a few gigayears, and leaving behind an exposed rocky core (a {sup h}ot super-Earth{sup )}. Final orbital periods are quite sensitive to the details of the planet's mass-radius relation and to the effects of irradiation and photo-evaporation, but could be as short as a few hours or as long as several days. Our scenario predicts the existence of planets with intermediate masses ({sup h}ot Neptunes{sup )} that should be found precisely at their Roche limit and in the process of losing mass through Roche lobe overflow. The observed excess of small single-planet candidate systems observed by Kepler may also be the result of this process. If so, the properties of their host stars should track those of the hot Jupiters. Moreover, the number of systems that produced hot Jupiters could be two to three times larger than one would infer from contemporary observations.

  19. The exometabolome of Clostridium thermocellum reveals overflow metabolism at high cellulose loading

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Holwerda, Evert K.; Thorne, Philip G.; Olson, Daniel G.; Amador-Noguez, Daniel; Engle, Nancy L.; Tschaplinski, Timothy J.; van Dijken, Johannes P.; Lynd, Lee R.

    2014-10-21

    Background: Clostridium thermocellum is a model thermophilic organism for the production of biofuels from lignocellulosic substrates. The majority of publications studying the physiology of this organism use substrate concentrations of ≤10 g/L. However, industrially relevant concentrations of substrate start at 100 g/L carbohydrate, which corresponds to approximately 150 g/L solids. To gain insight into the physiology of fermentation of high substrate concentrations, we studied the growth on, and utilization of high concentrations of crystalline cellulose varying from 50 to 100 g/L by C. thermocellum. Results: Using a defined medium, batch cultures of C. thermocellum achieved 93% conversion of cellulose (Avicel)more » initially present at 100 g/L. The maximum rate of substrate utilization increased with increasing substrate loading. During fermentation of 100 g/L cellulose, growth ceased when about half of the substrate had been solubilized. However, fermentation continued in an uncoupled mode until substrate utilization was almost complete. In addition to commonly reported fermentation products, amino acids - predominantly L-valine and L-alanine - were secreted at concentrations up to 7.5 g/L. Uncoupled metabolism was also accompanied by products not documented previously for C. thermocellum, including isobutanol, meso- and RR/SS-2,3-butanediol and trace amounts of 3-methyl-1-butanol, 2-methyl-1-butanol and 1-propanol. We hypothesize that C. thermocellum uses overflow metabolism to balance its metabolism around the pyruvate node in glycolysis. In conclusion: C. thermocellum is able to utilize industrially relevant concentrations of cellulose, up to 93 g/L. We report here one of the highest degrees of crystalline cellulose utilization observed thus far for a pure culture of C. thermocellum, the highest maximum substrate utilization rate and the highest amount of isobutanol produced by a wild-type organism.« less

  20. The exometabolome of Clostridium thermocellum reveals overflow metabolism at high cellulose loading

    SciTech Connect (OSTI)

    Holwerda, Evert K.; Thorne, Philip G.; Olson, Daniel G.; Amador-Noguez, Daniel; Engle, Nancy L.; Tschaplinski, Timothy J.; van Dijken, Johannes P.; Lynd, Lee R.

    2014-10-21

    Background: Clostridium thermocellum is a model thermophilic organism for the production of biofuels from lignocellulosic substrates. The majority of publications studying the physiology of this organism use substrate concentrations of ≤10 g/L. However, industrially relevant concentrations of substrate start at 100 g/L carbohydrate, which corresponds to approximately 150 g/L solids. To gain insight into the physiology of fermentation of high substrate concentrations, we studied the growth on, and utilization of high concentrations of crystalline cellulose varying from 50 to 100 g/L by C. thermocellum. Results: Using a defined medium, batch cultures of C. thermocellum achieved 93% conversion of cellulose (Avicel) initially present at 100 g/L. The maximum rate of substrate utilization increased with increasing substrate loading. During fermentation of 100 g/L cellulose, growth ceased when about half of the substrate had been solubilized. However, fermentation continued in an uncoupled mode until substrate utilization was almost complete. In addition to commonly reported fermentation products, amino acids - predominantly L-valine and L-alanine - were secreted at concentrations up to 7.5 g/L. Uncoupled metabolism was also accompanied by products not documented previously for C. thermocellum, including isobutanol, meso- and RR/SS-2,3-butanediol and trace amounts of 3-methyl-1-butanol, 2-methyl-1-butanol and 1-propanol. We hypothesize that C. thermocellum uses overflow metabolism to balance its metabolism around the pyruvate node in glycolysis. In conclusion: C. thermocellum is able to utilize industrially relevant concentrations of cellulose, up to 93 g/L. We report here one of the highest degrees of crystalline cellulose utilization observed thus far for a pure culture of C. thermocellum, the highest maximum substrate utilization rate and the highest amount of isobutanol produced by a wild-type organism.

  1. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  2. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  3. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  4. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  5. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  6. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  7. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  8. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  9. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  10. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  11. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  12. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  13. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  14. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  15. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  16. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  17. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  18. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  19. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  20. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  1. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  2. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  3. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  4. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  5. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  6. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  7. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  8. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May ...

  9. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  10. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  11. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  12. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  13. Shrinking the trash heap

    SciTech Connect (OSTI)

    Gillis, A.M.

    1992-02-01

    This article evaluates uses of composted solid wastes. Uses are described for agriculture, horticulture, silviculture, for soil amendments and for land reclamation projects. Researchers are exploring problems related to the availability and toxicity of metals in the compost and the effects of these metals in the food supply. Consumer acceptance has been the major drawback to successful marketing of the product.

  14. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  15. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  16. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  17. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  18. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards

    Broader source: Energy.gov [DOE]

    Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website.

  19. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  20. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions ... U-033: Microsoft Security Bulletin Summary for November 2011 T-706: Microsoft Fraudulent ...

  1. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  2. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote ... Vendor fixes are available at Cisco Support Addthis Related Articles V-048: Cisco Wireless ...

  3. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  4. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  5. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  6. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  7. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  8. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Address Bar URLs | Department of Energy 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in

  9. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  10. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  11. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  12. MicroRNAs let-7b/i suppress human glioma cell invasion and migration by targeting IKBKE directly

    SciTech Connect (OSTI)

    Tian, Yuan; Hao, Shaobo; Ye, Minhua; Zhang, Anling; Nan, Yang; Wang, Guangxiu; Jia, Zhifan; Yu, Kai; Guo, Lianmei; Pu, Peiyu; Huang, Qiang; Zhong, Yue

    2015-03-06

    We demonstrated that IKBKE is overexpressed in human gliomas and that the downregulation of IKBKE markedly inhibits the proliferative and invasive abilities of glioma cells, which is consistent with the results reported by several different research groups. Therefore, IKBKE represents a promising therapeutic target for the treatment of glioma. In the present study, we verified that the microRNAs let-7b and let-7i target IKBKE through luciferase assays and found that let-7b/i mimics can knock down IKBKE and upregulate E-cadherin through western blot analysis. Moreover, the expression levels of let-7b/i were significantly lower in glioma cell lines than that in normal brain tissues, as determined by quantitative real-time PCR. Furthermore, let-7b/i inhibit the invasion and migration of glioma cells, as determined through wound healing and Transwell assays. The above-mentioned data suggest that let-7b/i inhibit the invasive ability of glioma cells by directly downregulating IKBKE and indirectly upregulating E-cadherin. - Highlights: • Let-7b and let-7i are downregulated in glioma cell lines. • IKBKE is a target gene of let-7b/i. • Let-7b/i inhibit the invasion and migration of glioma cells. • Let-7b/i upregulate E-cadherin by downregulating IKBKE.

  13. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  14. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  15. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  16. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  17. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  18. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  19. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  20. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  1. Colton Heaps | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Force's first facility energy savings initiative in its deployed operations. He holds a LEED-AP in building design and construction and is a certified project management ...

  2. U.S. DEPARTMENT OF ENERGY ENVIRONMENTAL IMPACT STATEMENTS AND ENVIRONMENTAL ASSESSMENTS

    Energy Savers [EERE]

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  3. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  4. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  5. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let's Keep Talking: Women in STEM Tweet Up Let's Keep Talking: Women in STEM Tweet Up April 11, 2012 - 2:37pm Addthis The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department file photo The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department

  6. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Local Users Gain Elevated Privileges | Department of Energy 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure

  7. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  8. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect (OSTI)

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  9. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions

    Broader source: Energy.gov [DOE]

    Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions.

  10. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect (OSTI)

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  11. Research Highlight: Let the Good Times Flow - Joint Center for Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Storage Research October 1, 2015, News Articles Research Highlight: Let the Good Times Flow There are two electrodes in every battery. One electrode, called the cathode, connects to the positive end of the battery and is where the electric current leaves the battery. The other electrode, the anode, connects to the negative end of the battery and is where the electric current enters the battery. The flow of these electrons through an external circuit is what produces the electric current.

  12. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  13. V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2044373) Addthis Related Articles U-128: VMware ESXESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges T-552: Cisco Nexus 1000V...

  14. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect (OSTI)

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.310.310.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  15. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  16. Oxidative Stress and Skeletal Health with Low-Dose, Low-LET (Linear Energy Transfer) Ionizing Radiation

    SciTech Connect (OSTI)

    Globus, Ruth K.

    2014-11-03

    We performed in vivo and in vitro experiments to accomplish the following specific aims of this project: 1) determine if low dose, low LET radiation affects skeletal remodeling at structural, cellular and molecular levels and 2) determine if low dose, low LET radiation modulates skeletal health during aging via oxidative mechanisms. A third aim is supported by NASA supplement to this DOE grant focusing on the influence of high LET radiation on bone. A series of experiments were conducted at the NASA Space Radiation Laboratory at Brookhaven, NSRL-BNL, using iron (56Fe) or a sequential exposure to protons / iron / protons, and separate experiments at NASA Ames Research Center (ARC) using 137Cs. The following provides a summary of key findings. (1) Exposure of nine-week old female mice to priming doses of gamma radiation (10cGy x 5) did not significantly affect bone volume/total volume (BV/TV) or microarchitecture as analyzed by 3D microcomputed tomography. As expected, exposure to the challenge dose of 2 Gy gamma irradiation resulted in significant decreases in BV/TV. The priming dose combined with the 2Gy challenge dose had no further effect on BV/TV compared to challenge dose alone, with the sole exception of the Structural Model Index (SMI). SMI reflects the ratio of rods-to-plates in cancellous bone tissue, such that higher SMI values indicate a tendency toward a weaker structure compared to lower SMI values. Mice treated with both priming and challenge dose had 25% higher SMI values compared to sham-irradiated controls and 7% higher values compared to mice treated with the challenge dose alone. Thus, although this priming regimen had relatively modest effects on cancellous tissue, the difference in SMI suggests this fractionated priming doses have adverse, rather than beneficial, effects on bone structure. (2) In 10-week old male mice, a single exposure to 100cGy of 137Cs reduces trabecular bone number and connectivity density by 20% and 36% respectively one month after irradiation (IR). At four months post-IR, these animals were comparable to sham-treated controls with regards to the abovementioned structural parameters. Irradation at 1 or 10 cGy did not result in any significant changes in bone structural parameters. (3) Irradiation of 16-wk old male mice with high doses of 56Fe or proton (50 or 200cGy), but not at low doses (5 or 10cGy), showed a similar loss of cancellous BV/TV and trabecular number at five weeks post-IR. (4) Age-related bone loss overtook acute radiation-induced decrements in bone structure within four months post-IR with 100 cGy gamma and 12 months post-IR with 200 cGy iron. Transgenic mice globally overexpressing human catalase gene in mitochondria did not exhibit cancellous bone loss as assessed at four month post-IR with 10 cGy proton, 50 cGy iron, or in combination. (5) The cellular and molecular mechanisms responsible for loss of bone with radiation are mediated primarily through increased osteoclastogenesis. Our data provide evidence that there are increases in gene expression of TNF alpha and MCP1 in the bone marrow cells 24 hours post-IR and of osteoclastogenic differentiation factor RANKL by day 3. These cytokines in the marrow may stimulate mature osteoclasts or drive osteoclastogenesis from precursors. (6) Osteoblastogenesis from marrow progenitors evaluated ex vivo decreased following whole body 56Fe irradiation at a dose threshold between 20 and 50 cGy whereas osteoclastogenesis ex vivo increased with doses as low as 10cGy two days post-IR of mice. However, the latter finding was not observed in more than a single experiment. (7) Gamma irradiation of cells in vitro requires relatively high doses (200cGy) to disturb normal osteoblastogenesis and osteoclastogenesis as evidenced by decrements in mineralized nodule formation, osteoclast counts, and expression of osteoblast related genes such as runx2, col1a1. (8) We also investigated the effect of antioxidants on osteoblastogenesis following low dose in vitro gamma irradiation (15cGy) on day four bone marrow stromal cell cultures. Superoxide dismutase (SOD) was added to the cell culture medium for 2 or 3 days post-irradiation and cell colonies were counted on days 7 and 10. SOD treatment increased cell growth as measured by DNA content and colony forming units (CFU) in both irradiated cells and 0 cGy control groups. However, low dose radiation of 15cGy abolished SOD stimulatory effects on cell growth and CFU number. These results suggest that exogenous SOD increases osteoblast cell growth and colony formation and that low-dose radiation (15cGy) can interfere with the antioxidant effects. In summary, our findings indicate that acute, whole body irradiation at high doses (50-200 cGy) results in prompt tissue degradation and bone loss. Lower doses (<50 cGy) do not cause bone structural deterioration but may deplete stem/progenitor cell pools in the bone marrow.

  17. Global garbage collection for distributed heap storage systems

    SciTech Connect (OSTI)

    Ali, K.A.M.; Haridi, S.

    1986-10-01

    The authors present a garbage-collection algorithm, suitable for loosely-coupled multi-processor systems, in which the processing elements (PEs) share only the communication medium. The algorithm is global, i.e., it involves all the PEs in the system. It allows space compaction, and it uses a system-wide marking phase to mark all accessible objects where a combination of parallel breadth-first/depth-first strategies is used for tracing the object-graphs according to a decentralized credit mechanism that regulates the number of garbage collections messages in the system. The credit mechanism is crucial for determining the space requirement of the garbage-collection messages. Also a variation of this algorithm is presented for systems with high locality of reference. It allows each PE to perform first its local garbage collection and only invokes the global garbage collection when the freed space by the local collector is insufficient.

  18. Heap/stack guard pages using a wakeup unit

    DOE Patents [OSTI]

    Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard

    2014-04-29

    A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access of the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.

  19. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan; Xu, Nancy R; Mohan, Sumathy

    2013-06-03

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  20. T-604: Google Chrome updated version of the Adobe Flash player

    Broader source: Energy.gov [DOE]

    The Chrome Stable channel has been updated to 10.0.648.205 for Windows, Mac, Linux and Chrome Frame. This release contains a new version of Adobe Flash 0-Day CVE-2011-0611. Update also includes a fix for a security vulnerability Critical CVE-2011-1300: Off-by-three in GPU process, CVE-2011-1301: Use-after-free in the GPU process, and CVE-2011-1302: Heap overflow in the GPU process.

  1. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  2. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  3. T-588: HP Virtual SAN Appliance Stack Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system.

  4. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  5. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or display a malicious PNG file, your IBM Informix Genero application might crash, or could be caused to run malicious code with the privileges of the user running the application. ...

  6. Weatherization and Intergovernmental Programs Office | Department of Energy

    Energy Savers [EERE]

    Utility-Scale Solar through the Years Utility-Scale Solar through the Years 1984 Start Slow Stop Year Solar Plants Homes Powered 682 Solar Plants Online. Enough to Power 1.7 M Homes Source: Preliminary data from the 2013 EIA-860 report Users Execute Arbitrary Code | Department of Energy

    8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code

  7. V.K. Utyonkov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  8. Solar Decathlon 2015: Let the Competition Begin

    Broader source: Energy.gov [DOE]

    We're officially kicking off Solar Decathlon 2015 with the announcement of 20 new collegiate teams. Find out who will compete!

  9. Solar Decathlon 2013: Let the Building Begin

    Broader source: Energy.gov [DOE]

    Last week, teams began reassembling their houses on the Solar Decathlon competition site. See photo updates from the first week of construction.

  10. Let the private sector handle energy conservation

    SciTech Connect (OSTI)

    Bajer, E.R.

    1982-08-23

    Mr. Bajer feels that elimination of many federal conservation programs will have no effect on the US goal of reducing oil imports because the private sector can do a better job of providing these efforts. He notes that many government programs were the result of overreaction to the 1973 oil embargo, when Congress misread the public's willingness to respond. The American people have taken the initiative, however, and have reduced their energy consumption and import rates. Mr. Bajer further notes that, according to the DOE Office of Policy, Planning and Analysis, DOE's conservation programs accounted for less than 5% of reduction of energy use per unit of GNP. He thinks that new policies will allow market forces to continue providing conservation incentives and will remove government intervention and competition with the private sector. (DCK)

  11. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    exploit this vulnerability. The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the USELASTCOMMITTED option in a SQL query....

  12. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  13. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  14. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  15. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  16. Storm and combined sewer overflow: An overview of EPA's Research Program. Book chapter

    SciTech Connect (OSTI)

    Field, R.

    1993-01-01

    The report represents an overview of the EPA's Storm and Combined Sewer Pollution Control Research Program performed over a 20-year period beginning with the mid-1960s. It covers Program involvements in the development of a diverse technology including pollution-problem assessment/solution methodology and associated instrumentation and stormwater management models, best management practices, erosion control, infiltration/inflow, control, control-treatment technology and the associated sludge and solids residuals handling and many others.

  17. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  18. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  20. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  1. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  2. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  3. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  4. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Broader source: Energy.gov (indexed) [DOE]

    PDF icon Spotlight on Austin, Texas More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on Austin, Texas: Best ...

  5. Let's Compare Tritium Design Practices Across The DOE Complex | Department

    Office of Environmental Management (EM)

    Energy Lessons Learned: An Ongoing Dialogue About Smart Grid Lessons Learned: An Ongoing Dialogue About Smart Grid November 21, 2011 - 11:31am Addthis EPB’s $226 million Smart Grid Investment Grant project, part of the Energy Department's Recovery Act funding has allowed upgrades on its distribution system and the installation of “smart” switches and sensor equipment for 164 distribution circuits as well as the deployment of approximately 1500 smart switches system-wide.

  6. Going completely renewable: is it possible (let alone desirable)?

    SciTech Connect (OSTI)

    Sovacool, Benjamin K.; Watts, Charmaine

    2009-05-15

    With the right mix of leadership and policy, a completely renewable electricity sector for New Zealand and the United States is feasible, achievable, and desirable. (author)

  7. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  8. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  9. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  10. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  11. Using High Performance Libraries and Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is a user extensible heap manager built on top of jemalloc which enables control of memory characteristics and a partitioning of the heap between kinds of memory (including user...

  12. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  13. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  14. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Energy Savers [EERE]

    Disposition Schedules | Department of Energy DOERS Records Schedule Cross Index to DOE Administrative Records Disposition Schedules DOERS Records Schedule Cross Index to DOE Administrative Records Disposition Schedules Crosswalk between DOERS and Admin Schedules PDF icon DOERS Records Schedule Cross Index to DOE Administrative Records Disposition Schedules More Documents & Publications DOE Records Disposition Schedule Changes ADMINISTRATIVE RECORDS SCHEDULE 17: CARTOGRAPHIC, AERIAL

  15. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  16. BLM and NEPA: Lets`s get back to the future

    SciTech Connect (OSTI)

    Meridith, D.P.

    1995-12-01

    This talk is a personalized account of the relationship between The National Environmental Policy Act (NEPA) and the Bureau of Land Management (BLM) and the challenges the BLM faces in the future.

  17. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  18. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  19. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  20. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  1. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial...

  2. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  3. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  4. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  5. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  6. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  10. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  11. Turn Down the Temp, But Don't Let Your Pipes Freeze!

    Broader source: Energy.gov [DOE]

    Before you go crazy with turning down the thermostat really low, I'd like to point out some things you might want to keep in mind.

  12. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  13. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  14. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  15. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  16. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  17. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  18. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  19. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  1. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We develop computational tools, algorithms and strategies to analyze, understand, create, design and build complex engineered, natural or human systems. Contact Mark Bryden,...

  2. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  3. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  4. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  5. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  6. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  7. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  8. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  9. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  10. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  11. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  12. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  13. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  14. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  15. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation ... Apple Support Addthis Related Articles T-727:Microsoft Windows SSLTLS Protocol Flaw ...

  16. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  17. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  19. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

  20. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  1. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: ... the target user to a spoofed site with a URL that appears to be a legitimate domain. ...

  2. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Broader source: Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  3. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  4. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  5. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  7. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  8. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  9. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  10. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  11. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  12. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  13. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  14. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

  15. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  16. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  17. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  18. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  19. Let's Try That Again: Selling the Teapot Dome Oil Field | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In ...

  20. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Platform Major Release First Fixed Release Nexus 1000v Series Switches 4.x (earlier than 4.2.x) Vulnerable; migrate to 4.2.x 4.2.x 4.2(1)SV1(5.1) Nexus 5000 Series Switches 4.x ...

  1. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations.

  2. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  3. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information.

  4. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  5. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  6. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  7. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  8. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  9. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  10. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  11. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  12. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  13. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in the slapd.conf file. 3) An error exists within the handling of certain MODRDN requests, which can be exploited to cause a crash by submitting specially crafted MODRDN requests. ...

  14. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  15. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  16. V-188: Apache XML Security XPointer Expressions Processing Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June...

  17. Indian Country Solar Energy Potential Estimates & DOE IE Updates

    Energy Savers [EERE]

    Financing Colton Heaps National Renewable Energy Laboratory 1 2 1 Potential 3 Refinement 5 Operations & Maintenance 2 Options 4 Implementation 3 Refinement Potential Options ...

  18. Beijing Jike Energy New Technology Development Co Ltd | Open...

    Open Energy Info (EERE)

    China Zip: 100080 Sector: Geothermal energy, Wind energy Product: Focuses on photovoltaics (PV), windPV hybrid power systems and Geothermal heap pump systems. References:...

  19. Domestic Uranium Production Report

    Gasoline and Diesel Fuel Update (EIA)

    or dissolving-out from mined rock, of the soluble uranium constituents by the natural action of percolating a prepared chemical solution through mounded (heaped) rock material. ...

  20. Glossary - U.S. Energy Information Administration (EIA)

    U.S. Energy Information Administration (EIA) Indexed Site

    from the earth and the recovery, by chemical treatment in the mill's circuits, of ... action of percolating a prepared chemical solution through mounded (heaped) rock material. ...

  1. Domestic Uranium Production Report - Quarterly

    Gasoline and Diesel Fuel Update (EIA)

    or dissolving-out from mined rock, of the soluble uranium constituents by the natural action of percolating a prepared chemical solution through mounded (heaped) rock material. ...

  2. Combustible structural composites and methods of forming combustible...

    Office of Scientific and Technical Information (OSTI)

    Other embodiments and aspects are disclosed. Inventors: Daniels, Michael A. ; Heaps, Ronald J. ; Steffler, Eric D. ; Swank, W. David Issue Date: 2013-04-02 OSTI Identifier: 1083922 ...

  3. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  4. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  5. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  6. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  7. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  8. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  9. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  10. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host.

  11. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  12. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  13. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  14. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  15. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  16. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  17. V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services

  18. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  19. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  20. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  1. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  2. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  3. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  5. From ZZ to ZH : How Low Can These Cross Sections Go or Everybody, Let's Cross Section Limbo!

    SciTech Connect (OSTI)

    Strauss, Emanuel Alexandre; /SUNY, Stony Brook

    2009-08-01

    We report on two searches performed at the D0 detector at the Fermi National Laboratory. The first is a search for Z di-boson production with a theoretical cross section of 1.4 pb. The search was performed on 2.6 fb{sup -1} of data and contributed to the first observation of ZZ production at a hadron collider. The second is a search for a low mass Standard Model Higgs in 4.2 fb{sup -1} of data. The Higgs boson is produced in association with a Z boson where the Higgs decays hadronically and the Z decays to two leptons. The ZZ search was performed in both the di-electron and di-muon channels. For the ZH search, we will focus on the muonic decays where we expanded the traditional coverage by considering events in which one of the two muons fails the selection requirement, and is instead reconstructed as an isolated track. We consider Higgs masses between 100 and 150 GeV, with theoretical cross sections ranging from 0.17 to 0.042 pb, and set upper limits on the ZH production cross-section at 95% confidence level.

  6. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  7. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  8. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  9. Sandia National Laboratories: Products and Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gages, Fixtures, Molds Power Sources & Batteries Manufacturing, Shop Overflow through the Manufacturing Processes & Services Department Energy, Security & International Procurement...

  10. memP

    Energy Science and Technology Software Center (OSTI)

    2010-02-05

    The lightweight heap profiling tool memP Version 1 provides a library that can be used with MPI applications that make use of heap memory allocations to provide profile data based on the per-task high-water-mark of heap allocation. The memP output is generated as a text report that can present summary information or specific detail of the allocation call site data for each task The memP library source code is based on teh mpiP MPI profilingmore » library (http://mpip.sourceforge.net), but is substantially different in functionality and organization.« less

  11. Health effects models for nuclear power plant accident consequence analysis: Low LET radiation: Part 2, Scientific bases for health effects models

    SciTech Connect (OSTI)

    Abrahamson, S.; Bender, M.; Book, S.; Buncher, C.; Denniston, C.; Gilbert, E.; Hahn, F.; Hertzberg, V.; Maxon, H.; Scott, B.

    1989-05-01

    This report provides dose-response models intended to be used in estimating the radiological health effects of nuclear power plant accidents. Models of early and continuing effects, cancers and thyroid nodules, and genetic effects are provided. Two-parameter Weibull hazard functions are recommended for estimating the risks of early and continuing health effects. Three potentially lethal early effects -- the hematopoietic, pulmonary and gastrointestinal syndromes -- are considered. Linear and linear-quadratic models are recommended for estimating cancer risks. Parameters are given for analyzing the risks of seven types of cancer in adults -- leukemia, bone, lung, breast, gastrointestinal, thyroid and ''other''. The category, ''other'' cancers, is intended to reflect the combined risks of multiple myeloma, lymphoma, and cancers of the bladder, kidney, brain, ovary, uterus and cervix. Models of childhood cancers due to in utero exposure are also provided. For most cancers, both incidence and mortality are addressed. Linear and linear-quadratic models are also recommended for assessing genetic risks. Five classes of genetic disease -- dominant, x-linked, aneuploidy, unbalanced translocation and multifactorial diseases --are considered. In addition, the impact of radiation-induced genetic damage on the incidence of peri-implantation embryo losses is discussed. The uncertainty in modeling radiological health risks is addressed by providing central, upper, and lower estimates of all model parameters. Data are provided which should enable analysts to consider the timing and severity of each type of health risk. 22 refs., 14 figs., 51 tabs.

  12. 'Let the phage do the work': Using the phage P22 coat protein structures as a framework to understand its folding and assembly mutants

    SciTech Connect (OSTI)

    Teschke, Carolyn M., E-mail: Teschke@uconn.ed [Departments of Molecular and Cell Biology, and Chemistry, 91 N. Eagleville Rd., U-3125, University of Connecticut, Storrs, CT 06269-3125 (United States); Parent, Kristin N. [Department of Chemistry and Biochemistry, University of California, San Diego, La Jolla, CA (United States)

    2010-06-05

    The amino acid sequence of viral capsid proteins contains information about their folding, structure and self-assembly processes. While some viruses assemble from small preformed oligomers of coat proteins, other viruses such as phage P22 and herpesvirus assemble from monomeric proteins (Fuller and King, 1980). The subunit assembly process is strictly controlled through protein:protein interactions such that icosahedral structures are formed with specific symmetries, rather than aberrant structures. dsDNA viruses commonly assemble by first forming a precursor capsid that serves as a DNA packaging machine. DNA packaging is accompanied by a conformational transition of the small precursor procapsid into a larger capsid for isometric viruses. Here we highlight the pseudo-atomic structures of phage P22 coat protein and rationalize several decades of data about P22 coat protein folding, assembly and maturation generated from a combination of genetics and biochemistry.

  13. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  14. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  15. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  16. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  17. Programming Tuning Options on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for its internal buffers too. When to Use Huge Pages For MPI applications, map the static data andor heap onto huge pages. For SHMEM applications, map the static data and...

  18. V-003: Suse Update For Mozillafirefox - Critical | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    * MFSA 2012-86CVE-2012-4185CVE-2012-4186CVE-2012-4187 CVE-2012-4188 Heap memory corruption issues found using Address Sanitizer * MFSA 2012-87CVE-2012-3990 (bmo787704)...

  19. U-115: Novell GroupWise Client Address Book Processing Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    is vulnerable to an exploit where a malformed address book could cause heap memory corruption, which could lead to remote code execution under the privilege of the user that...

  20. Using High Performance Libraries and Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    High Performance Libraries and Tools Using High Performance Libraries and Tools Memkind Library on Edison The memkind library is a user extensible heap manager built on top of jemalloc which enables control of memory characteristics and a partitioning of the heap between kinds of memory (including user defined kinds of memory). This library can be used to simulate the benefit of the high bandwidth memory that will be available on KNL system on the dual socket Edison compute nodes (the two

  1. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability. PLATFORM: Versions prior to Pidgin 2.10.5 vulnerable. ABSTRACT: Pidgin is prone to a...

  2. ALSNews Vol. 302

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    UEC Corner: In Haiku, by Ken Goldberg ALS Science Cafe Attracts Overflow Crowd Shutdown Features Seismic Retrofit, Air Handler Replacement Operations News Links Boron-based...

  3. TITLE

    Office of Legacy Management (LM)

    ... Act BLM U.S. Bureau of Land Management CERCLA ... Test Site, Colorado Rulison Gas Stimulation Test Site, ... wet meadows, river overflows. mudflats. and natural ponds. ...

  4. BPD Webinar: Analyze Building Energy Data, Understand Market...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... So let me pull up your slide, Nancy, and let you get started on that. Nancy Gonzalez: ... Nancy Gonzalez: Let's see ... So one question, Paul, on accessing data, twofold: Can raw ...

  5. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  6. V-117: Symantec Enterprise Vault for File System Archiving Unquoted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local...

  7. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users ... Lets Remote Users Obtain Database Contents V-076: Cisco Wireless LAN Controller Bugs Let ...

  8. Mr

    U.S. Energy Information Administration (EIA) Indexed Site

    ... Let's take economics. Let's study regulation. And then we will have people like our distinguished Acting Administrator who will understand all these things extremely well. Mr. ...

  9. Apparatus for controlling coolant level in a liquid-metal-cooled nuclear reactor

    DOE Patents [OSTI]

    Jones, Robert D.

    1978-01-01

    A liquid-metal-cooled fast-breeder reactor which has a thermal liner spaced inwardly of the pressure vessel and includes means for passing bypass coolant through the annulus between the thermal liner and the pressure vessel to insulate the pressure vessel from hot outlet coolant includes control ports in the thermal liner a short distance below the normal operating coolant level in the reactor and an overflow nozzle in the pressure vessel below the control ports connected to an overflow line including a portion at an elevation such that overflow coolant flow is established when the coolant level in the reactor is above the top of the coolant ports. When no makeup coolant is added, bypass flow is inwardly through the control ports and there is no overflow; when makeup coolant is being added, coolant flow through the overflow line will maintain the coolant level.

  10. 1st Quarter 2016 Domestic Uranium Production Report

    U.S. Energy Information Administration (EIA) Indexed Site

    3. U.S. uranium mills and heap leach facilities by owner, location, capacity, and operating status" "Owner","Mill and Heap Leach1 Facility name","County, state (existing and planned locations)","Capacity","Operating status at end of" ,,,"(short tons of ore per day)",2015,"1st quarter 2016" "Anfield Resources Inc.","Shootaring Canyon Uranium Mill","Garfield,

  11. 2015 Domestic Uranium Production Report

    U.S. Energy Information Administration (EIA) Indexed Site

    May 5, 2016" "Next Release Date: May 2017" "Table 4. U.S. uranium mills and heap leach facilities by owner, location, capacity, and operating status at end of the year, 2011-15" "Owner","Mill and Heap Leach1 Facility Name","County, State (existing and planned locations)"," Capacity","Operating Status at End of the Year" ,,,"(short tons of ore per day)",2011,2012,2013,2014,2015 "Anfield

  12. U. S. DEPARTMENT OF ENERGY OFFICE OF HEARINGS AND APPEALS DECISION AND ORDER

    Energy Savers [EERE]

    Vulnerability | Department of Energy 4: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am Addthis PROBLEM: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability PLATFORM: Versions 7.1.1 through 7.1.2.5, 8.0, and 8.0.0.1. ABSTRACT: A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target

  13. Valve for controlling solids flow

    DOE Patents [OSTI]

    Staiger, M. Daniel (Idaho Falls, ID)

    1985-01-01

    A valve for controlling the flow of solids comprises a vessel having an overflow point, an inlet line for discharging solids into the vessel positioned within the vessel such that the inlet line's discharge point is lower than the vessel's overflow point, and apparatus for introducing a fluidizing fluid into the vessel. The fluidizing fluid fluidizes the solids within the vessel so that they overflow at the vessel's overflow point. For the removal of nuclear waste product the vessel may be placed within a sealed container having a bottom connected transport line for transporting the solids to storage or other sites. The rate of solids flow is controlled by the flow rate of the fluidizing fluid and by V-notch weirs of different sizes spaced about the top of the vessel.

  14. Valve for controlling solids flow

    DOE Patents [OSTI]

    Staiger, M.D.

    1982-09-29

    A valve for controlling the flow of solids comprises a vessel having an overflow point, an inlet line for discharging solids into the vessel positioned within the vessel such that the inlet line's discharge point is lower than the vessel's overflow point, and means for introducing a fluidizing fluid into the vessel. The fluidizing fluid fluidizes the solids within the vessel so that they overflow at the vessel's overflow point. For the removal of nuclear waste product the vessel may be placed within a sealed container having a bottom connected transport line for transporting the solids to storage or other sites. The rate of solids flow is controlled by the flow rate of the fluidizing fluid and by V-notch weirs of different sizes spaced about the top of the vessel.

  15. Tank Waste Committee Page 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... to TWC. Chris noted that the overflows, pipeline breaks, and spills in all SSTs are ... the closure plan for C Farm and the permit, which will both be available in a few months. ...

  16. Subterranean drilling and in situ treatment of wastes using a contamination control system and methods relating thereto

    DOE Patents [OSTI]

    Jessmore, James J.; Loomis, Guy G.; Pettet, Mark C.; Flyckt, Melissa C.

    2004-09-28

    Systems and methods relating to subterranean drilling while maintaining containment of any contaminants released during the drilling. A thrust block installed over a zone of interest provides an overflow space for retaining any contaminants and excess sealant returns. Negative air pressure may be maintained in the overflow space by a ventilation system. Access ports in the thrust block seal the overflow space from the surrounding environment with a membrane seal. A flexible sack seal in the access port may be connected to a drill shroud prior to drilling, providing containment during drilling after the drill bit penetrates the membrane seal. The drill shroud may be adapted to any industry standard drilling rig and includes a connection conduit for connecting to the flexible sack seal and a flexible enclosure surrounding the drill shaft and of a length to accommodate full extension thereof. Upon withdrawal, the sack seal may be closed off and separated, maintaining containment of the overflow space and the drill shroud.

  17. CX-008279: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Building 8 Compressor Aftercooler Rupture Disc Overflow Piping Project CX(s) Applied: B1.3, B1.15 Date: 05/09/2012 Location(s): West Virginia Offices(s): National Energy Technology Laboratory

  18. CX-008336: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Pad 90 Overflow Parking Lot Project CX(s) Applied: B1.15 Date: 05/01/2012 Location(s): New York Offices(s): Naval Nuclear Propulsion Program

  19. 2001 - 01 | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Join Forces (Virginian-Pilot) Thu, 01042001 - 12:00am Economy: Send Northern Virginia's High-Tech Overflow Here (Daily Press) Mon, 01012001 - 12:00am Catherine Westfall...

  20. NREL: Technology Deployment - Disaster Resiliency and Recovery...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Galena, Alaska Photo of workers building a raised house. New construction in Galena is more resistant to flooding. In May 2013, the Yukon River overflowed its banks with water and...

  1. Better Buildings Residential Network Program Sustainability Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Distributed 7,000 kits to low-income families in Kansas City. Averted 15-20k ... Combined sewer overflow events create a strong motivator for the water utility to reduce ...

  2. Stochastic Consequence Analysis for Waste Leaks

    SciTech Connect (OSTI)

    HEY, B.E.

    2000-05-31

    This analysis evaluates the radiological consequences of potential Hanford Tank Farm waste transfer leaks. These include ex-tank leaks into structures, underneath the soil, and exposed to the atmosphere. It also includes potential misroutes, tank overflow

  3. EECBG Success Story: Georgia County Turning Industrial and Farm Waste Into Big Energy Savings

    Broader source: Energy.gov [DOE]

    Gwinnett County, Georgia built a "Gas to Energy" system at the city water resources center that will reduce operational costs and sanitary sewer overflows, thanks to an Energy Efficiency and Conservation Block Grant (EECBG). Learn more.

  4. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple buffer overflow vulnerabilities exist in the WRF and ARF players. The vulnerabilities may lead to a crash of the player application or, in some cases, remote code execution could occur.

  5. CX-008202: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Renewable Energy Ground Mounted Photovoltaic Grid System Overflow CX(s) Applied: B5.16 Date: 03/29/2012 Location(s): Other Location Offices(s): Golden Field Office

  6. Improving Reuse & Recycling | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Improving Reuse & Recycling series of images of recycling: trash heap, light bulbs, circuit boards diagram for focus area three, improving reuse and recycling (A click on the org chart image will lead to a pdf version that includes hotlinks for the e-mail addresses of the leaders.)

  7. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  8. V-227: VMware Workstation and Player vmware-mount Command Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root...

  9. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local ... Scripting and URL Redirection Attacks V-151: RSA Archer eGRC Bugs Let Remote ...

  10. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  11. QER- Comment of Xcel Energy

    Broader source: Energy.gov [DOE]

    Attached are the comments of Xcel Energy Services Inc. Please let me know if you have any questions.

  12. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    1995-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 250 citations and includes a subject term index and title list.)

  13. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    1997-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  14. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    1996-04-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  15. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    Not Available

    1994-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 250 citations and includes a subject term index and title list.)

  16. The Unobtrusive Memory Allocator

    Energy Science and Technology Software Center (OSTI)

    2003-03-31

    This library implements a memory allocator/manager which ask its host program or library for memory refions to manage rather than requesting them from the operating system. This allocator supports multiple distinct heaps within a single executable, each of which may grow either upward or downward in memory. The GNU mmalloc library has been modified in such a way that its allocation algorithms have been preserved, but the manner in which it obtains regions to managemore » has been changed to request memory from the host program or library. Additional modifications allow the allocator to manage each heap as either upward or downward-growing. By allowing the hosting program or library to determine what memory is managed, this package allows a greater degree of control than other memory allocation/management libraries. Additional distinguishing features include the ability to manage multiple distinct heaps with in a single executable, each of which may grow either upward or downward in memory. The most common use of this library is in conjunction with the Berkeley Unified Parallel C (UPC) Runtime Library. This package is a modified version of the LGPL-licensed "mmalloc" allocator from release 5.2 of the "gdb" debugger's source code.« less

  17. 05-05-2010 NNSA-B-10-0144

    National Nuclear Security Administration (NNSA)

    5-05-2010 NNSA-B-10-0144 The U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA) proposes to modify the overflow lines for the twin, 10,000 (10K) gallon (gal), elevated water storage tanks located in Coyote Test Field (CTF). The overflow lines are required to extend to within 18 inches (in.) of ground level by the American Water Workers Association (AWWA) M42, Standard Specification D100, and New Mexico Administrative Code (NMAC). These two, 10K-gal, elevated water

  18. Genomic Sequence of a Marine Blooming Alga | U.S. DOE Office of Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 (Technical Report) | SciTech Connect Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Citation Details In-Document Search Title: Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure:

  19. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  20. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Environmental Management (EM)

    & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Better Buildings Network View | March 2015 Spotlight on Austin, Texas: Best...

  1. "Title","Creator/Author","Publication Date","OSTI Identifier...

    Office of Scientific and Technical Information (OSTI)

    Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September...

  2. Genome Wide Evaluation of Normal Human Tissue in Response to...

    Office of Scientific and Technical Information (OSTI)

    Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Rocke,...

  3. Be a Safe and Efficient Winter Driver

    Broader source: Energy.gov [DOE]

    We've been advising you on ways to make the home more energy smart, so let's talk about your car for a moment.

  4. U.S. Department of Energy Interim E-QIP Procedures | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Energy Security Symposium OE Releases Second Issue of Energy Emergency Preparedness Quarterly (April 2012) V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets...

  5. ALSNews Vol. 327

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Beamlines ALS in the News: Keep Up with Our News Releases, and Let Us Keep Up with Yours Winter 2012 Shutdown Update Ring Leaders: Director's Address Announcements: Science...

  6. Incident Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Offices, and other DOE organizations with access to DOE cyber systems report cyber ... September 5, 2013 V-235: Cisco Mobility Services Engine Configuration Error Lets Remote ...

  7. Microsoft Word - CNMSUG-Meeting_09-25-08_minutes_v2.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to let CNMS management know what improvements would be most helpful User proposal process improvements: CNMS is moving toward a joint, online, fully electronic submission...

  8. How to Apply

    Broader source: Energy.gov [DOE]

    Awards are made through a formal process that has changed dramatically since 2011. So let us walk you through it step by step.

  9. Monthly Performance Report

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Nationals Visit Cocooned Reactors - On November 17, 2015, ... SOEs flushed the line with sodium hypochlorite, let it sit ... truck assigned to WRPS's Fast facility maintenance group. ...

  10. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  11. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  12. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  13. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  14. DOE 2014 Biomass Conference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuels & Vehicle Standards * Let Free Markets Work - Mandates and subsidies ... (proposed) 100 250 500 1,000 1,750 3,000 Volume (Million Gallons) *Cellulosic production ...

  15. White House Highlights Two Energy-Slashing, Open Data Initiatives...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... The Buildings Performance Database lets users mine anonymous statistical data from real buildings that match a specific building characteristic profile, enabling real estate ...

  16. Celebrating and supporting women

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Workshop titles ranged from "Computational Thinking" and "Crystal Craziness" to "Sports Nutrition" and "Ocean Density, Currents and Ice." In the "Let's go to the River ...

  17. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain ... Authentication Bypass Vulnerability T-614: Cisco Unified Communications Manager ...

  18. Country-Fried Biofuels

    Broader source: Energy.gov [DOE]

    Instead of tossing your grease and used cooking oil, let a clean cities coordinator in your area help recycle it into biodiesel.

  19. Science Careers in Search of Women | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    now, and let us make our dreams tomorrow's reality." -Malala Yousafzai, 2014 Nobel Peace Prize Laurate Argonne Education, in conjunction with Women in Science and Technology,...

  20. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  1. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service ... Adapters Interface Processor Vulnerability V-135: Cisco ASA Multiple Bugs Let Remote ...

  2. Energy Efficiency Post-2011 Review Scoping Document and Process...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workgroups, please let BPA know in your submitted comments. I. Overview and Timeline The "Energy Efficiency Post-2011 Review" (Review) is a public process to review and consider...

  3. Pueblo of Laguna Utility Authority

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TRIBAL UTILITY KAWAIKA HANU INTERNET LET US GET YOU CONNECTED Kawaika Hanu is your local internet service provider offering high speed internet with competitive rates. ...

  4. QER- Comment of National Rural Electric Cooperative Association 4

    Broader source: Energy.gov [DOE]

    NRECA is submitting additional comments to supplement the one previously filed on October 3rd. Please let me know if you have any questions.

  5. EPA Launches 2014 National Building Competition

    Broader source: Energy.gov [DOE]

    Let the battle begin! The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014 National Building Competition.

  6. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  7. Slide 1

    Office of Environmental Management (EM)

    were to let a single contract for the whole decommissioning task. * Cost prohibitive ... still providing correct engagement 1. Black and white radiation tolerant multi-camera ...

  8. Fermilab F

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    please let us know. Sincerely, Michael Witherell Attachment cc: K. Stanfield H. Montgomery S. Holmes J. Appel Excerpt from April 2004 PAC Recommendations P-938 MINERA...

  9. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  10. Fiona Ginty | Inventors | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a new biomarker technology platform against multiple cancers. The Road Taken Culture, art, food and work have all let Fiona travel the world. And she's taken critical lessons...

  11. American Institute of Architects 2030 Commitment Enabled by Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    American Institute of Architects 2030 Commitment Enabled by Energy IQ - 2014 BTO Peer Review American ... More Documents & Publications The Design Data Exchange (DDx) lets 2030 ...

  12. Microsoft PowerPoint - PD_Mitlyng

    Office of Environmental Management (EM)

    offered on high-interest topics such as hurricane preparedness, seismic studies and Fukushima lessons learned * All Chats were archived Let's Chat: 9 8 * Very resource-intensive - ...

  13. Process development of thin strip steel casting

    SciTech Connect (OSTI)

    Sussman, R.C.; Williams, R.S.

    1990-12-01

    An important new frontier is being opened in steel processing with the emergence of thin strip casting. Casting steel directly to thin strip has enormous benefits in energy savings by potentially eliminating the need for hot reduction in a hot strip mill. This has been the driving force for numerous current research efforts into the direct strip casting of steel. The US Department of Energy initiated a program to evaluate the development of thin strip casting in the steel industry. In earlier phases of this program, planar flow casting on an experimental caster was studied by a team of engineers from Westinghouse Electric corporation and Armco Inc. A subsequent research program was designed as a fundamental and developmental study of both planar and melt overflow casting processes. This study was arranged as several separate and distinct tasks which were often completed by different teams of researchers. An early task was to design and build a water model to study fluid flow through different designs of planar flow casting nozzles. Another important task was mathematically modeling of melt overflow casting process. A mathematical solidification model for the formation of the strip in the melt overflow process was written. A study of the material and conditioning of casting substrates was made on the small wheel caster using the melt overflow casting process. This report discusses work on the development of thin steel casting.

  14. SLUDGE PARTICLE SEPAPATION EFFICIENCIES DURING SETTLER TANK RETRIEVAL INTO SCS-CON-230

    SciTech Connect (OSTI)

    DEARING JI; EPSTEIN M; PLYS MG

    2009-07-16

    The purpose of this document is to release, into the Hanford Document Control System, FA1/0991, Sludge Particle Separation Efficiencies for the Rectangular SCS-CON-230 Container, by M. Epstein and M. G. Plys, Fauske & Associates, LLC, June 2009. The Sludge Treatment Project (STP) will retrieve sludge from the 105-K West Integrated Water Treatment System (IWTS) Settler Tanks and transfer it to container SCS-CON-230 using the Settler Tank Retrieval System (STRS). The sludge will enter the container through two distributors. The container will have a filtration system that is designed to minimize the overflow of sludge fines from the container to the basin. FAI/09-91 was performed to quantify the effect of the STRS on sludge distribution inside of and overflow out of SCS-CON-230. Selected results of the analysis and a system description are discussed. The principal result of the analysis is that the STRS filtration system reduces the overflow of sludge from SCS-CON-230 to the basin by roughly a factor of 10. Some turbidity can be expected in the center bay where the container is located. The exact amount of overflow and subsequent turbidity is dependent on the density of the sludge (which will vary with location in the Settler Tanks) and the thermal gradient between the SCS-CON-230 and the basin. Attachment A presents the full analytical results. These results are applicable specifically to SCS-CON-230 and the STRS filtration system's expected operating duty cycles.

  15. Tailoring Pore Size of Nitrogen-Doped Hollow Carbon Nanospheres for Confi ning Sulfur in LithiumSulfur Batteries

    SciTech Connect (OSTI)

    Zhou, Weidong; Wang, Chong M.; Zhang, Quiglin; Abruna, Hector D.; He, Yang; Wang, Jiangwei; Mao, Scott X.; Xiao, Xingcheng

    2015-08-19

    Three types of nitrogen-doped hollow carbon spheres with different pore sized porous shells are prepared to investigate the performance of sulfur confinement. The reason that why no sulfur is observed in previous research is determined and it is successfully demonstrated that the sulfur/polysulfide will overflow the porous carbon during the lithiation process.

  16. Office of Wastewater Management catalog of publications

    SciTech Connect (OSTI)

    1998-09-01

    The contents include: Introduction; Categories of Documents (Biosolids; Construction Grants; Environmental Impact Statements; Federal Registers; Finance; Needs and Assessments; Operation and Maintenance; Permitting Issues; Pollution Prevention and Control; Pretreatment; Small Communities; Storm Water/Combined Sewer Overflows; Treatment; Water Conservation and Efficiency; Water Quality and Standards; and Miscellaneous); and Document Title Index.

  17. Low latency counter event indication

    DOE Patents [OSTI]

    Gara, Alan G.; Salapura, Valentina

    2010-08-24

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  18. Low latency counter event indication

    DOE Patents [OSTI]

    Gara, Alan G.; Salapura, Valentina

    2008-09-16

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  19. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  20. RangeTables.xls

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (MeVcmmg) LET vs. Range in Si for 25 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 600 1200 1800 2400 3000 3600 4 He 14 N 22 Ne 0 1 2 3 4 5 6 7 8 9 10 0 100 200 300 400 500...

  1. RangeTables.xlsx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vcmmg) LET vs. Range in Si for 15 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 200 400 600 800 1000 1200 1400 Range in Silicon (m) 4 He 14 N 20 Ne 0 1 2 3 4 5 0 50 100 150...

  2. Useful Graphs and Charts - Ion Beams - Radiation Effects Facility /

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyclotron Institute / Texas A&M University Ion Beams Available Beams / Beam Change Times / Measurements / Useful Graphs Useful Graphs and Charts LET vs. Range in Si Graphs: 15 MeV/u Beams 24.8 MeV/u Beams 40 MeV/u Beams Beam energy, Let and range in si at various air-gaps from rear foil: 15 MeV/u Beams 24.8 and 40 MeV/u Beams Quick Links Beam Characterization and verification Beam List Beam Change Times 15 MeV/u LET vs Range Graph 25 MeV/u LET vs Range Graph 40 Mev/u LET vs Range Graph

  3. Novel Binders and Methods for Agglomeration of Ore

    SciTech Connect (OSTI)

    S. K. Kawatra; T. C. Eisele; K. A. Lewandowski; J. A. Gurtler

    2006-12-31

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. Primary examples of this are copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process, and advanced ironmaking processes, where binders must function satisfactorily over an extraordinarily large range of temperatures (from room temperature up to over 1200 C). As a result, operators of many facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of a broad range of mineral agglomeration applications, particularly heap leaching and advanced primary ironmaking. This project has identified several acid-resistant binders and agglomeration procedures that can be used for improving the energy efficiency of heap leaching, by preventing the ''ponding'' and ''channeling'' effects that currently cause reduced recovery and extended leaching cycle times. Methods have also been developed for iron ore processing which are intended to improve the performance of pellet binders, and have directly saved energy by increasing filtration rates of the pelletization feed by as much as 23%.

  4. Indian Country Solar Energy Potential Estimates & DOE IE Updates

    Energy Savers [EERE]

    Roles in Renewable Energy Projects Colton Heaps National Renewable Energy Laboratory 1 Federal Tax Incentives * Production Tax Credit (PTC) * Investment Tax Credit (ITC) * Modified Accelerated Cost Recovery System (MACRS) and bonus depreciation 2 Comparison of Tax Incentives PTC ITC Accelerated Depreciation Value Tax credit of 2.3¢/kWh or 1.1¢/kWh, depending on tech Tax credit of 10% or 30% of project costs, depending on tech Depreciation of eligible costs (not all project costs qualify)

  5. Queuing and Running on BG/Q Systems FAQ | Argonne Leadership Computing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facility Queuing and Running on BG/Q Systems FAQ Contents Is there a limit on stack size? My job had empty stdout, and the stderr looks like it died immediately after it started. What happened? Where can I find the details of a job submission? Back to top Is there a limit on stack size? There is no strict limit on the stack size. The stack and heap grow towards each other until a collision occurs. If your job terminates with an error like this: ***FAULT Encountered unhandled signal

  6. Apparatus and method for continuous separation of magnetic particles from non-magnetic fluids

    DOE Patents [OSTI]

    Oder, Robin R.; Jamison, Russell E.

    2010-02-09

    A magnetic separator vessel (1) for separating magnetic particles from non-magnetic fluid includes a separation chamber having an interior and exterior wall, a top and bottom portion; a magnet (3) having first and second poles (2) positioned adjacent to the exterior wall, wherein the first pole is substantially diametrically opposed to the second pole; a inlet port (5) is directed into the top portion of the separation chamber, wherein the inlet port (5) is positioned adjacent to one of the first and second poles (2), wherein the inlet port (5) is adapted to transfer a mixture into the separation chamber; an underflow port (6) in communication with the bottom portion, wherein the underflow port (6) is adapted to receive the magnetic particles; and an overflow port (9) in communication with the separation chamber, wherein the overflow port (9) is adapted to receive the non-magnetic fluid.

  7. Device and method for automated separation of a sample of whole blood into aliquots

    DOE Patents [OSTI]

    Burtis, Carl A.; Johnson, Wayne F.

    1989-01-01

    A device and a method for automated processing and separation of an unmeasured sample of whole blood into multiple aliquots of plasma. Capillaries are radially oriented on a rotor, with the rotor defining a sample chamber, transfer channels, overflow chamber, overflow channel, vent channel, cell chambers, and processing chambers. A sample of whole blood is placed in the sample chamber, and when the rotor is rotated, the blood moves outward through the transfer channels to the processing chambers where the blood is centrifugally separated into a solid cellular component and a liquid plasma component. When the rotor speed is decreased, the plasma component backfills the capillaries resulting in uniform aliquots of plasma which may be used for subsequent analytical procedures.

  8. Inquiring Minds - Questions About Physics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Getting particles for the accelerator Hi I am 11 and my name is Joshua Pevitz. When I grow up I want to work at Fermilab. I was wondering if you could explain to me about how you let only one atom in the accelerator, if everything is made out of atoms? Your admirer, Joshua Pevitz Dear Joshua, Thanks for your interesting question! Let me give you the simple answer first, and then I will explain. We do not let only one atom at a time into the accelerator. Instead we have more than 10 trillion

  9. System for measuring temporal profiles of scintillation at high and different linear energy transfers by using pulsed ion beams

    SciTech Connect (OSTI)

    Koshimizu, Masanori Asai, Keisuke; Kurashima, Satoshi; Taguchi, Mitsumasa; Kimura, Atsushi; Iwamatsu, Kazuhiro

    2015-01-15

    We have developed a system for measuring the temporal profiles of scintillation at high linear energy transfer (LET) by using pulsed ion beams from a cyclotron. The half width at half maximum time resolution was estimated to be 1.52.2 ns, which we attributed mainly to the duration of the pulsed ion beam and timing jitter between the trigger signal and the arrival of the ion pulse. The temporal profiles of scintillation of BaF{sub 2} at different LETs were successfully observed. These results indicate that the proposed system is a powerful tool for analyzing the LET effects in temporal profiles of scintillation.

  10. NOVEL BINDERS AND METHODS FOR AGGLOMERATION OF ORE

    SciTech Connect (OSTI)

    S.K. Kawatra; T.C. Eisele; J.A. Gurtler; C.A. Hardison; K. Lewandowski

    2004-04-01

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. Primary examples of this are copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process, and advanced ironmaking processes, where binders must function satisfactorily over an extraordinarily large range of temperatures (from room temperature up to over 1200 C). As a result, operators of many facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of a broad range of mineral agglomeration applications, particularly heap leaching and advanced primary ironmaking.

  11. Novel Binders and Methods for Agglomeration of Ore

    SciTech Connect (OSTI)

    S. K. Kawatra; T. C. Eisele; J. A. Gurtler

    2004-03-31

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. A primary example of this is copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process. As a result, operators of acidic heap-leach facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of other agglomeration applications, particularly advanced primary ironmaking.

  12. WTP Calculation Sheet: Determining the LAW Glass Former Constituents and Amounts for G2 and Acm Models. 24590-LAW-M4C-LFP-00002, Rev. B

    SciTech Connect (OSTI)

    Gimpel, Rodney F.; Kruger, Albert A.

    2013-12-16

    The purpose of this calculation is to determine the LAW glass former recipe and additives with their respective amounts. The methodology and equations contained herein are to be used in the G2 and ACM models until better information is supplied by R&T efforts. This revision includes calculations that determines the mass and volume of the bulk chemicals/minerals needed per batch. Plus, it contains calculations (for the G2 model) to help prevent overflow in LAW Feed Preparation Vessel.

  13. LIQUID CYCLONE CONTACTOR

    DOE Patents [OSTI]

    Whatley, M.E.; Woods, W.M.

    1962-09-01

    This invention relates to liquid-liquid extraction systems. The invention, an improved hydroclone system, comprises a series of serially connected, axially aligned hydroclones, each of which is provided with an axially aligned overflow chamber. The chambers are so arranged that rotational motion of a fluid being passed through the system is not lost in passing from chamber to chamber; consequently, this system is highly efficient in contacting and separating two immiscible liquids. (AEC)

  14. 17th Annual ALS Users' Association Meeting

    SciTech Connect (OSTI)

    Robinson, Art; Tamura, Lori

    2004-11-29

    It's not exactly Russian roulette, but scheduling October events outdoors is not risk-free, even in usually sunny California. An overflow crowd of more than 400 registered users, ALS staff, and vendors enjoyed a full indoor program featuring science highlights and workshops spread over two and a half days from October 18 to October 20. However, a major storm, heralding the onset of the San Francisco Bay Area rainy season, posed a few weather challenges for the events on the ALS patio.

  15. Nuclear waste solidification

    DOE Patents [OSTI]

    Bjorklund, William J.

    1977-01-01

    High level liquid waste solidification is achieved on a continuous basis by atomizing the liquid waste and introducing the atomized liquid waste into a reaction chamber including a fluidized, heated inert bed to effect calcination of the atomized waste and removal of the calcined waste by overflow removal and by attrition and elutriation from the reaction chamber, and feeding additional inert bed particles to the fluidized bed to maintain the inert bed composition.

  16. Mass-loss evolution of close-in exoplanets: Evaporation of hot Jupiters and the effect on population

    SciTech Connect (OSTI)

    Kurokawa, H.; Nakamoto, T.

    2014-03-01

    During their evolution, short-period exoplanets may lose envelope mass through atmospheric escape owing to intense X-ray and extreme ultraviolet (XUV) radiation from their host stars. Roche-lobe overflow induced by orbital evolution or intense atmospheric escape can also contribute to mass loss. To study the effects of mass loss on inner planet populations, we calculate the evolution of hot Jupiters considering mass loss of their envelopes and thermal contraction. Mass loss is assumed to occur through XUV-driven atmospheric escape and the following Roche-lobe overflow. The runaway effect of mass loss results in a dichotomy of populations: hot Jupiters that retain their envelopes and super Earths whose envelopes are completely lost. Evolution primarily depends on the core masses of planets and only slightly on migration history. In hot Jupiters with small cores (? 10 Earth masses), runaway atmospheric escape followed by Roche-lobe overflow may create sub-Jupiter deserts, as observed in both mass and radius distributions of planetary populations. Comparing our results with formation scenarios and observed exoplanets populations, we propose that populations of closely orbiting exoplanets are formed by capturing planets at/inside the inner edges of protoplanetary disks and subsequent evaporation of sub-Jupiters.

  17. Floodplain and Wetland Assessment and Statement of Findings

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... AGENCY COMMENT LETTERS Smith, Robert From: Ross Klopf rklopf@co.jefferson.co.us Sent: ... Please let me know if you have any questions. Kind Regards, Ross Klopf, PE, CFM, Civil ...

  18. U

    National Nuclear Security Administration (NNSA)

    The NMMSS would like to host another SAMS training class in Atlanta, GA. If you have a serious interest in attending a two-day SAMS for Windows training class, please let us know ...

  19. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    14, 13 Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 2...

  20. X marks the spot: Researchers confirm novel method for controlling...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    much like changing the settings on iTunes or a stereo lets one explore the behavior of music. This discovery gives fusion researchers a tool to access different intrinsic rotation...

  1. Y-12 and the National Park Service study, part 2 -- Or: Manhattan...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    as it appeared in The Oak Ridger) Let's continue with the details of the National Park Service's and the Atomic Heritage Foundation's visit to Y-12 during the last week of...

  2. E-Verify If you have the Right to Work Poster (English)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IF YOU HAVE THE RIGHT TO WORK, Don't let anyone take it away. If you have a legal right to work in the United States, there are laws to protect you against discrimination in the...

  3. QER- Comment of Pepco Holdings, Inc. 2

    Broader source: Energy.gov [DOE]

    Karen: Here are some of our initial thoughts on vulnerability questions for you to consider. Please let me know if you have other specific topics you want us to consider right now.

  4. Microsoft Word - All Discounts updated January 2016

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... may be applied to any pre-owned car, truck, van or sport utility vehicle in stock. ... Did you know Sprint ranks 3 among the 500 Greenest Companies in America? Let us take your ...

  5. OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...

    Office of Scientific and Technical Information (OSTI)

    Let's call it creative destruction, borrowing from a popular term in economics. The idea is that the very essence of capitalism is the destruction of old structures and the ...

  6. Investments in Existing Hydropower Unlock More Clean Energy ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dedicated on August 7, Tacoma Power's Cushman Dam No. 2 features an innovative fish ... In addition, the modern turbine and generators will be more reliable and let fish pass ...

  7. Y-12s Moon Box ? a big hit in Texas

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    not rub against anything that would mar its shiny finish. Then off it went to Texas. In planning this trip, I first considered shipping the Moon Box, but I did not want to let it...

  8. OAK GROVE C OAL D EGAS CEDAR COVE COAL D EGAS BLU E CREEK COAL...

    U.S. Energy Information Administration (EIA) Indexed Site

    NETT LET ON ABERD EEN E TAYLOR CREEK COAL DEGAS HAMILTON S GIBSON LITT LE H ELLS CREEK WAT ... NEW HOPE AMORY BIN ION CREEK TANYARD C REEK HAMILTONMSD WH ITES SH ANNON E RPDTU ...

  9. Pontotoc Co. Greene Co. Hale Co. OAK GROVE C OAL D EGAS CEDAR...

    U.S. Energy Information Administration (EIA) Indexed Site

    NETT LET ON ABERD EEN E TAYLOR CREEK COAL DEGAS HAMILTON S GIBSON LITT LE H ELLS CREEK WAT ... NEW HOPE AMORY BIN ION CREEK TANYARD C REEK HAMILTONMSD WH ITES SH ANNON E RPDTU ...

  10. Secretary of Energy Ernest Moniz's Remarks at a National Press...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and address the serious issues surrounding climate change. ... parts of the energy system, let me return to the ... 50 percent in Class 8 trucks: heavy-duty long-haul trucks. ...

  11. DOE Tour of Zero: The Johns Island Custom by Amerisips Homes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    low-cost comfort. 15 of 26 Professionally installed high-performance windows let in light but keep out heat. 16 of 26 The air-to-water heat pump is integrated with a...

  12. In Other News

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    we're asking you to take a few minutes out of your super-busy day to let us know what you think of Connections. We're interested in hearing your thoughts about the length of the...

  13. Microsoft PowerPoint - ACTIVE_NYC_2006_1.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ros bud sir bir 16 16.5 17 17.5 18 18.5 -65 -60 -55 -50 -45 -40 T ( C) TIME (hrs) Emerald-2 Anvil microphysics? * Recent theory lets us describe the freezing of soluble...

  14. How High Up Is That Place? How Far In The Future Is That Event...

    Office of Scientific and Technical Information (OSTI)

    B. How high are those balloons? To begin our analogy, let's say you and your family have stopped at a restaurant. While you're there, you notice a couple of hot air balloons, one ...

  15. User-Friendly Model Puts Solar Energy in Your Backyard | OpenEI...

    Open Energy Info (EERE)

    a photovoltaic (PV) system for your home or property, check out the National Renewable Energy Laboratory's In My Backyard (IMBY) tool. It's quick, useful, and-let's just say...

  16. Spring into Energy Savings | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    As the days become longer, consider opening the curtains in your home to let in more natural light for indoor illumination. This is an especially useful tip if you haven't yet had ...

  17. BBAP ???for EH-53 v2.0

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security personnel Do not let your truck idle for more than 3 min (unless it is a concrete truck and pumper) Properly maintain and inspect your truck(s) daily for safety issues...

  18. Nature template - PC Word 97

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A few exceptions include the second law of thermodynamics, which states that entropy must ... To better understand this effect, let us start with a non-magnetic uniaxial anisotropic ...

  19. Women @ Energy: Terri Quinn

    Broader source: Energy.gov [DOE]

    "My advice for women and girls is to don’t let others erode your confidence in your abilities. You have every right to be who you want to be and to pursue whatever career that interests you."

  20. Site Tours Performance Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... The first summer we gave him the tour and let him watch a ... The 2013 Educators Appreciation Day and Back to School Fair ... which will be held on Aug. 22, at the Mirage Hotel & Casino ...

  1. I Love Saving Money and Energy | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Laboratory Valentine's Day is all about love-and I love all the quick and easy ways to save money and energy at home How much do I love saving energy and money? Let me count...

  2. How Do Holiday Lights Work? | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... While shunts serve to remedy an open circuit, fuses work to prevent damage due to a short ... of holiday lights, let's address some common problems we run into and how to remedy them. ...

  3. Energy Department Sets Tougher Standards for Clothes Washers to Qualify for the ENERGY STAR® Label

    Broader source: Energy.gov [DOE]

    WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced tougher standards for clothes washers to qualify for the ENERGY STAR® label, which lets American families identify which clothes...

  4. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a DoS (Denial of Service), and compromise a user's system. February 14, 2013 V-091: Adobe AcrobatReader Bug Lets Remote Users Execute Arbitrary Code Adobe has identified...

  5. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A vulnerability was reported in McAfee VirusScan Enterprise. February 27, 2013 V-100: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  6. Text-Alternative Version of High Performance Space Conditioning...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... With Aeroseal there was a flat rate because it is basically ... to streamline the Aeroseal system with these types of units. ... So if I have 1,000 square foot crawl space, let's say, ...

  7. Solar Decathlon Opening | Department of Energy

    Office of Environmental Management (EM)

    Solar Decathlon Opening Solar Decathlon Opening October 6, 2005 - 12:25pm Addthis Remarks Prepared for Energy Secretary Bodman Let me begin by welcoming all of you to this Solar...

  8. BPA-2012-00183-CRequest

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information is needed to fulfill this request, please let me know. Thank you, Richard van Dijk Another Way BRA P0 Box 820152 Vancouver, WA 98682 360.453.7260 richard@alderspur.com...

  9. Segment of Smithsonian Video history interview - December 1987

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The interviewees were George M. Banic, Jr., John M. Googin, Chris P. Keim, Clarence Larson and Robert S. Livingston. Before looking at the specific interviews let's learn a bit...

  10. ZERH Logo Use Guidelines

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Energy Ready Home marks in an unapproved color. 14. Do not let text run into the mark. ... used in any other company name, product name, service name, domain name or Web site title. ...

  11. V-139: Cisco Network Admission Control Input Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A...

  12. Federal Energy Management Program News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    energy projects. July 18, 2014 EPA Launches 2014 National Building Competition Let the battle begin The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014...

  13. Round Table Meeting Summaries Purchase Order: DE-IE0000002 Final...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Energy is not really rocket science. Feds love planning and new technology. Let's finance ... NEPA issues, they just concurred with BIA finding, and the BIA handled them very quickly. ...

  14. National Coal Council Meeting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    But let me return specifically to the issue of coal, where I think it is important to discuss the term, "clean coal." It is a term that is used often in the lexicon of the industry ...

  15. Energy Saver 101: Home Cooling Infographic | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    While home cooling only accounts for 6 percent of the average home's energy use, it can lead to high energy bills during the warm months. This summer, don't let your energy bills...

  16. 2015 PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Craig, Ernst, Lisa OutagesDowntimes None Upcoming Downtimes February 11 all day maintenance Other Issues Would like to retire SL53, please let Lisa know who's still using it...

  17. Remarks by Secretary Moniz to the American Association for the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... They are essential links in the Nation's innovation chain. Each has distinctive ... Let me share with you what we have done at DOE to reverse this trend. The reports ...

  18. Social poster.pdf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at the bar. Let's be social Wednesday, 7 October 2015 5:00 - 7:00 PM Users' Center Music Room Contributions of food are welcome, and we encourage you to share your recipe for...

  19. Test Your Energy Knowledge with Our Bioenergy Quiz

    Broader source: Energy.gov [DOE]

    We are very excited to announce our first ever bioenergy quiz—an online, interactive tool that’s both enlightening and entertaining! Interested in participating? Just click the link in the photo above and let the game begin.

  20. Pacific Northwest Smart Grid Demonstration Project SUCCESS STORIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering. "Knowing there was an aging issue with one cable, we thought: let's look at demand response to reduce the load." Failing cable leads to fast launch By September 2010,...

  1. Do we get actual vendor name while we searched with zip code...

    Open Energy Info (EERE)

    let me know? Submitted by SUTHARI on 29 September, 2014 - 08:02 1 answer Points: 0 Hi SUTHARI, we had a bug in the U.S. Utility Rate Database affecting zip codes with leading...

  2. SANDIA REPORT SAND98-0260 UC-705 Unlimited Release

    Office of Scientific and Technical Information (OSTI)

    ... Let Yo, represent the stress components (1 to 6) for mode i , evaluated at node b . The "stress modes" are standard output from most FEA modal analysis codes (such as the grid ...

  3. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python...

  4. Renewable Energy, Right in Your Back Yard | OpenEI Community

    Open Energy Info (EERE)

    select from "solar" or "wind" energy. Under solar, the application lets you draw your own solar panel square on the roof, input a few values (size, derating, tilt angle, Azimuth...

  5. OSTIblog Posts by Dr. Jeffrey Salmon | OSTI, US Dept of Energy...

    Office of Scientific and Technical Information (OSTI)

    ... And some material, let's face it, isn't worth saving. Between this blog and Archimedes' method of mechanical theorems, the work that SLAC was looking at, which would you save? What ...

  6. BPA-2012-00477-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Zehntbauer,Nicole R - TERG-3 Subject: Troutdale Substation dgn on Sharepoint Site Hello Let me know if you have any problems viewing the data. Thanks, Anne Anne K. Hillyer,...

  7. Geocoded Data | OpenEI Community

    Open Energy Info (EERE)

    Geocoded Data Home > Groups > OpenEI Community Central Hello there open energy community Thank you for the openness in letting me join :) I was searching the open source data...

  8. TABLE OF CONTENTS SECTION A: PREINTERVIEW OBSERVATION

    U.S. Energy Information Administration (EIA) Indexed Site

    USED" ON THE FOLDOUT PAGE. CIRCLE EACH "YES" OR "NO.") ELECTRICIT Y J-3. Now, let's talk about electricity. I have circled that electricity is used for (READ EACH USE CIRCLED...

  9. University of Wisconsin-Madison Video (Text Version) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dave Toso, MGE Senior Engineer: Let's get this technology ... John Shaw, EV driver: We love the public network. It's ... and so we went to MGE to talk to them about what can we ...

  10. Fermilab Today

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the MINOS building. Don't let yourself be too attracted by them, though: Coralberry is an invasive species. Photo: Prabhjot Singh, University of Delhi In the News GBN students test...

  11. Episode 1: Tackling the Hidden Costs of Rooftop Solar | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Well, I thought those were great, and frankly, we can just let the public be the judge. LANTERO: How about you keep brainstorming. WOOD: I understand. I'll get back to the drawing ...

  12. 5 Million Reasons for Communities to Lower Their Energy Use ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Follow along all week on Twitter, Facebook, Instagram and Google+, and let us know how you ActOnClimate. From Fairbanks, Alaska, to Roanoke, Virginia, communities across America ...

  13. Microsoft Word - Another Way BPA, Request No. HQ-2012-01166-F...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    b5. If you need to see those, let me know. chris -----Original Message----- From: Fishman, Janet Sent: Wednesday, May 30, 2012 1:38 PM To: Morris, Alexander; Washington,...

  14. Solar Decathlon Opening | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Opening Solar Decathlon Opening October 6, 2005 - 12:25pm Addthis Remarks Prepared for Energy Secretary Bodman Let me begin by welcoming all of you to this Solar Decathlon. I want ...

  15. Energy 101: Daylighting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    101. Through strategic placement of windows and skylights, daylighting maximizes the ... For example, south-facing windows work best in the U.S. to let in the most sun during ...

  16. Purchasing Energy-Efficient Windows | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Purchasing Energy-Efficient Windows Purchasing Energy-Efficient Windows October 13, 2008 - 11:29am Addthis John Lippert Windows connect us with the "great outdoors." They let in ...

  17. Employee Spotlight: Dave Keller

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    what seems like another owl prompts them to respond, letting the visitor know that the space is already occupied. Dave Keller with bird From the end of March into early May,...

  18. Employee Spotlight: Dave Keller

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    what seems like another owl prompts them to respond, letting the visitor know that the space is already occupied. From the end of March into early May, near the beginning of the...

  19. NEPA Documentation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of a general NEPA briefing provided to the Acting Deputy Secretary in May 2008. Please let me know if you have any further questions (carol.borgstrom @hq.doe.gov; 202-586-4600). ...

  20. NEPA Documentation

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a general NEPA briefing provided to the Acting Deputy Secretary in May 2008. Please let ... Briefing for Jeffrey Kupfer, Acting Deputy Secretary May 2, 2008 Office of NEPA Policy and ...

  1. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling...

  2. Financial Times-World Energy Council Energy Leaders Summit |...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aggressive action to achieve, is indeed critically important. First, let's look at our heavy reliance on oil. The growth in world oil consumption has been averaging about 1.8...

  3. How the Membrane Protein AmtB Transports Ammonia

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the uncharged NH3 "gas." A Doorway for Letting Ammonia into Cells Like any factory, a biological cell takes in raw materials and energy and expels waste products. What goes in...

  4. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    ... energy and momentum transfer ranges as IN5 at ILL, LET at ISIS, DCS at NIST, TOFTOF at FRM-II, AMATERAS at J-PARC, PHAROS at LANSCE, and NEAT at HZB, at similar energy resolution. ...

  5. BPA-2015-01325-FOIA Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Batista de Campos, 285 - Pq. Industrial Bandeirantes II Maring, PR CEP: 87070-080 - Brazil Please let me know if you need anything else. Xi Heverton F. Alto Engenharia Rua...

  6. BPA-2015-01157-FOIA Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Kraby, David Sent: Monday, April 13, 2015 10:02 AM To: Winn,Kim S (BPA) - CGC-131 Subject: RE: Your Freedom of Information Act Request Thanks Lets only...

  7. QER- Comment of America's Natural Gas Alliance 3

    Broader source: Energy.gov [DOE]

    Apologies – please use this version Karen & John – Please see attached ANGA comments on the QER for Pittsburgh & ND. I had attempted to send these on Friday but just got a bounceback. My sincere apologies as this may have been on our end. Please let me know if this is a problem. Thank you very much and please let me know if you have any questions.

  8. Letter from James Ajello, Chair, to Acting Assistant Secretary Inᅢᄅs Triay

    Office of Environmental Management (EM)

    Energy Let's Try That Again: Selling the Teapot Dome Oil Field Let's Try That Again: Selling the Teapot Dome Oil Field January 30, 2015 - 11:28am Addthis A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In 1922, President Warren Harding's Interior Secretary Albert Fall found

  9. Letchworth-Weaver awarded 2015 Argonne National Lab Fellowship > EMC2 News

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Let's Try That Again: Selling the Teapot Dome Oil Field Let's Try That Again: Selling the Teapot Dome Oil Field January 30, 2015 - 11:28am Addthis A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In 1922, President Warren Harding's Interior Secretary Albert Fall found

  10. AIA 2030 Commitment Portal | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AIA 2030 Commitment Portal AIA 2030 Commitment Portal The Design Data Exchange (DDx) lets 2030 Commitment firms track their own projects and report them to the AIA. It also lets firms query the entire 2030 database to learn about the performance of different types of projects. Firms can see their own projects superimposed on those of other firms. Whereas their own projects can be expanded, those of other firms remain anonymized. This research screen focuses on LEED office buildings under 500,000

  11. WE-E-BRE-07: High-Throughput Mapping of Proton Biologic Effect

    SciTech Connect (OSTI)

    Bronk, L; Guan, F; Kerr, M; Dinh, J; Titt, U; Mirkovic, D; Lin, S; Mohan, R; Grosshans, D

    2014-06-15

    Purpose: To systematically relate the relative biological effectives (RBE) of proton therapy to beam linear energy transfer (LET) and dose. Methods: Using a custom irradiation apparatus previously characterized by our group, H460 NSCLCs were irradiated using a clinical 80MeV spot scanning proton beam. Utilizing this system allowed for high-throughput clonogenic assays performed in 96-well tissue culture plates as opposed to the traditional 6-well technique. Each column in the 96-well plate received a set LET-dose combination. By altering the total number of dose repaintings, numerous dose-LET configurations were examined to effectively generate surviving fraction (SF) data over the entire Bragg peak. The clonogenic assay was performed post-irradiation using an INCell Analyzer for colony quantification. SF data were fit to the linear-quadratic model for analysis. Results: Irradiation with increasing LETs resulted in decreased cell survival largely independent of dose. A significant correlation between LET and SF was identified by two-way ANOVA and the extra sum-of-squares F test. This trend was obscured at the lower LET values in the plateau region of the Bragg peak; however, it was clear for LET values at and beyond the Bragg peak. Data fits revealed the SF at a dose of 2Gy (SF2) to be 0.48 for the lowest tested LET (1.55keV/um), 0.47 at the end of the plateau region (4.74keV/um) and 0.33 for protons at the Bragg peak (10.35keV/um). Beyond the Bragg peak we measured SF2s of 0.16 for 15.01keV/um, 0.02 for 16.79keV/um, and 0.004 for 18.06keV/um. Conclusion: We have shown that our methodology enables high-content automated screening for proton irradiations over a range of LETs. The observed decrease in cellular SF in high LET regions confirms an increased RBE of the radiation and suggests further evaluation of proton RBE values is necessary to optimize clinical outcomes. Rosalie B. Hite Graduate Fellowship in Cancer Research, NIH Program Project Grant P01CA021239.

  12. Vessel network detection using contour evolution and color components

    SciTech Connect (OSTI)

    Ushizima, Daniela; Medeiros, Fatima; Cuadros, Jorge; Martins, Charles

    2011-06-22

    Automated retinal screening relies on vasculature segmentation before the identification of other anatomical structures of the retina. Vasculature extraction can also be input to image quality ranking, neovascularization detection and image registration, among other applications. There is an extensive literature related to this problem, often excluding the inherent heterogeneity of ophthalmic clinical images. The contribution of this paper relies on an algorithm using front propagation to segment the vessel network. The algorithm includes a penalty in the wait queue on the fast marching heap to minimize leakage of the evolving interface. The method requires no manual labeling, a minimum number of parameters and it is capable of segmenting color ocular fundus images in real scenarios, where multi-ethnicity and brightness variations are parts of the problem.

  13. Expansion capacity of an SX unit in uranium process pilot tests

    SciTech Connect (OSTI)

    Courtaud, B.; Auger, F.; Morel, P.

    2008-07-01

    The rising price of uranium has led uranium producers to increase their plant capacity. The new project proposed to increase capacity is based on processing low-grade uranium by heap leaching. It is necessary to modify the plant, particularly the solvent extraction unit, to handle the increased flow. The goal of our study is to determine the minimal changes necessary to process the whole flow. Several stages have been carried out (i) thermodynamic modelling of the solvent extraction process to determine the capacities of the SX plant and the impact of the modification and (ii) pilot tests at the plant of the different configurations proposed by modelling. This paper presents results of the pilot tests performed at the plant. (authors)

  14. Use of solvent extraction technique in Brazilian uranium mills - an overview

    SciTech Connect (OSTI)

    Gomiero, Luiz A.

    2008-07-01

    Solvent extraction has been applied to uranium-concentrate production in Brazil. At the first plant, uranium minerals associated with Zr and Mo were acid leached. Extraction was carried out by a mixture of Alamine 336 and Alamine 304, followed by selective Zr, U, and Mo stripping. At the currently operating facilities, a single U mineral is processed by acid heap leaching. Uranium is extracted with Alamine 336 and stripped with NaCl solution. As all water is recycled, chloride contents in the liquor have increased, causing detrimental effects to the extraction process. The current plant operating conditions and the improvements arisen from the research developed to solve these problems are presented. (authors)

  15. Rapid ignition of fluidized bed boiler

    DOE Patents [OSTI]

    Osborn, Liman D.

    1976-12-14

    A fluidized bed boiler is started up by directing into the static bed of inert and carbonaceous granules a downwardly angled burner so that the hot gases cause spouting. Air is introduced into the bed at a rate insufficient to fluidize the entire bed. Three regions are now formed in the bed, a region of lowest gas resistance, a fluidized region and a static region with a mobile region at the interface of the fluidized and static regions. Particles are transferred by the spouting action to form a conical heap with the carbonaceous granules concentrated at the top. The hot burner gases ignite the carbonaceous matter on the top of the bed which becomes distributed in the bed by the spouting action and bed movement. Thereafter the rate of air introduction is increased to fluidize the entire bed, the spouter/burner is shut off, and the entire fluidized bed is ignited.

  16. Rhizosphere effect of colonizer plant species on the development of soil microbial community during primary succession on postmining sites

    SciTech Connect (OSTI)

    Elhottova, D.; Kristufek, V.; Maly, S.; Frouz, J.

    2009-07-01

    The impact of pioneer plant species Tussilago farfara on structural, functional, and growth characterization of microbial community colonizing the spoil colliery substrate was studied in a laboratory microcosm experiment. Microcosms consisting of spoil substrate (0.7 dm{sup 3} of tertiary alkaline clay sediment from Sokolov brown-coal mine area) from a pioneer site (without vegetation, 5 years after heaping) were cultivated in a greenhouse with one plant of this species. Plant roots substantially increased microbial diversity and biomass after one season (7 months) of cultivation. Roots influenced the microbial community and had nearly twice the size, higher growth, and metabolic potential in comparison to the control. The development of microbial specialists improves the plant nutrient status. Bacterial nitrogen (N{sub 2}) fixators (Bradyrhizobium japonicum, Rhizobium radiobacter) and arbuscular mycorrhizal fungi were confirmed in the rhizosphere of Tussilago farfara.

  17. Engineering assessment of inactive uranium mill tailings: Mexican Hat Site, Mexican Hat, Utah

    SciTech Connect (OSTI)

    1981-09-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Mexican Hat site in order to revise the March 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Mexican Hat, Utah. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 2.2 million tons of tailings at the Mexican Hat site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The four alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of stabilization cover material to removal of the tailings to remote disposal sites and decontamination of the tailings site. Cost estimates for the four options range from about $15,200,000 for stabilization in place, to about $45,500,000 for disposal at a distance of about 16 mi. Three principal alternatives for the reprocessing of the Mexican Hat tailings were examined: heap leaching; treatment at an existing mill; and reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $115/lb of U/sub 3/O/sub 8/ whether by heap leach or conventional plant processes. The spot market price for uranium was $25/lb early in 1981. Reprocessing the Mexican Hat tailings for uranium recovery is not economically attractive under present conditions.

  18. Engineering assessment of inactive uranium mill tailings

    SciTech Connect (OSTI)

    Not Available

    1981-07-01

    The Grand Junction site has been reevaluated in order to revise the October 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Grand Junction, Colorado. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 1.9 million tons of tailings at the Grand Junction site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation are also factors. The eight alternative actions presented herein range from millsite and off-site decontamination with the addition of 3 m of stabilization cover material (Option I), to removal of the tailings to remote disposal sites and decontamination of the tailings site (Options II through VIII). Cost estimates for the eight options range from about $10,200,000 for stabilization in-place to about $39,500,000 for disposal in the DeBeque area, at a distance of about 35 mi, using transportation by rail. If transportation to DeBeque were by truck, the cost estimated to be about $41,900,000. Three principal alternatives for the reprocessing of the Grand Junction tailings were examined: (a) heap leaching; (b) treatment at an existing mill; and (c) reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $200/lb by heap leach and $150/lb by conventional plant processes. The spot market price for uranium was $25/lb early in 1981. Therefore, reprocessing the tailings for uranium recovery appears not to be economically attractive.

  19. Summary of the engineering assessment of inactive uranium mill tailings, Shiprock Site, Shiprock, New Mexico

    SciTech Connect (OSTI)

    1981-07-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Shiprock site in order to revise the March 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Shiprock, New Mexico. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 1.5 million dry tons of tailings at the Shiprock site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The eight alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of the stabilization cover material (Option I), to removal of the tailings to remote disposal sites and decontamination of the tailings site (Options II through VIII). Cost estimates for the eight options range from about $13,400,000 for stabilization in place to about $37,900,000 for disposal at a distance of about 16 miles. Three principal alternatives for the reprocessing of the Shiprock tailings were examined: (a) heap leaching; (b) treatment at an existing mill; and(c) reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $230/lb by heap leach and $250/lb by conventional plant processes. The spot market price for uranium was $25/lb early in 1981. Therefore, reprocessing the tailings for uranium recovery is not economically attractive.

  20. Engineering assessment of inactive uranium mill tailings: Maybell Site, Maybell, Colorado

    SciTech Connect (OSTI)

    1981-09-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Maybell site in order to revise the October 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Maybell, Colorado. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 2.6 million dry tons of tailings at the Maybell site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The two alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of stabilization cover material (Option I), to disposal of the tailings in a nearby open pit mine and decontamination of the tailings site (Option II). Cost estimates for the two options are about $11,700,000 for stabilization in-place and about $22,700,000 for disposal within a distance of 2 mi. Three principal alternatives for the reprocessing of the Maybell tailings were examined: (a) heap leaching; (b) treatment at an existing mill; and (c) reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $125 and $165/lb of U/sub 3/O/sub 8/ by heap leach and conventional plant processes, respectively. The spot market price for uranium was $25/lb early in 1981. Therefore, reprocessing the tailings for uranium recovery is not economically attractive at present.