Sample records for heap overflow lets

  1. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Energy Savers [EERE]

    T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

  2. T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

  3. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  4. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Broader source: Energy.gov (indexed) [DOE]

    RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were...

  5. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Energy Savers [EERE]

    a fix. Addthis Related Articles T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-196: Cisco...

  6. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  7. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |Microsoft pulls

  8. U-178: VMware vMA Library Loading Error Lets Local Users Gain...

    Broader source: Energy.gov (indexed) [DOE]

    Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges...

  9. A Taxonomy of Buffer Overflows for Evaluating Static and Dynamic Software Testing Tools*

    E-Print Network [OSTI]

    A Taxonomy of Buffer Overflows for Evaluating Static and Dynamic Software Testing Tools* Kendra Phone: 7819812711 Email: LIPPMANN@LL.MIT.EDU ABSTRACT A taxonomy that uses 22 attributes detection tools. Attributes in the taxonomy include the buffer location (e.g. stack, heap, data

  10. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  11. T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

  12. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Energy Savers [EERE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  13. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  14. U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Lifecycle Attachmate Downloads SecurityTracker Alert ID: 1026340 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Attachmate Reflection. A remote user...

  15. Concurrent Garbage Collection of Persistent Heaps

    E-Print Network [OSTI]

    Concurrent Garbage Collection of Persistent Heaps Scott Nettles James O'Toole y David Gifford y.S. Government. #12; Keywords: persistence, transaction processing, garbage collection, copying garbage collection, concurrent garbage collection, replication copying garbage collection #12; Abstract We describe

  16. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

  17. On-line construction of position heaps Gregory Kucherov

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On-line construction of position heaps Gregory Kucherov Abstract We propose a simple linear-time on-line algorithm for constructing a po- sition heap for a string [EMOW11]. Our definition of position heap differs order of length. Our construction is based on classic suffix pointers and resembles the Ukkonen

  18. heap height (ft) box height (ft)

    E-Print Network [OSTI]

    heap height (ft) box height (ft) width (ft) length (ft) Best Environmental Management Practices it analyzed to determine the nutrient content of each sample; and 4. Calculate the amount of manure rates and patterns, depending on speed and/or power take-off (PTO) speed, gearbox settings, gate

  19. Formation and transportation of sand-heap in an inclined and vertically vibrated container

    E-Print Network [OSTI]

    Guoqing Miao; Kai Huang; Yi Yun; Peng Zhang; Weizhong Chen; Xinlong Wang; Rongjue Wei

    2005-11-29T23:59:59.000Z

    We report the experimental findings of formation and motion of heap in granular materials in an inclined and vertically vibrated container. We show experimentally how the transport velocity of heap up container is related to the driving acceleration as well as the driving frequency of exciter. An analogous experiment was performed with a heap-shaped Plexiglas block. We propose that cohesion force resulted from pressure gradient in ambient gas plays a crucial role in enhancing and maintaining a heap, and ratchet effect causes the movement of the heap. An equation which governs the transport velocity of the heap is presented.

  20. Separation Logic with First-Class Heaps and a New Frame Rule Duc-Hiep Chu

    E-Print Network [OSTI]

    Jaffar, Joxan

    these two formulas are accomodated are separate from one another. Formally, (x y) list(y), one heap whose is the heap accomodating the list y. There are several Hoare triples which are axioms, and several inference

  1. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis Success Stories JuneExecute

  2. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  3. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec PGP

  4. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |

  5. T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities

  6. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainService

  7. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1: Red

  8. Power-law connections: From Zipf to Heaps and beyond

    SciTech Connect (OSTI)

    Eliazar, Iddo I., E-mail: eliazar@post.tau.ac.il [Holon Institute of Technology, P.O. Box 305, Holon 58102 (Israel); Cohen, Morrel H., E-mail: mcohen@physics.rutgers.edu [Department of Physics and Astronomy, Rutgers University, Piscataway, NJ 08854-8019 (United States); Department of Chemistry, Princeton University, Princeton, NJ 08544 (United States)

    2013-05-15T23:59:59.000Z

    In this paper we explore the asymptotic statistics of a general model of rank distributions in the large-ensemble limit; the construction of the general model is motivated by recent empirical studies of rank distributions. Applying Lorenzian, oligarchic, and Heapsian asymptotic analyses we establish a comprehensive set of closed-form results linking together rank distributions, probability distributions, oligarchy sizes, and innovation rates. In particular, the general results reveal the fundamental underlying connections between Zipf’s law, Pareto’s law, and Heaps’ law—three elemental empirical power-laws that are ubiquitously observed in the sciences. -- Highlights: ? The large-ensemble asymptotic statistics of rank distributions are explored. ? Lorenzian, oligarchic, and Heapsian asymptotic analyses are applied. ? Associated oligarchy sizes and induced innovation rates are analyzed. ? General elemental statistical connections are established. ? The underlying connections between Zipf’s, Pareto’s and Heaps’ laws are unveiled.

  9. Detecting buffer overflows using testcase synthesis and code instrumentation

    E-Print Network [OSTI]

    Zhivich, Michael A

    2005-01-01T23:59:59.000Z

    The research presented in this thesis aims to improve existing approaches to dynamic buffer overflow detection by developing a system that utilizes code instrumentation and adaptive test case synthesis to find buffer ...

  10. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a buffer overflow via the web-based management console. IMPACT: Manipulation of data System Access SOLUTION: Vendor recommends updating to version 12.1...

  11. Concurrent Compacting Garbage Collection of a Persistent Heap James O'Toole

    E-Print Network [OSTI]

    Williams, Brian C.

    Concurrent Compacting Garbage Collection of a Persistent Heap James O'Toole Scott Nettles David Gifford Abstract We describe a replicating garbage collector for a persistent heap. The garbage collector operations are committed they are preserved in stable storage and survive system failures. Clients can freely

  12. PROBLEM-SOLVING MASTERCLASS WEEK 1 1. A game starts with four heaps of beans, containing 3, 4, 5 and 6 beans. The two players

    E-Print Network [OSTI]

    Vakil, Ravi

    PROBLEM-SOLVING MASTERCLASS WEEK 1 1. A game starts with four heaps of beans, containing 3, 4, 5 and 6 beans. The two players move alternately. A move consists of taking either (a) one bean from a heap, provided at least two beans are left behind in that heap, or (b) a complete heap of two or three beans

  13. PROBLEMSOLVING MASTERCLASS WEEK 1 1. A game starts with four heaps of beans, containing 3, 4, 5 and 6 beans. The two players

    E-Print Network [OSTI]

    Vakil, Ravi

    PROBLEM­SOLVING MASTERCLASS WEEK 1 1. A game starts with four heaps of beans, containing 3, 4, 5 and 6 beans. The two players move alternately. A move consists of taking either (a) one bean from a heap, provided at least two beans are left behind in that heap, or (b) a complete heap of two or three beans

  14. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Energy Savers [EERE]

    U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am...

  15. Using Program Transformation to Secure C Programs Against Buffer Overflows Christopher Dahn, Spiros Mancoridis

    E-Print Network [OSTI]

    Mancoridis, Spiros

    Using Program Transformation to Secure C Programs Against Buffer Overflows Christopher Dahn, Spiros Christopher.Stephen.Dahn, Spiros.Mancoridis¡ @drexel.edu Abstract Buffer overflows are the most common source

  16. Event heap: a coordination infrastructure for dynamic heterogeneous application interactions in ubiquitous computing environments

    DOE Patents [OSTI]

    Johanson, Bradley E.; Fox, Armando; Winograd, Terry A.; Hanrahan, Patrick M.

    2010-04-20T23:59:59.000Z

    An efficient and adaptive middleware infrastructure called the Event Heap system dynamically coordinates application interactions and communications in a ubiquitous computing environment, e.g., an interactive workspace, having heterogeneous software applications running on various machines and devices across different platforms. Applications exchange events via the Event Heap. Each event is characterized by a set of unordered, named fields. Events are routed by matching certain attributes in the fields. The source and target versions of each field are automatically set when an event is posted or used as a template. The Event Heap system implements a unique combination of features, both intrinsic to tuplespaces and specific to the Event Heap, including content based addressing, support for routing patterns, standard routing fields, limited data persistence, query persistence/registration, transparent communication, self-description, flexible typing, logical/physical centralization, portable client API, at most once per source first-in-first-out ordering, and modular restartability.

  17. Stratification, segregation and mixing of granular materials in quasi-2D bounded heaps

    E-Print Network [OSTI]

    Yi Fan; Youcef Boukerkour; Thibault Blanc; Paul B. Umbanhowar; Julio M. Ottino; Richard M. Lueptow

    2012-09-25T23:59:59.000Z

    Segregation and mixing of granular mixtures during heap formation have important consequences in industry and agriculture. This research investigates three different final particle configurations of bi-disperse granular mixtures -- stratified, segregated and mixed -- during filling of quasi-two dimensional silos. We consider a larger number and relatively wider range of control parameters than previous studies, including particle size ratio, flow rate, system size and heap rise velocity. The boundary between stratified and unstratified states is primarily controlled by the two-dimensional flow rate, with the critical flow rate for the transition depending weakly on particle size ratio and flowing layer length. In contrast, the transition from segregated to mixed states is controlled by the rise velocity of the heap, a control parameter not previously considered. The critical rise velocity for the transition depends strongly on the particle size ratio.

  18. Response of the Greenland-Scotland overflow to changing deep water supply from the Arctic Mediterranean

    E-Print Network [OSTI]

    Response of the Greenland-Scotland overflow to changing deep water supply from the Arctic with a topographic barrier is used to study the response of the overflows across the Greenland-Scotland Ridge of the exchanges across the ridge is seen when the supply decreases. Transport variations in the East-Greenland

  19. Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) Survey and

    E-Print Network [OSTI]

    Shihada, Basem

    Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) ­ Survey and Challenges networks (WSNs) research has pre- dominantly assumed the use of a portable and limited energy source, viz. batteries, to power sensors. Without energy, a sensor is essentially useless and cannot contribute

  20. Estimation of Hydraulic Parameters under Unsaturated Flow Conditions in Heap Leaching

    E-Print Network [OSTI]

    Sepúlveda, Mauricio

    is a widely used extraction method for low-grade minerals as well as copper, gold, silver, and uranium. Copper minerals are primar- ily categorized as either copper sulphides or oxides. During heap leaching, sulfuric is suitable for copper recovery of the more stable sulphide minerals from copper ores. The construction

  1. How to safely compost Cameraria ohridella-infested horse chestnut leaf litter on private compost heaps

    E-Print Network [OSTI]

    Richner, Heinz

    How to safely compost Cameraria ohridella-infested horse chestnut leaf litter on private compost the deposition of pest-infested litter on private compost heaps was dissuaded because of the risk of leafminer emergence in the following spring. Thus, the aim of this study was to test safe ways to compost pest

  2. Angling chromium to let oxygen through | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Angling chromium to let oxygen through Angling chromium to let oxygen through Released: September 10, 2014 New semiconducting material works at lower temperatures Scanning...

  3. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Environmental Management (EM)

    of the DCERPC Inspection Buffer Overflow Vulnerability may cause a stack overflow and permit the execution of arbitrary commands. Solution: The vendor has issued a fix. Addthis...

  4. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Broader source: Energy.gov (indexed) [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution. PLATFORM: IBM Informix Dynamic Server (IDS) 11.50 ABSTRACT: Stack-based...

  5. STAMP-Based Analysis of a Refinery Overflow Accident Nancy Leveson, Margaret Stringfellow, and John Thomas

    E-Print Network [OSTI]

    Leveson, Nancy

    1 STAMP-Based Analysis of a Refinery Overflow Accident Nancy Leveson, Margaret Stringfellow, and John Thomas As an example of STAMP, we have taken an accident report produced for a real refinery

  6. Problem Set 3 Let's Simplex

    E-Print Network [OSTI]

    Chen, Yiling

    Problem Set 3 Let's Simplex Applied Mathematics 121 -- Spring 2011 Due 5:00 PM, Friday, February 18 linear programs using the Simplex method. Second, you will get a better understanding of linear programming through a better understanding of the Simplex method. Contents 1 Making it rain 2 2 Simplex

  7. Problem Set 3 Let's Simplex

    E-Print Network [OSTI]

    Chen, Yiling

    Problem Set 3 Let's Simplex AM121/ES121 -- Fall 2014 Due 5:00 PM, Tuesday, September 30, 2014 linear programs using the Simplex method. Second, you will get a better understanding of linear programming through a better understanding of the Simplex method. Contents 1 Making it rain 3 2 Simplex

  8. Problem Set 3 Let's Simplex

    E-Print Network [OSTI]

    Chen, Yiling

    Problem Set 3 Let's Simplex Applied Mathematics 121 -- Spring 2014 Due 5:00 PM, Friday, February 21 practice solving linear programs using the Simplex method. Second, you will get a better understanding of linear programming through a better understanding of the Simplex method. Contents 1 Making it rain 3 2

  9. Together Let Our Hearts Agree

    E-Print Network [OSTI]

    Ricketts, Clinton Michael

    2010-04-30T23:59:59.000Z

    . The communities I have been a part of offer a transient history described by communal hopes and important personal relationships. In retrospect, these relationships and shared desires define my sense of self. In the thesis exhibition titled Together Let Our Hearts...

  10. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  11. Neogene overflow of Northern Component Water at the Greenland-Scotland Ridge

    E-Print Network [OSTI]

    Samworth, Richard

    Neogene overflow of Northern Component Water at the Greenland-Scotland Ridge H. R. Poore Department counterpart Northern Component Water (NCW), across the Greenland-Scotland Ridge (GSR) is thought to have,280 words, 12 figures, 3 tables. Keywords: Northern Component Water; Greenland-Scotland Ridge; Iceland

  12. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2012)

    E-Print Network [OSTI]

    Gerber, Edwin

    2012-01-01T23:59:59.000Z

    ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2012) Published online in Wiley Online Library using National Centers for Environmental Prediction/National Center for Atmospheric Research (NCEP) concentrations and sea- surface temperatures (SSTs). These integrations enable the relative role of ozone

  13. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  14. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...

    Broader source: Energy.gov (indexed) [DOE]

    Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

  15. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

  16. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  17. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  18. U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    0: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am...

  19. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  20. U-094: EMC Documentum Content Server Lets Local Administrative...

    Broader source: Energy.gov (indexed) [DOE]

    4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated...

  1. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

  2. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  3. T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

  4. Feasibility of cold rolling titanium strip cast by the plasma melt overflow process

    SciTech Connect (OSTI)

    Gaspar, T.A. [Ribbon Technology Corp., Columbus, OH (United States); Sukonnik, I.M. [Texas Instruments, Attleboro, MA (United States); Bird, R.K.; Brewer, W.D. [National Aeronautics and Space Administration, Hampton, VA (United States). Langley Research Center

    1995-12-31T23:59:59.000Z

    A new fabrication method tailored specifically for titanium alloys and intermetallics combined direct strip casting and cold rolling to produce foil products by completely eliminating hot working steps. Titanium strips 0.4-mm- to 0.7-mm-thick and 100-mm-wide were cast by the plasma melt overflow process. The cast strips were cold rolled to 0.15-mm-thick, fully dense foils. The effect of thermal and mechanical treatments on the microstructure of the cast strip was investigated. The cold rolled foils were characterized by measurement of average surface roughness, chemical composition, gas content and tensile properties.

  5. First, let's recall We call this ratio

    E-Print Network [OSTI]

    ) For z Phase accumulated from z=0 to z=d Let's evaluate the phase-change and Ey COME OUT from the birefringent material OUT OF PHASE In PHASE #12;For z >d To find an expression for the fields in the region z>d, all we have to do it to account for the accumulated change of phase from z=0

  6. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2013)

    E-Print Network [OSTI]

    Lee, Sukyoung

    2013-01-01T23:59:59.000Z

    ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. (2013) Published online in Wiley Online Library Sciences, Seoul National University, Seoul, South Korea *Correspondence to: C. Yoo, Center for Atmosphere). A number of studies have shown that the MJO plays an important role in modulating the extratropical cir

  7. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  8. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis...

  9. Solar Decathlon 2013: Let the Building Begin | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During...

  10. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  11. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  12. U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

  13. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  14. An investigation of plastic torsion in circular prismatic bars with a concentric or eccentric hole using the sand-heap analogy

    E-Print Network [OSTI]

    Carey, Gerald John, Jr

    1963-01-01T23:59:59.000Z

    AN INVESTIGATION OF PLASTIC TORSION IN CIRCULAR PRISMATIC BARS WITH A CONCENTRIC OR ECCENTRIC HOLE USING THE SAND-HEAP ANALOGY A Thesis by GERALD JOHN CAREY, JR. Submitted to the Graduate School of the Agricultural and Mechanical College... of Texas in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE May 1963 Maj or Subj ect: Aerospace Engineering AN INVESTIGATION Of PLASTIC TORSION IN CIRCULAR PRISMATIC BARS WITH A CONCENTRIC OR ECCENTRIC HOLE USING THE SAND...

  15. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player...

  16. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  17. LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    /kWh, depending on its location as well as on the size and type of PV system used (EPIA Report, 2011). InvestmentLET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY Anna CRETI Jérôme JOAUG Cahier n:chantal.poujouly@polytechnique.edu hal-00751743,version1-14Nov2012 #12;Let the sun shine: optimal deployment of photovoltaics in Germany

  18. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  19. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  20. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

  1. U-017: HP MFP Digital Sending Software Lets Local Users Obtain...

    Broader source: Energy.gov (indexed) [DOE]

    TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  2. FLI-1 Flightless-1 and LET-60 Ras control germ line morphogenesis in C. elegans

    E-Print Network [OSTI]

    Lu, Jiamiao; Dentler, William L., Jr; Lundquist, Erik A.

    2008-05-16T23:59:59.000Z

    for the germ line morphogenesis defect by DIC optics and DAPI staining (Figure 11A) [30,32,33]. The hypomorphic loss-of-function allele n2021 caused a ky535-like germ line defect in 44% of gonad arms, and the stronger let-60 loss-of-function alleles s1124, s...1045), let-23(sy10), lin-31(n301). LGIII: fli-1(ky535), fli-1(tm362), tnIs6 [plim-7::gfp], dpy- 17(e164), unc-32(e189), mpk-1(ku1), eT1. LGIV: let- 60(n2021), let-60(s1124), let-60(s1155), let-60(s59), let- 60(sy93), let-60(sy92), let-60(sy99), let-60(n...

  3. Advanced Calculus 2 1. The derivative: Let Rm

    E-Print Network [OSTI]

    Logan, David

    , . . . , m). (9) We assume the transformation (9) to be invertible, that is, we can for the xj as functionsAdvanced Calculus 2 1. The derivative: Let Rm have components j and x: Rm Rn by x() = x1 matrix. You can think of A as a linear function taking Rm to Rm . We denote by AB the image of B under A

  4. Gas pile-up, gap overflow, and Type 1.5 migration in circumbinary disks: general theory

    E-Print Network [OSTI]

    Bence Kocsis; Zoltan Haiman; Abraham Loeb

    2012-09-13T23:59:59.000Z

    Many astrophysical binaries, from planets to black holes, exert strong torques on their circumbinary accretion disks, and are expected to significantly modify the disk structure. Despite the several decade long history of the subject, the joint evolution of the binary + disk system has not been modeled with self-consistent assumptions for arbitrary mass ratios and accretion rates. Here we solve the coupled binary-disk evolution equations analytically in the strongly perturbed limit, treating the azimuthally-averaged angular momentum exchange between the disk and the binary and the modifications to the density, scale-height, and viscosity self-consistently, including viscous and tidal heating, diffusion limited cooling, radiation pressure, and the orbital decay of the binary. We find a solution with a central cavity and a migration rate similar to those previously obtained for Type-II migration, applicable for large masses and binary separations, and near-equal mass ratios. However, we identify a distinct new regime, applicable at smaller separations and masses, and mass ratio in the range 0.001piles up outside the binary's orbit, but rather than creating a cavity, it continuously overflows as in a porous dam. The disk profile is intermediate between a weakly perturbed disk (producing Type-I migration) and a disk with a gap (with Type-II migration). However, the migration rate of the secondary is typically slower than both Type-I and Type-II rates. We term this new regime "Type-1.5" migration.

  5. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following...

  6. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code...

  7. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  8. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Energy Savers [EERE]

    107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am...

  9. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code...

  10. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  11. U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: OpenSSL Invalid TLSDTLS Record Processing Lets Remote Users Deny Service U-167: OpenSSL Invalid TLSDTLS Record Processing Lets Remote Users Deny Service May 11, 2012 - 7:00am...

  12. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  13. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  14. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  15. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: VMware vmrun Utility Lets Local Users Gain Elevated Privileges T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges March 30, 2011 - 3:05pm Addthis PROBLEM: A...

  16. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticat...

    Broader source: Energy.gov (indexed) [DOE]

    11: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users...

  17. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

  18. Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w| n. Then x, y, z s.t. the following all hold: xyz = w |xy| n |y| > 0, and k 0 (xykz L(D)) L30: Pumping Lemma CS250: Discrete Math for Computer Science #12;proof: Let w L(D), |w| n, w = w1, w2

  19. Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.

    E-Print Network [OSTI]

    Immerman, Neil

    Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w| n. Then x, y, z s.t. the following all hold: xyz = w |xy| n |y| > 0, and k 0 (xykz L(D)) Pumping Lemma for Regular Sets #12;proof: Let w L(D), |w| n, w = w1, w2, . . . , wn · u w = w1 w2 w3

  20. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssues DOE's Nuclear EnergySmart Meters and| Department of: Let the

  1. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in Apache. A remote user can access internal servers. PLATFORM: Apache HTTP Server Service ABSTRACT: Apache modproxymodrewrite Bug Lets Remote Users Access Internal...

  2. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Broader source: Energy.gov (indexed) [DOE]

    Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

  3. Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1

    E-Print Network [OSTI]

    of the radiobiological effects of high- linear energy transfer (LET) radiation is essential for radiation protectionGenomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1 and Tom K, it has always been accepted that the deleterious effects of ionizing radiation, such as mutation

  4. Math 702 Problem Set #7 Due Mon., April 26, 2004 1. Let Y P1

    E-Print Network [OSTI]

    Harbater, David

    Math 702 Problem Set #7 Due Mon., April 26, 2004 1. Let Y P1 C be a G-Galois branched cover, with branch locus P1, . . ., Pr, where Pj is at x = j. Let P be a base point on the positive imaginary axis. Choose a homotopy basis 1, . . ., r of counterclockwise loops at P, where j winds once around Pj

  5. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15T23:59:59.000Z

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  6. Gas pile-up, gap overflow, and Type 1.5 migration in circumbinary disks: application to supermassive black hole binaries

    E-Print Network [OSTI]

    Bence Kocsis; Zoltan Haiman; Abraham Loeb

    2012-09-13T23:59:59.000Z

    We study the interaction of a supermassive black hole (SMBH) binary and a standard radiatively efficient thin accretion disk. We examine steady-state configurations of the disk and migrating SMBH system, self-consistently accounting for tidal and viscous torques and heating, radiative diffusion limited cooling, gas and radiation pressure, and the decay of the binary's orbit. We obtain a "phase diagram" of the system as a function of binary parameters, showing regimes in which both the disk structure and migration have a different character. Although massive binaries can create a central gap in the disk at large radii, the tidal barrier of the secondary causes a significant pile-up of gas outside of its orbit, which can lead to the closing of the gap. We find that this spillover occurs at an orbital separation as large as ~200 M_7^{-1/2} gravitational radii, where M = 10^7 M_7 Msun is the total binary mass. If the secondary is less massive than ~10^6 Msun, then the gap is closed before gravitational waves (GWs) start dominating the orbital decay. In this regime, the disk is still strongly perturbed, but the piled-up gas continuously overflows as in a porous dam, and crosses inside the secondary's orbit. The corresponding migration rate, which we label Type 1.5, is slower than the usual limiting cases known as Type I and II migration. Compared to an unperturbed disk, the steady-state disk in the overflowing regime is up to several hundred times brighter in the optical bands. Surveys such as PanSTARRS or LSST may discover the periodic variability of this population of binaries. Our results imply that the circumbinary disks around SMBHs can extend to small radii during the last stages of their merger, when they are detectable by LISA, and may produce coincident electromagnetic (EM) emission similar to active galactic nuclei (AGN).

  7. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  8. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  9. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  10. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host T-589: Citrix XenApp and Citrix Presentation Server Bug...

  11. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers....

  12. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  13. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on...

  14. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  15. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome....

  16. An extension of Markov's Inequality Let E be a connected compact ...

    E-Print Network [OSTI]

    An extension of Markov's Inequality. Let E be a connected compact set of logarithmic capacity 1 in the complex. plane. Is it true that for every polynomial P of ...

  17. THE C*-ALGEBRA OF A VECTOR BUNDLE 1. Introduction Let E ...

    E-Print Network [OSTI]

    2010-07-19T23:59:59.000Z

    Jul 19, 2010 ... If B/J is nuclear then it is C(X)-nuclear and since CJ is KKX-contractible it follows that µ must be a KKX-equivalence, see [2]. Let us recall that ...

  18. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

  19. Let A be any language. Define the right-equivalence relation A on

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    = {a, b}; A1 = w #b(w) 0 (mod 2) L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b(w) 0 (mod 2) A1 a b A1 ab L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b

  20. Colton Heaps | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'sEnergyTexas1. FeedstockCLEANSprings Gets anColoring and Activity

  1. 1.Let a 2 and w 2 *. Define w.num(a) = the number of a's in w. Let = {b, c* *, d, e, f}.

    E-Print Network [OSTI]

    Cappello, Peter

    }. Define L = {w | w.num(b) 0 mod 2, w.num(c) 1 mod 2, w.num(c) 2 mod 3}. * *Prove that L. Let L 2 *. Define h-1(L), read "h inverse of L," is the set of strings w 2 * * * such that h(w) 2. Construct an auto* *maton that recognizes h-1(L) as follows. On input w, the automaton, for each symbol

  2. Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain

    E-Print Network [OSTI]

    Subramanian, Sriram

    Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain Tuesday, 12 July 2011 #12@cs.nott.ac.uk christian.olms@stud.uni-due.de jonhaber@gmail.com kasia.warpas@gmail.com Tuesday, 12 July 2011 #12;

  3. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote...

  4. WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program

    E-Print Network [OSTI]

    Virginia Tech

    WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program Fidelity Investments innovation, and effective deployment of leading-edge technologies. Our entry-level technology training, Quality Assurance, Mainframe Development and Technology Infrastructure and Engineering (TIE). Upon

  5. Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims

    E-Print Network [OSTI]

    Schwartz, Andrew

    Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims successfully wired monkey brains to robot arms, raising hope that science is moving closer to finding ways to help paralyzed people control their world. Using their brains to control their robot arms, monkeys

  6. How Plants Grow name______________ Plants can grow from more than just seeds. Let's look at

    E-Print Network [OSTI]

    Koptur, Suzanne

    How Plants Grow name______________ Plants can grow from more than just seeds. Let's look at some of these ways you can grow plants. CUTTINGS Many plants can be started from cuttings (pieces of a bigger plant). A good place to make a cutting is fromone of the growing points of the plant (stem-tip). Some plants like

  7. Aortic Valve Turning Over a New Leaf(let) in Endothelial Phenotypic Heterogeneity

    E-Print Network [OSTI]

    Simmons, Craig A.

    Aortic Valve Turning Over a New Leaf(let) in Endothelial Phenotypic Heterogeneity Peter F. Davies, Anthony G. Passerini, Craig A. Simmons A ortic valve diseases are debilitating cardiovascular disorders the longevity of replacement valves and to improve tissue engineered substitutes,1 the underlying mech- anisms

  8. Energy Policy 33 (2005) 18251832 Letting the (energy) Gini out of the bottle: Lorenz curves of

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Energy Policy 33 (2005) 1825­1832 Letting the (energy) Gini out of the bottle: Lorenz curves of cumulative electricity consumption and Gini coefficients as metrics of energy distribution and equity Arne Jacobsona , Anita D. Milmana , Daniel M. Kammena,b, * a Energy and Resources Group, University of California

  9. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code...

  10. Math 2001 page 1 of 5 1. (20) Let R be a relation on a set S. Define the following terms, which may or may not

    E-Print Network [OSTI]

    Green, Richard M.

    Math 2001 page 1 of 5 1. (20) Let R be a relation on a set S. Define the following terms, which may) transitive. #12;Math 2001 page 2 of 5 2. (20) Let A be the 3-element set {Rock, Paper, Scissors}, and let R) Write down the inverse relation, R-1 , on A. #12;Math 2001 page 3 of 5 3. (30) Let B = {1, 2, 3

  11. Summary of meeting on disposal of LET&D HEPA filters

    SciTech Connect (OSTI)

    Not Available

    1991-11-21T23:59:59.000Z

    This report is a compilation of correspondence between Westinghouse Idaho Nuclear Company and the US EPA over a period of time from 1988 to 1992 (most from 1991-92) regarding waste management compliance with EPA regulations. Typical subjects include: compliance with satellite accumulation requirements; usage of ``Sure Shot`` containers in place of aerosol cans; notice of upcoming recyclable battery shipments; disposition of batteries; HEPA filter leach sampling and permit impacts; functional and operation requirements for the spent filter handling system; summary of meeting on disposal of LET and D HEPA filters; solvent substitution database report; and mercury vapor light analytical testing.

  12. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us count the ways. We've built programs that

  13. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  14. Problems #7, Math 311, Dr. M. Bohner. Mar 19, 2003. Due Apr 2, 1 pm. 138. Let A =

    E-Print Network [OSTI]

    Bohner, Martin

    Problems #7, Math 311, Dr. M. Bohner. Mar 19, 2003. Due Apr 2, 1 pm. 138. Let A = a b b c . Show by f(x, y, z) = (x2 +2y2 )e-(x2+y2) +zez . 147. In order to produce a box we have two materials

  15. Bianchi Orbifolds of Small Discriminant Let OD be the ring of integers in the imaginary quadratic field Q(

    E-Print Network [OSTI]

    Hatcher, Allen

    Bianchi Orbifolds of Small Discriminant A. Hatcher Let OD be the ring of integers in the imaginary quadratic field Q( D) of discrim- inant D OD) is a discrete subgroup of the isometry group PSL2(C) (= PGL2(C)) of hyperbolic 3-space H3 . The quotient space H3 /PGL2(OD) = XD is topologically

  16. Don't let the river run dry: Efficiency and conservation efforts in the Rio Grande Basin

    E-Print Network [OSTI]

    Supercinski, Danielle

    2011-01-01T23:59:59.000Z

    and quality of water for this region. For further information, materials, and articles about RGBI, visit riogrande.tamu.edu. Don?t let the river run dry, continued ... conservation; (6) environment, ecology, and water quality protection; (7) saline and wastewater management and reuse; (8) basinwide hydrology, salinity modeling, and technology; and (9) communica- tions and accountability. ?A major strength of the Rio...

  17. Partial Solutions for Assignment 1 (1) In a certain random experiment, let A and B be two events such that P(A) = 0.7,

    E-Print Network [OSTI]

    Chen, Chaur-Chin

    of the slots in which the ball falls. (a) The sample space S = {1, 2, · · ·, 35, 36, 0, 00}. (b) Let B = {0, 00) A box contains four marbles numbered 1 through 4. The marbles are selected one at a time without replacement. A match occurs if marble numbered k is the kth marble selected. Let the event Ai, denote a match

  18. 1. Let a and w . Define w.num(a) = the number of a's in w. Let = {b, c, d, e, f}. Define L = {w | w.num(b) 0 mod 2, w.num(c) 1 mod 2, w.num(c) 2 mod 3}. Prove

    E-Print Network [OSTI]

    Cappello, Peter

    1. Let a and w . Define w.num(a) = the number of a's in w. Let = {b, c, d, e, f}. Define L = {w | w.num(b) 0 mod 2, w.num(c) 1 mod 2, w.num(c) 2 mod 3}. Prove that L is regular or prove that L() = , for the empty word . That is, we apply h to each symbol of w and concatenate the results, in order. Let L

  19. Lack of Bystander Effects From High LET Radiation For Early Cytogenetic Endpoints.

    SciTech Connect (OSTI)

    Groesser, Torsten; Cooper, Brian; Rydberg, Bjorn

    2008-05-07T23:59:59.000Z

    The aim of this work was to study radiation-induced bystander effects for early cytogenetic end points in various cell lines using the medium transfer technique after exposure to high- and low-LET radiation. Cells were exposed to 20 MeV/ nucleon nitrogen ions, 968 MeV/nucleon iron ions, or 575 MeV/nucleon iron ions followed by transfer of the conditioned medium from the irradiated cells to unirradiated test cells. The effects studied included DNA double-strand break induction, {gamma}-H2AX focus formation, induction of chromatid breaks in prematurely condensed chromosomes, and micronucleus formation using DNA repair-proficient and -deficient hamster and human cell lines (xrs6, V79, SW48, MO59K and MO59J). Cell survival was also measured in SW48 bystander cells using X rays. Although it was occasionally possible to detect an increase in chromatid break levels using nitrogen ions and to see a higher number of {gamma}-H2AX foci using nitrogen and iron ions in xrs6 bystander cells in single experiments, the results were not reproducible. After we pooled all the data, we could not verify a significant bystander effect for any of these end points. Also, we did not detect a significant bystander effect for DSB induction or micronucleus formation in these cell lines or for clonogenic survival in SW48 cells. The data suggest that DNA damage and cytogenetic changes are not induced in bystander cells. In contrast, data in the literature show pronounced bystander effects in a variety of cell lines, including clonogenic survival in SW48 cells and induction of chromatid breaks and micronuclei in hamster cells. To reconcile these conflicting data, it is possible that the epigenetic status of the specific cell line or the precise culture conditions and medium supplements, such as serum, may be critical for inducing bystander effects.

  20. Let T be a locally finite rooted tree and Iso(T) be the group of all isometries of T.

    E-Print Network [OSTI]

    Ivanov, Aleksander

    Let T be a locally finite rooted tree and Iso(T) be the group of all isometries of T. Iso(T) is profinite with respect to canonical n: Iso(T) Iso(Tn ) , n, where Tn consists of the first n levels. #12| . PGL2 (p ) fixes the vertex p x p . 3. Branch groups. A closed subgroup GIso(T) is a branch (weakly

  1. U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-082: McAfee SaaS...

  2. Depth absorbed dose and LET distributions of therapeutic {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C beams

    SciTech Connect (OSTI)

    Kempe, Johanna; Gudowska, Irena; Brahme, Anders [Division of Medical Radiation Physics, Department of Oncology-Pathology, Karolinska Institutet and Stockholm University, Box 260, SE-171 76 Stockholm (Sweden)

    2007-01-15T23:59:59.000Z

    The depth absorbed dose and LET (linear energy transfer) distribution of different ions of clinical interest such as {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C ions have been investigated using the Monte Carlo code SHIELD-HIT. The energies of the projectiles correspond to ranges in water and soft tissue of approximately 260 mm. The depth dose distributions of the primary particles and their secondaries have been calculated and separated with regard to their low and high LET components. A LET value below 10 eV/nm can generally be regarded as low LET and sparsely ionizing like electrons and photons. The high LET region may be assumed to start at 20 eV/nm where on average two double-strand breaks can be formed when crossing the periphery of a nucleosome, even though strictly speaking the LET limits are not sharp and ought to vary with the charge and mass of the ion. At the Bragg peak of a monoenergetic high energy proton beam, less than 3% of the total absorbed dose is comprised of high LET components above 20 eV/nm. The high LET contribution to the total absorbed dose in the Bragg peak is significantly larger with increasing ion charge as a natural result of higher stopping power and lower range straggling. The fact that the range straggling and multiple scattering are reduced by half from hydrogen to helium increases the possibility to accurately deposit only the high LET component in the tumor with negligible dose to organs at risk. Therefore, the lateral penumbra is significantly improved and the higher dose gradients of {sup 7}Li and {sup 12}C ions both longitudinally and laterally will be of major advantage in biological optimized radiation therapy. With increasing charge of the ion, the high LET absorbed dose in the beam entrance and the plateau regions where healthy normal tissues are generally located is also increased. The dose distribution of the high LET components in the {sup 7}Li beam is only located around the Bragg peak, characterized by a Gaussian-type distribution. Furthermore, the secondary particles produced by high energy {sup 7}Li ions in tissuelike media have mainly low LET character both in front of and beyond the Bragg peak.

  3. 11406. Proposed by A. A. Dzhumadil'daeva, Almaty, Republics Physics and Mathematics School, Almaty, Kazakhstan. Let n!! denote the product of all positive integers not greter than n and congruent to n mod 2,

    E-Print Network [OSTI]

    Heckman, Christopher Carl

    , Kazakhstan. Let n!! denote the product of all positive integers not greter than n and congruent to n mod 2

  4. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29T23:59:59.000Z

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  5. WBS-FOR CREATING AN ER-MODEL Let A(Ei) = the set of attributes of entity-set an Ei.

    E-Print Network [OSTI]

    Kundu, Sukhamay

    WBS-FOR CREATING AN ER-MODEL · Let A(Ei) = the set of attributes of entity-set an Ei. · Let A from each Ei partici- pating in Rj, can interact multiple times, then we need a pri- mary key among FOR CREATING ER-MODELS Identify name and A(Ei) for each Ei Identify a primary key for each Ei Identify name

  6. Comparisons of LET Distributions for Protons with Energies between50 and 200 MeV Determined Using a Spherical Tissue-EquivalentProportional Counter (TEPC) and a Position-Sensitive Silicon Spectrometer(RRMD-III)

    SciTech Connect (OSTI)

    Borak, Thomas B.; Doke, Tadayoshi; Fuse, T.; Guetersloh, StephenB.; Heilbronn, Lawrence H.; Hara, K.; Moyers, Michael; Suzuki, S.; Taddei, Phillip; Terasawa, K.; Zeitlin, Cary J.

    2004-12-01T23:59:59.000Z

    Experiments have been performed to measure the response of a spherical tissue-equivalent proportional counter (TEPC) and a silicon-based LET spectrometer (RRMD-III) to protons with energies ranging from 50 200 MeV. This represents a large portion of the energy distribution for trapped protons encountered by astronauts in low-Earth orbit. The beam energies were obtained using plastic polycarbonate degraders with a monoenergetic beam that was extracted from a proton synchrotron. The LET spectrometer provided excellent agreement with the expected LET distribution emerging from the energy degraders. The TEPC cannot measure the LET distribution directly. However, the frequency mean value of lineal energy, y bar f, provided a good approximation to LET. This is in contrast to previous results for high-energy heavy ions wherey barf underestimated LET, whereas the dose-averaged lineal energy, y barD, provided a good approximation to LET.

  7. Let's Talk Turkey -Facts for Food Safety It is important to be careful when you handle, store, cook, and serve turkey.

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Let's Talk Turkey - Facts for Food Safety It is important to be careful when you handle, store, cook, and serve turkey. Follow the rules and the guidelines in this fact sheet to keep your turkey safe and delicious. What to do when you get the turkey Take the turkey home right after you get it. Put

  8. Cluster characters II: A multiplication formula Let C be a Hom-finite triangulated 2-CalabiYau category with a cluster tilting object. Under

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cluster characters II: A multiplication formula Yann Palu Abstract Let C be a Hom categories of modules over a preprojective algebra of Dynkin type, we prove a multiplication formula for the cluster character associated with any cluster tilting object. This formula generalizes those obtained

  9. Water Conservation Tips When washing dishes by hand, don't let the water run while rinsing. Fill one sink with wash water and the

    E-Print Network [OSTI]

    Water Conservation Tips When washing dishes by hand, don't let the water run while rinsing. Fill one sink with wash water and the other with rinse water. Run your washing machine and dishwasher only instead and save gallons every time. For cold drinks keep a pitcher of water in the refrigerator instead

  10. `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard when we're off on holiday! Read these simple tips to find out how. Make that are needed are turned on, and that these are turned off again as you leave the building. Don't leave any non

  11. `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard when we're off on holiday! Read these simple tips to find out how. Make leave the building. Don't leave any non-essential items on standby - appliances such as televisions left

  12. Let the show begin

    SciTech Connect (OSTI)

    Alperowicz, N.

    1993-01-27T23:59:59.000Z

    Major changes should occur in the European polyolefins industry this year. BASF's (Ludwigshafen) polypropylene (PP) deal with ICI is expected to be followed by that of Hoechst (Frankfurt) and Petrofina (Brussels). The two are engaged in feasibility studies for a possible joint venture in PP and are expected to make a decision in the second quarter of this year. Shell and Himont are on track to complete their feasibility study in the first quarter for a polyolefins joint venture. And Huels and PCD are still in talks. But two new possible deals, a polyolefins merger between Nests (Helsinki) and Statoil (Stavanger) and an alliance in PP involving Appryl, the Elf Atochem (51%)/BP Chemicals (49%) joint venture, and Solvay have been denied. The Hoechst/Fina venture would initially encompass only the two companies European plants - Hoechst's 550,000-m.t./year and Fina's 180,000 m.t./year. In addition, Fina would either build or acquire another PP plant. In the second stage, the partners could bring in their overseas plants. Fina has plants in the US, and Hoechst has a combined 100,000 m.t./year in south Africa and Australia. Neste's board member Jukka Viinanen says the only talks between Nests and Statoil center on renegotiations of ethylene supply contract at Stenungsund, Sweden. Nests wants a more flexible deal on quantity and price. It needs 400,000 m.t./year of ethylene for its downstream plants. Viinanen adds that he is worried about the European petrochemical industry and producers need to do everything to improve margins through pricing policies and obtaining a balance between supply and demand. On the possibility of a future link with Statoil he comments, One can never say never. It would take time. We don't feel in a very vulnerable position right now.

  13. Never Let Me Down

    E-Print Network [OSTI]

    Shoshanna

    1992-01-01T23:59:59.000Z

    little. "Would you believe it? Shot the RT out of my hand. One in a million." And he flexed his fingers, wincing. Two knuckles were red and swollen, where they had been twisted by the impact "Need a doctor?" "Nah. Ice'll do it" Jax and Murphy were...

  14. Let's Not Forget Plants

    E-Print Network [OSTI]

    Donald, Athene

    2014-10-08T23:59:59.000Z

    with neutrons where one had the additional tool of using 'contrast' by changing the amount of heavy water in the solution: hydrogen and deuterium scatter neutrons very differently so this provides additional insight as to what is going on as water enters... that is present in the cells can also shift from one starch polymorph to another. In order to make sense of what was going on I had to understand the starch as a material better. We turned to X-ray scattering to explore the internal granule structure. A lot...

  15. Let's Go Veggie!

    E-Print Network [OSTI]

    2014-08-30T23:59:59.000Z

    to 100 tonnes of waste per week, the Ontario Ministry of Agriculture estimates. And where does it go? ... mer heat or sub-zero cold. Agriculture Canada has ...

  16. Problem Sheet 1 of 8 Problem 1. Let P1 = (1, 0, 0), P2 = (0, 1, 0) and P3 = (0, 0, 1).

    E-Print Network [OSTI]

    Argerami, Martin

    Problem Sheet 1 of 8 Problem 1. Let P1 = (1, 0, 0), P2 = (0, 1, 0) and P3 = (0, 0, 1). (a) Show that P1, P2, P3 are not aligned. (b) Find a vector parametric equation for the plane P passing through P1, P2, P3. (c) Find normal and standard equation for P. (d) Find a vector parametric equation

  17. Governor, BoT, Chancellor, Presidents, Faculty, Students, and Friends of CSU. It is time to re-align the mission and budget. Let's review the basic game plan. We are ALL on the same

    E-Print Network [OSTI]

    Shubin, Carol

    -align the mission and budget. Let's review the basic game plan. We are ALL on the same team. Now, we do have to put Californians back on the road to prosperity. Higher education can help the economy grow

  18. 11196. Proposed by Mohammad Hossein Mehrabi, Iran University of Science and Technology, Tehran, Iran. Let A and B be real n n matrices. Show that if AB -BA is invertible and A2

    E-Print Network [OSTI]

    Heckman, Christopher Carl

    11196. Proposed by Mohammad Hossein Mehrabi, Iran University of Science and Technology, Tehran, Iran. Let A and B be real n Ã? n matrices. Show that if AB - BA is invertible and A2 + B2 = 3(AB - BA

  19. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

  20. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

  1. Heap/stack guard pages using a wakeup unit

    DOE Patents [OSTI]

    Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard

    2014-04-29T23:59:59.000Z

    A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access of the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.

  2. Atomic Heap Transactions and Fine-grain Interrupts

    E-Print Network [OSTI]

    Shivers, Olin

    of the string. If we 2 #12;terminate a length L ideal string at x = 0 and x = L, we then have the "boundary

  3. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan [UT Health Science Center at San Antonio; Xu, Nancy R [Old Dominion University; Mohan, Sumathy [UT Health Science Center at San Antonio

    2013-06-03T23:59:59.000Z

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  4. PNSQC 2013 Call for Abstracts is now open let us know how you see quality today! Put your face on quality and be part of the speaker program by submitting an abstract for a

    E-Print Network [OSTI]

    Chapman, Michael S.

    platforms, Quality across the team, Quality across roles as tester, developer, project manager such as legal, medical, banking, Quality in management, processes, team interactions, Quality in estimatingPNSQC 2013 Call for Abstracts is now open ­ let us know how you see quality today! Put your face

  5. T-588: HP Virtual SAN Appliance Stack Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system.

  6. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment of

  7. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment

  8. V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerability |

  9. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|

  10. Let's Work On Your IDP

    Broader source: Energy.gov [DOE]

    Registration link: Register through Employee Self Service (ESS) CHRIS SystemFor organizations not currently using the CHRIS workflow process, please follow your existing interoffice training...

  11. MaximumLetThrough.PDF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of QuadrupoleSextupole Power Converters The corrector power converters use an ' H' -bridge arrangement to provide a bipolar output. The arrangement is shown in Figure 3, with...

  12. Let's Work On Your IDP

    Broader source: Energy.gov [DOE]

    Registration link: Register through Employee Self Service (ESS) CHRIS System.For organizations not currently using the CHRIS workflow process, please follow your existing interoffice training...

  13. 11601. For any prime p and positive integer n, let N(p, n) denote the dif-ference between the number of p's appearing as factors in the denominator

    E-Print Network [OSTI]

    Karaivanov, Borislav

    11601. For any prime p and positive integer n, let N(p, n) denote the dif- ference between the number of p's appearing as factors in the denominator of Fn and the number of those appearing in the numerator of Fn. Clearly, Fn is an integer if and only if N(p, n) 0 for all primes p. The idea of the proof

  14. A loop is the only control-flow construct that lets you go back to an earlier point in the code. Loops are designed to allow us to iterate--to execute the same piece of code over and over again.

    E-Print Network [OSTI]

    Peters, Dennis

    A loop is the only control-flow construct that lets you go back to an earlier point in the code. After the body is executed, we go back and test the loop continuation condition again As soon. Note that the first example (temperature conversion) is basically a variation on this theme. Event

  15. Arithmetic around the bit heap Florent de Dinechin, Matei Istoan, Guillaume Sergent

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    algebra operators or signal processing transforms), polynomials used to approximate elementary functions of an arbitrary number of bits, each weighted by some power of two. Any multivariate polynomial of binary inputs of adders and multipliers. It leads to better global optimization at both the algebraic level

  16. An Efficient Parallel Heap Compaction Algorithm Diab Abuaiadh Yoav Ossia Erez Petrank # Uri Silbershtein

    E-Print Network [OSTI]

    Petrank, Erez

    ---Memory management (garbage collection) General Terms Languages, Performance, Algorithms # Dept. of Computer Science 1­58113­831­8/04/0010 ...$5.00. Keywords Garbage collection, Java, JVM, Parallel garbage collection­ tible to fragmentation. Because the garbage collector does not move objects during the collection

  17. Letting the Brain Speak for itself

    E-Print Network [OSTI]

    Gerhard Werner

    2011-07-20T23:59:59.000Z

    Metaphors of Computation and Information tended to detract attention from the intrinsic modes of neural system functions, uncontaminated by the observer's role for collection and interpretation of experimental data. Recognizing the self-referential mode of function, and the propensity for self-organization to critical states requires a fundamental re-orientation with emphasis on the conceptual approaches of Complex System Dynamics. Accordingly, local cooperative processes, intrinsic to neural structures and of fractal nature, call for applying Fractional Calculus and models of Random Walks in Theoretical Neuroscience studies.

  18. SGA Biennial Meeting Let's Talk Ore Deposits

    E-Print Network [OSTI]

    Barton, Mark D.

    Institute for Mineral Resources, University of Arizona, Tucson, AZ 85721 U.S.A. * now at Bronco Creek Multiple igneous-related hydrothermal systems and related IOCG mineralization, near Copiapó, Chile Mark D about metal sources and traps, however similar patterns in many Cordilleran and global IOCG districts

  19. Letting Go: True autonomy in an AUV

    E-Print Network [OSTI]

    Griffiths, Gwyn

    Will be needed if we are to explore the ocean beneath EuropaÕs ice-covered surface. #12;Satellite images,000 feet Which is which? #12;Face of the Ronne Ice Shelf, Antarctica `To penetrate this barrier) Distancefromseasurface(m) Start Point Surfacing for GPS position fixing Terrain Following #12;Studies in Upper Ocean

  20. 114 ICGA Journal June 2009 MOHEX WINS HEX TOURNAMENT

    E-Print Network [OSTI]

    Hayward, Ryan B.

    Iaf heap exhausted, tr* *ap to GC simple, low-overhead, low-latency interlock. We2haverimple-1 := heap

  1. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system. PLATFORM: Kingsoft Office 2012, Kingsoft Weirwe 2012...

  2. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  3. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  4. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Broader source: Energy.gov (indexed) [DOE]

    were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE...

  5. The Glass Won't Overflow If I Pour Slowly by Bill Menke, April 21, 2010

    E-Print Network [OSTI]

    Menke, William

    new sources of fossil fuel, before exploitation can start. Create new National Parks around coal deposits. Ratify treaties that prohibit deep-water oil drilling. Concentrate all effort on prizing those and carbon sequestration technology. Sure, the production of fossil fuels will slowly decrease, but it would

  6. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department

  7. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department of Energy

  8. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|Adobe

  9. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitraryPrivileges,

  10. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of Energy AForgery,

  11. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy 094: IBMof

  12. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|

  13. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment of Energy

  14. V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment of EnergySpoofAttacks

  15. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergy SEARCH-LAB has reported

  16. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment of Energy

  17. ARITHMETIC CORE GENERATION USING BIT HEAPS Nicolas Brunie, Florent de Dinechin, Matei Istoan, Guillaume Sergent, Kinga Illyes, Bogdan Popa

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    algebra operators or signal processing transforms), polynomials used to approximate elementary functions number of bits, each weighted by some power of two. Most advanced arithmetic cores can be viewed optimization at the algebraic level, at the circuit level, and in terms of software engineering. To demonstrate

  18. Mean steady granular force on a wall overflowed by free-surface gravity-driven dense flows

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    focused on the drag force on small obstacles such as cylinders in the case of rapid - dilute - granular and sharply increases the mean force at low incoming inertial numbers. A simple hydrodynamic model based this model, our study provides an example of the ability of simple hydrodynamic approaches to describe

  19. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  20. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  1. Paralely mezi slovinským a ?eským dramatem 60. let

    E-Print Network [OSTI]

    Jensterle-Doležal, Alenka

    2009-02-01T23:59:59.000Z

    , s ním bude plodit d?tí, pokra?ování rodi- ny, a na h?bitov? stejné už není dost místa. Ale rodina nechce žádné zm?ny, trhliny se musejí odstranit, ve h?e se musí pokra?ovat. Otec jen p?ipustí, že se dcera m?že p?kné starat o hrob a nosit na hrob...

  2. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  3. Removing the Entropy Screen- To Let the Second Law Show

    E-Print Network [OSTI]

    Steinmeyer, D.

    for a given step. For example, the work used (including the lost work) by a distillation column is simply the difference in Wp of the heat supplied to the reboiler and taken out in the condenser: W =Q'To[l/T - 1/'1' ] (9) condenser reboiler where... result is low. When we talk about "savins energy" what we usually mean is "not wasting work-. What we try to do when we design a process. is to use work as effectively as possible. It?s hard to do that if we can?t see it clear~y. This paper...

  4. Going completely renewable: is it possible (let alone desirable)?

    SciTech Connect (OSTI)

    Sovacool, Benjamin K.; Watts, Charmaine

    2009-05-15T23:59:59.000Z

    With the right mix of leadership and policy, a completely renewable electricity sector for New Zealand and the United States is feasible, achievable, and desirable. (author)

  5. Rev: 10/8/2012 "Let Knowledge Serve the City"

    E-Print Network [OSTI]

    Bertini, Robert L.

    of Transportation (DOT) 5. The International Commission on Radiological Protection (ICRP) 6. The National Academy MAINTENANCE 19 RADIATION SAFETY OPERATIONS MANUAL #12;4 Rev: 10/8/2012 PORTLAND STATE UNIVERSITY RADIATION

  6. Audio sparse decompositions in parallel Let the greed be shared !

    E-Print Network [OSTI]

    Paris 7 - Denis Diderot, Université

    by absolute de- caying order, one observes a fast decay, typically a power law with some large negative harmonics of the musical content. With a smart quantization of these few large transform coefficients Abstract--Greedy methods are often the only practical way of solving very large sparse approximation

  7. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

  8. A theoretical analysis of proportional counter response versus LET

    E-Print Network [OSTI]

    Martin, George Gerald

    1970-01-01T23:59:59.000Z

    crimlurator settin A computer program rvas devcloned to couple t'ie energy disLribution and IDT equation;. of Lhe five b, rta emitter, : argon-41& krypton-85, iodine-333, xenon-133 and cesium-137, for clcLccror chamber sizes oF 50 cm. v 10 crn. x I c. m.... Fwergy spectrum of the 8 rays from A-gon-41. 18 F'IG. B. Fnezgy spectrum of the 8 rays from Krypton-85. . . FIG. 9. Energ~ spectrum of the 8 rays from Iodine-131. . . 20 FIG. 10. FIG. 11. Energy spectrum of the 8 rays from Xenon-133. . . Energy...

  9. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  10. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user can gain unauthorized access on the target system. IMPACT: User access via network SOLUTION: The vendor has issued a fix. Addthis Related Articles U-010:HP Onboard...

  11. Let W1 and W2 be two wav

    E-Print Network [OSTI]

    B5 = ?. We define a regular disk in S×S as a generically embedded disk D such that the ..... 19. 5.8. Example. Suppose that the fronts propagate as it is shown in.

  12. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attacker to connect to a database replication port anonymously via Secure Sockets Layer (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT:...

  13. Embryonic stem cells: don't let litigation put

    E-Print Network [OSTI]

    Feng, Jian

    research is not a threat to the federal funding of science. No, allowing research agendas to be dictated--joblossesmaybe anaturalconsequenceofinner-city depopulation.Evenundernormal circumstances,USjobturnoveris around5%permonth if their neighbourhoods have experienced the 76% depopulation that Mutter cites. NealHockleySchoolofEnvironment, Natural

  14. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Energy Savers [EERE]

    address their concerns, collect input on program ideas, and obtain real-time feedback on what is and is not working in the field. This strategy allowed for program...

  15. TEORIJA IN PRAKSA let. 47, 5/2010 Pedro PERISTA*

    E-Print Network [OSTI]

    Birmingham, University of

    expectancy at birth and decrease in death rates are reducing this decline but they in turn pose a significant- teristic Portuguese emigration, the decreasing birth rates are far below the level needed and creating important challenges for a late and weak welfare state * Pedro Perista, researcher, CESIS ­ Centre

  16. Cards let a PDP-11 work like a VAX

    SciTech Connect (OSTI)

    Barney, C.

    1984-05-17T23:59:59.000Z

    The PDP-11 computer is still used widely, in part because of its many peripherals and software applications. For less than $7000, a new board-level product from American Information Systems Inc. promises to give the PDP-11 renewed life as a dual processor based on a UNIX-like operating system with more power than a VAX, its younger superminicomputer cousin. National Semiconductor Corp's 32032 is the foundation of the AIS/3210 system, which also includes a national 16082 memory-management chip and a 16081 floating-point-processor chip. One or more processor boards and memory boards from AIS plug directly into a 16-bit q bus.

  17. Let's Stay Together: A Case for Special Education Teacher Retention

    E-Print Network [OSTI]

    Robinson, Sandra Lee

    2010-01-01T23:59:59.000Z

    likely to opt for early retirement. By contrast, the generalmore likely to opt for early retirement. The results of thefactors behind SETs early retirement would provide critical

  18. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  19. Letting Down the Team? Social Effects of Team Incentives

    E-Print Network [OSTI]

    Babcock, Philip; Bedard, Kelly; Charness, Gary; Hartman, John; Royer, Heather

    2012-01-01T23:59:59.000Z

    incentives with a much larger bonus payment contingent onincentive, the awarding of the bonus was dependent on bothdefaults, no one earns the bonus. 7 While this may seem less

  20. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID...

  1. T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

  2. U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2012-0307 CVE-2012-0308 CVE-2012-3579 CVE-2012-3580 CVE-2012-3581 IMPACT ASSESSMENT: Medium Discussion: Symantec was notified of several security issues impacting Symantec's...

  3. "Let Their Eyes Testify" An Interview with Nana Mahomo

    E-Print Network [OSTI]

    Gabriel, Teshome H.

    1976-01-01T23:59:59.000Z

    weapons on license from the Belgians, the Italians and the British, so they don't really need to buy

  4. Exercise 1. Let (P) be the following linear program

    E-Print Network [OSTI]

    Rapaport, Iván

    of G such that eM c(e) is minimum.Fr A company of petrol wishes to explore oil reservoirs. Once petrol. At this point individual oil traps (target) can be specified more precisely. In most situations

  5. 19JULY 2010 Let us bring technology news to you.

    E-Print Network [OSTI]

    Greenberg, Saul

    of the prototypes require batteries to operate, which wouldn't be practical for commercial uses, according to Juels. However, produc- tion versions wouldn't necessarily need batteries, Marquardt said, The experimental chip would contain general information and enable over- the-air access by a reader, while the other

  6. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  7. 1220 Comment sufficient to meet bacterial needs (let alone

    E-Print Network [OSTI]

    of the recycling of organic carbon by consumers may help to explain apparently excessive demands of consumers- has led to the assertion that bacterial sec- toplankton supply in the summer epilim- ondary production

  8. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. 13: 164168 (2012)

    E-Print Network [OSTI]

    Waugh, Darryn W.

    2012-01-01T23:59:59.000Z

    in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/asl.384 Antarctic ozone depletion and trends using National Centers for Environmental Prediction/National Center for Atmospheric Research (NCEP) concentrations and sea- surface temperatures (SSTs). These integrations enable the relative role of ozone

  9. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. 12: 5157 (2011)

    E-Print Network [OSTI]

    Guichard, Francoise

    2011-01-01T23:59:59.000Z

    in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/asl.288 The large-scale water cycle de Recherche en Geodesie, Institut Geographique National, ENSG ­ Cite Descartes, 6-8 Avenue Blaise of West Africa, such as the role of moisture trans- ported by the southwesterly low-level monsoon flow

  10. TQM, ISO 9000, and Commissioning (Let's Be Practical)

    E-Print Network [OSTI]

    Dunn, W.; Berner, W.

    2002-01-01T23:59:59.000Z

    consistent performance. International Standards Organization (ISO) applies discipline to that concept requiring a structured well-documented management environment capable of withstanding an audit. One could quickly build a library in the study of management...

  11. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of EnergySUSE

  12. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz9MorganYou areInnovationPriority |Going theRaising

  13. Let's Work on Your IDP | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t hLessonsLessons from

  14. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment of Energy Ready,Smart GridAboutWindowsBostonDepartment

  15. U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1Department ofRemote

  16. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis SuccessEnergy

  17. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment of

  18. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4; RSVP97Cross-SiteVulnerability |Execute

  19. Let’s Disagree to Agree: Angélico Chávez Reads Willa Cather’s Death Comes for the Archbishop

    E-Print Network [OSTI]

    Dettman, Jonathan

    2015-01-01T23:59:59.000Z

    Journal 57 (2012): n. pag. Web. 5 May 2015. Ha? ma? la?East Lansing, Michigan. Web. 8 Oct. 2013. ---. Regions of La2011. NPS.gov. 13 Sept. 2013. Web. 6 Sept. 2013. Williams,

  20. JOURNAL OF GEOPHYSICAL RESEARCH, VOL. 104,NO. Cll, PAGES 25,913-25,935,NOVEMBER 15, 1999 Overflow into the deep Caribbean: Effects of plume

    E-Print Network [OSTI]

    MacCready, Parker

    into the deep Caribbean: Effects of plume variability ParkerMacCready,1WilliamE.Johns,2ClaesG.Rooth,2DavidCaribbeanandtheAtlanticis overthe Jungfern-GrapplerSill complexat 1815m depth.Throughthesegapsflowsthesolesourceof waterforthedeepCaribbean Sv -- 106m3s-l) of Atlanticwatercolderthan0=-3.965øCflowingintothe Caribbean

  1. Simultaneous enhancement of electron overflow reduction and hole injection promotion by tailoring the last quantum barrier in InGaN/GaN light-emitting diodes

    E-Print Network [OSTI]

    Demir, Hilmi Volkan

    the last quantum barrier in InGaN/GaN light-emitting diodes Zabu Kyaw, Zi-Hui Zhang, Wei Liu, Swee Tiam Tan injection and efficiency droop in InGaN/GaN light-emitting diodes with step-stage multiple- quantum distribution in InGaN/GaN light-emitting diodes with graded thickness quantum barriers Appl. Phys. Lett. 102

  2. area upper engadine: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Niles; Adam Pease 2001-01-01 18 An Upper Bound on Overflow Probability in Transient Source Systems Engineering Websites Summary: An Upper Bound on Overflow Probability in...

  3. Beth Benjamin: Horticulturalist

    E-Print Network [OSTI]

    Rabkin, Sarah

    2010-01-01T23:59:59.000Z

    Beth Benjamin Benjamin: Oh! Compost, often. The idea was toHe would hide behind the compost heap and toss things athiding my clippings in the compost heap: open it up, put

  4. Patterns and collective behavior in granular media: Theoretical Igor S. Aranson*

    E-Print Network [OSTI]

    Hasty, Jeff

    Materials 654 A. Chladni patterns and heaping 654 B. Standing-wave patterns 654 C. Simulations of vibrated

  5. Preordered forests, packed words and contraction algebras Anthony Mansuy

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    an increasing condition, we obtain the Hopf subalgebra of heap-ordered forests Hho (see [FU10, GL90]). Moreover

  6. Free and cofree Hopf algebras Laboratoire de Mathematiques, Universite de Reims

    E-Print Network [OSTI]

    [14]. 7. The Hopf algebra of ordered forests Ho and its subalgebra of heap-ordered forest Hho [9]. 8

  7. Free and cofree Hopf algebras Laboratoire de Mathmatiques, Universit de Reims

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    [16]. 8. The Hopf algebra of ordered forests Ho and its subalgebra of heap-ordered forests Hho [10]. 9

  8. Jim Cochran: Swanton Berry Farm

    E-Print Network [OSTI]

    Farmer, Ellen

    2010-01-01T23:59:59.000Z

    plants. Let’s buy 7,000 trucks. Let’s own a biodiesel orthree biodiesel companies. Let’s own an insurance company.

  9. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  10. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. A remote user...

  11. Kronecker-Jacobi symbol and Quadratic Reciprocity Let Q be the ...

    E-Print Network [OSTI]

    2012-11-29T23:59:59.000Z

    Proof. Since d(2) = 8, the Theorem (with b = 2) reduces the problem to the simple cases a = 1,3,5,7. Corollary 3. If q is an odd prime, q? = (?1) q?1. 2 q, and a = 0 ...

  12. Stochastic modeling of the cell killing effect for low- and high-LET radiation

    E-Print Network [OSTI]

    Partouche, Julien

    2005-02-17T23:59:59.000Z

    Theoretical modeling of biological response to radiation describes qualitatively and quantitatively the results of radiobiological effects at the molecular, chromosomal, and cellular level. The repair-misrepair (RMR) model is the radiobiological...

  13. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  14. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input before displaying the...

  15. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  16. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Broader source: Energy.gov (indexed) [DOE]

    McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

  17. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Energy Savers [EERE]

    A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate...

  18. Let Our Freak Flags Fly”: Shrek the Musical and the Branding of Diversity

    E-Print Network [OSTI]

    Brater, Jessica; Vecchio, Jessica Del; Friedman, Andrew; Holmstrom, Bethany; Laine, Eero; Levit, Donald; Miller, Hillary; Savran, David; Smith, Carly Griffin; Watt, Kenn; Young, Catherine; Zazzali, Peter

    2010-05-01T23:59:59.000Z

    that is perceived, fairly or not, as a family show.”24 Despite the poor sales, the appearance of the bright green ogre on Broadway was part of DreamWorks’s efforts to sell out—to expand its mass-media market to reach new consumers in the economically minor.../opencms/company/investor_relations/annualreports.html (accessed 3 August 2009). 43 Jeffrey Katzenberg, “Dear Fellow Shareholders,” in ibid. 44 Ibid. 45 Steven Birenberg, “How More Media Companies Brave the Headwinds,” Yahoo! Finance, 15 De- cember 2008, available at http://finance.yahoo.com/news/How-More-Media...

  19. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01T23:59:59.000Z

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  20. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  1. ERROR IN LINEAR INTERPOLATION Let P1(x) denote the linear polynomial interpolating

    E-Print Network [OSTI]

    Atkinson, Kendall

    (x) - P1(x) = (x - x0) (x - x1) 2 f00(cx) for some cx between the minimum and maximum of x0, x1, and x cx x1 #12;(x - x0) (x1 - x) 0, x0 cx x1 and therefore (x - x0) (x1 - x) " log10 e 2x2 1 # log10]. Then f(x)-Pn(x) = (x - x0) (x - x1) · · · (x - xn) (n + 1)! f(n+1) (cx) with cx some point between

  2. Stochastic modeling of the cell killing effect for low- and high-LET radiation 

    E-Print Network [OSTI]

    Partouche, Julien

    2005-02-17T23:59:59.000Z

    Theoretical modeling of biological response to radiation describes qualitatively and quantitatively the results of radiobiological effects at the molecular, chromosomal, and cellular level. The repair-misrepair (RMR) model ...

  3. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  4. Let's talk about symbiosis! 9:15 Matthias Horn, Department of Microbiology and Ecosystem Science

    E-Print Network [OSTI]

    of Microbiology and Ecosystem Science Welcome Session 1 9:30 Julie Klose Session 2 11:30 Buck Hanson, Department of Microbiology and Ecosystem Science 13:30 Daryl Domman, Department of Microbiology and Ecosystem Science

  5. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    or logical Layer-2 network as the affected system to gain an unauthenticated root shell. REFERENCE LINKS: SecurityTracker Alert ID: 1028682 Secunia Advisory SA53730 Cisco...

  7. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    2.0.12.PatchesSoftware Downloads Update Firefox 3.6.14 Mozilla Downloads SeaMonkey 2.1 Beta 2 Addthis Related Articles T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML...

  8. U-193: NetBSD System Call Return Value Validation Flaw Lets Local...

    Broader source: Energy.gov (indexed) [DOE]

    elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to...

  9. Letting The Sun Shine On Solar Costs: An Empirical Investigation Of Photovoltaic Cost Trends In California

    E-Print Network [OSTI]

    Wiser, Ryan; Bolinger, Mark; Cappers, Peter; Margolis, Robert

    2006-01-01T23:59:59.000Z

    implications for solar suppliers and customers, and forover 11-years for customer-sited solar installations. Thiscost of customer-sited, grid-connected solar photovoltaic (

  10. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Broader source: Energy.gov (indexed) [DOE]

    data CVE-2013-3813 A remote user can exploit a flaw in the UtilityRemote Execution Server(in.rexecd) component to partially access data CVE-2013-0398 A remote user can...

  11. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server...

  12. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    the target resolver to crash IMPACT: Triggering this defect will cause the affected server to exit with an error, denying service to recursive DNS clients that use that...

  13. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  14. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  15. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target...

  16. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  17. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  18. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On systems with the 'AutoFill web forms' feature enabled, a remote...

  19. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  20. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  1. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Energy Savers [EERE]

    or modify SSLTLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch...

  2. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  3. Caching for Bursts (C-Burst): Let Hard Disks Sleep Well and Work Energetically

    E-Print Network [OSTI]

    {fchen,zhang}@cse.ohio-state.edu ABSTRACT High energy consumption has become a critical challenge in all and Xiaodong Zhang Dept. of Computer Science & Engineering The Ohio State University Columbus, OH 43210, USA to save disk energy by transitioning an idle disk to a low-power mode. However, the achievable disk energy

  4. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user on the local network with the ability to conduct a man-in-the-middle attack can impersonate the kdump SSH server to potentially access information in vmcore dumps...

  5. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Environmental Management (EM)

    This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) attack and e.g. disclose potentially sensitive information. IMPACT: A remote user can spoof...

  6. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    Service Pack 1 ABSTRACT: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS sessions. reference LINKS: Microsoft Security Advisory (2588513)...

  7. Let my people go (home) to Spain: a genealogical model of Jewish identities since 1492

    E-Print Network [OSTI]

    Weitz, Joshua S

    2013-01-01T23:59:59.000Z

    The Spanish government recently announced an official fast-track path to citizenship for any individual who is Jewish and whose ancestors were expelled from Spain during the inquisition-related dislocation of Spanish Jews in 1492. It would seem that this policy targets a small subset of the global Jewish population, i.e., restricted to individuals who retain cultural practices associated with ancestral origins in Spain. However, the central contribution of this manuscript is to demonstrate how and why the policy is far more likely to apply to a very large fraction (i.e., the vast majority) of Jews. This claim is supported using a series of genealogical models that include transmissable "identities" and preferential intra-group mating. Model analysis reveals that even when intra-group mating is strong and even if only a small subset of a present-day population retains cultural practices typically associated with that of an ancestral group, it is highly likely that nearly all members of that population have dir...

  8. Dear Students, Welcome to the Social Progress, Social Change Freshman Interest Group! Let

    E-Print Network [OSTI]

    Oregon, University of

    as people tend to think; instead, we absorb myths that favor the majority, through media, humor, language in Columbia 150. Please be sure to be punctual, as we will be changing locations soon after gathering. Bring

  9. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  10. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  11. Regulation of let-7 miRNA biogenesis in C. elegans

    E-Print Network [OSTI]

    Kai, Zoya

    2011-01-01T23:59:59.000Z

    YROM , M. , J ARVIS , R. , C HENG , A. , L ABOURIER , E. , RA. G. , B HUTKAR , A. , Z HENG , G. X. , B OSSON , A. D. , NL ANCASTER , J. M. , C HENG , J. Q. & S ELLERS , T. A. (

  12. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  13. Let's eatfor the health of it ChooseMyPlate.gov

    E-Print Network [OSTI]

    choices. · Twice a week, make seafood the protein on your plate. · Eat beans, which are a natural source with little or no added sugars. · · · Drink water instead of sugary drinks. There are about 10 packets, not full. Cook more often at home, where you are in control of what's in your food. When eating out, choose

  14. U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    HTC One Series, Sensation, Sensation XL, and possibly others; Motorola Droids, and Sony Ericsson Xperia series ABSTRACT: A vulnerability was reported in Google Android...

  15. TEORIJA IN PRAKSA let. 47, 5/2010 Pivi NAUMANEN, Hannu RUONAVAARA*

    E-Print Network [OSTI]

    Birmingham, University of

    other countries have experienced: the increase of early retirement in the 1990s and early 2000. Though on the planning and pre- paring for the retirement and old age by the Finnish home owning households. The authors, homeownership, retirement, old age care, housing equity Introduction A heated debate on retirement age

  16. TEORIJA IN PRAKSA let. 47, 5/2010 Jzsef HEGEDS, Hanna SZEMZ*

    E-Print Network [OSTI]

    Birmingham, University of

    the economic and financial pressure either went into early retirement or entered the large informal economy-AGE: FINANCING RETIREMENT AND CARE IN HUNGARY Abstract. Although discussions about aging and the consequences will focus on the analysis of these two processes influencing the strategy of households about retirement

  17. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    Acting Director of the Information Security Oversight OfficeActing Director, Information Security Oversight Office,Chemical Safety Information, Site Security and Fuels

  18. On Human Culture Let us not dream that reason can ever be popular. Passions, emo-

    E-Print Network [OSTI]

    Page, Rex L.

    languages. John Viega and Gary McGraw in Building Secure Software, 2002 Procedural programming is a monumental waste of human energy. 1985 The only important design or engineering aid offered by the object oriented paradigm is abstract data types, and they have been in use for at least 40 years. 1999

  19. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  20. Intervention Let us assume for the moment that the evidence presented

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    at the August show. Its promoter, Annette Gelles of Showmasters Gun Shows, alleged that attendance had been

  1. Let Caches Decay: Reducing Leakage Energy via Exploitation of Cache Generational Behavior

    E-Print Network [OSTI]

    Martonosi, Margaret

    's proportion of total chip power will increase signi#12;cantly. This paper examines methods for reducing in high-performance CPUs. Although power used to mainly be a concern in battery-operated devices, thermal Department of Electrical Engineering Princeton University mrm@ee.princeton.edu Power dissipation

  2. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  3. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Broader source: Energy.gov (indexed) [DOE]

    Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference...

  4. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject...

  5. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  6. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP...

  7. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were...

  8. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  9. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    in TCPIP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access. Impact: A remote...

  10. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specific TCP segments during the TCP connection termination phase. Appliances that are running versions 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected when they are configured...

  11. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and...

  12. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that,...

  13. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

  14. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can partially access data on the target...

  15. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in...

  16. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    process when shutting down the Directory Server. Multiple scripts set the LDLIBRARYPATH environment variable to an insecure value containing an empty path CVE-2011-0532. A...

  17. Gravity Train Solution Let x(t) be the coordinate along the tunnel with ...

    E-Print Network [OSTI]

    2011-04-01T23:59:59.000Z

    Mar 31, 2011 ... means that in addition to fuel efficiency and saving the environment, we also ... the middle, when r = r0, and can be found from the Energy ...

  18. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  19. -News Home Help EU offers 'sweetener' to Japan to let France host nuclear project

    E-Print Network [OSTI]

    to host a revolutionary nuclear fusion project. news web sites "I cannot elaborate on the sweetener, but I Wednesday after talks in Vienna on the International Thermonuclear Experimental Reactor (ITER). news web ( - ) -- which have supported the Japanese bid -- plus Russia and China, which back the EU bid.news web sites

  20. LET dependence of radiation-induced bystander effects using human prostate tumor cells

    E-Print Network [OSTI]

    Anzenberg, Vered

    2008-01-01T23:59:59.000Z

    In the past fifteen years, evidence provided by many independent research groups have indicated higher numbers of cells exhibiting damage than expected based on the number of cells traversed by the radiation. This phenomenon ...

  1. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  2. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  3. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Broader source: Energy.gov (indexed) [DOE]

    Support & Downloads (2.0.6.RELEASE, 2.1.2.RELEASE). Addthis Related Articles V-013: EMC Avamar Client for VMware Discloses Server Password to Local Users T-575: OpenLDAP...

  4. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  5. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  6. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  7. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Environmental Management (EM)

    Services Routers (ISRs) Cisco Catalyst 3750G Integrated WLCs Cisco Flex 7500 Series Cloud Controller Cisco Virtual Wireless Controller Cisco Wireless Controller Software for...

  8. Math 553 Practice for final December 13 2007 W. Heinzer 1. Let G ...

    E-Print Network [OSTI]

    2007-12-01T23:59:59.000Z

    If the finite group G has composition series 1 = N0 ? N1 ? N2 = G and 1 = M0 ? M1 ?···? Mr = G, prove that r = 2. 5. List representatives for each conjugacy ...

  9. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    Hole, Classified Letters Regarding FBI Whistleblower Sibel90. 93. Democrats.com, FBI Whistleblower Breaks Ashcroft’s20edmonds. 94. Kevin Bohn, FBI Translator Suit Dismissed

  10. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe following presentationsExecute

  11. V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute

  12. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute|Code |

  13. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemoteBypassDepartment of

  14. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote Users Execute

  15. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |RemoteDepartment

  16. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment ofRemote

  17. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec

  18. V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment of

  19. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment ofDepartment

  20. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment of

  1. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment ofof

  2. V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartmentAttacksMozillaof

  3. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |Microsoft pullsof

  4. V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |MicrosoftApple

  5. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities |MicrosoftAppleAttacks,

  6. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities

  7. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode | Department of

  8. V-144: HP Printers Let Remote Users Access Files on the Printer |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode | Department

  9. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode |Disclosure

  10. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode |DisclosureElevated

  11. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode | Department of

  12. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |Department

  13. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode

  14. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCodeService on the

  15. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote and Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCodeService onUsers

  16. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivilegesUnauthorized Access | Department of

  17. V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivilegesUnauthorized Access | Department

  18. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 Russian NuclearandJunetrack graphics4Dimitri Kusnezov -Purpose The Atomic

  19. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy: Thomas P.Department of Energy InternetHydrogenApril 30,Learn how

  20. his issue of Resource is about the future of agriculture, so let's talk

    E-Print Network [OSTI]

    is "the pre-eminent resource concerning expertise in food, fiber, water, and renewable energy resources will continue to grow and agricultural conditions in India will have major implications for the world. Forecasts show that India will surpass China in population sometime near the 2030 mark when it reaches nearly one

  1. Energy Efficiency is Over-Stated and Over-Rated: Let's Market the

    E-Print Network [OSTI]

    for a washing machine · Electrical Connection · Drain · A geothermal heat pump needs supply and return water) · Enabling thermal load sharing (Pool/water heating) · Longevity of system · Storm proofing (NYT · Air conditioner rejects heat · Pool heater needs heat · DHW needs heat, etc. After · Pool heater wants

  2. Let There Be Light! The Future of Memory Systems is Photonics and 3D Stacking

    E-Print Network [OSTI]

    Bergman, Keren

    National Lab {phhargrove,jshalf}@lbl.gov Bruce Jacob University of Maryland bji@umd.edu K. Scott Hemmert are not made or distributed for profit or commercial advantage and that copies bear this notice and the full

  3. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    and in the built-in media storage on the BlackBerry smartphone, but not email and other personal information stored on the file system of the BlackBerry smartphone. The following...

  4. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |Attacks | Department of Energy3: RedLogin

  5. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThis documentEnergy(SHINES)FullThe

  6. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department of

  7. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and

  8. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and|

  9. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks

  10. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgeryCode |

  11. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgeryCode

  12. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|

  13. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |PROBLEM:|Department

  14. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability

  15. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy July

  16. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy JulyUsers

  17. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability | Department

  18. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain Password

  19. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain

  20. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |UsersSessions |

  1. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |UsersSessions

  2. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1 6-30-20146

  3. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1 6-30-20146Access |

  4. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1 6-30-20146AccessUsers

  5. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1

  6. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGain Unauthorizedquery.c|

  7. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGain

  8. U-047: Siemens Automation License Manager Bugs Let Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainService or Execute

  9. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainService or

  10. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGainServiceVulnerability

  11. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code | Department

  12. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code |

  13. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpactEnergy

  14. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary

  15. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitraryPrivileges, Inject

  16. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department of

  17. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department

  18. U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Departmentof

  19. U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code |Department

  20. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code

  1. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary

  2. U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupal MultipleAddress

  3. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCode | Department of

  4. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCodeMultipleUsers

  5. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartment of

  6. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartmentURL

  7. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of

  8. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|

  9. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|Users Gain

  10. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|Users

  11. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment

  12. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting

  13. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScriptingAttacks

  14. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment

  15. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5|

  16. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis Success

  17. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1:Users Deny

  18. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1:UsersSpoof

  19. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment of

  20. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy

  1. Turn Down the Temp, But Don't Let Your Pipes Freeze! | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecember 28, 2004 Part IIIDepartmentTurn

  2. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113: Debian42:

  3. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113:

  4. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113:Energy

  5. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113:Energy|

  6. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|2:

  7. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at

  8. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury atArbitrary Code and Deny

  9. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas »of EnergyLearningMarch 2015Keep Talking: Women in STEM

  10. Let's Try That Again: Selling the Teapot Dome Oil Field | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas »of EnergyLearningMarch 2015Keep Talking: Women in

  11. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment of

  12. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment ofGain Elevated

  13. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartmentFixation Attacks |

  14. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartmentFixationof

  15. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConduct Cross-Site

  16. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConduct

  17. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere isArbitrary

  18. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThereDepartment of

  19. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemote Adjacent Authenticated

  20. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemote Adjacent

  1. V-194: Citrix XenServer Memory Management Error Lets Local Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityAppleUsers

  2. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of

  3. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft Security Bulletin AdvanceServicePotentially

  4. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft Security Bulletin

  5. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft Security BulletinDepartmentDepartment of

  6. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft Security

  7. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment

  8. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment of Energyof

  9. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|AttacksAccount

  10. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4; RSVP97 WesternTypes ofU PPrivilegesUsers

  11. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartmentTest forTechnologiesTribalInjury at the Hanford8 Annual FOIAU

  12. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixation Attacks |Elevated

  13. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixationofAuthenticationCode

  14. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBMand LocalDepartment ofService on the

  15. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote and Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBMand LocalDepartmentAccountFlaw

  16. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94:Vulnerabilities | DepartmentUnauthorized

  17. V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94:Vulnerabilities |UsersUsers Gain Root

  18. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe Ranking Member,711997 MEMORANDUM FORINCITE

  19. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretaryVideos Solid-State|Special3020-2015 JuneSpinningTime |Time

  20. STEM Exploration Sessions filled on a first come basis. Overflow may sign up for later sessions at activity location. Four ways to participate: Scheduled Activites (S); Drop-in (D); Open Demonstrations (O); Interactive Science Shows(I)

    E-Print Network [OSTI]

    Barrash, Warren

    ); Interactive Science Shows(I) - Making Waves with LIGO ­ LIGO Hanford Observatory (O) - Hewlett Packard (O) - DiveCommander.com - Control a Remote Operated Vehicle (O) Kinesiology Building ­ EXPO ­ Open Demonstrations for ALL AGES Student Union Building (SUB) ­ Food Vendors Chick Filet, Subway, Moxie, Boise River

  1. Figure 1. Typical Slow Sand Filter Schematic Supernatant Water

    E-Print Network [OSTI]

    Figure 1. Typical Slow Sand Filter Schematic Headspace Supernatant Water Schmutzdecke Raw water Supernatant drain Filter drain & backfill Sand media Support gravel Drain tile Adjustable weir Overflow weir Vent Control valve Treated Water Effluent flow control structure Overflow Assessing Temperature

  2. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  3. 1.1. Definitions. Let C be a symmetric monoidal (, 2)-category. Recall that we have an action morphism

    E-Print Network [OSTI]

    Proudfoot, Nicholas

    G8. The incoming circles are the two circles in the G8 and the loop around the outgoing circle is a sum of both loops. Homotopy classes of maps [G8 : S1 ] are parametrized by two winding numbers around

  4. Poisson Point Processes Let (S ) be as in the preceding lectures. The goal of this lecture is

    E-Print Network [OSTI]

    Khoshnevisan, Davar

    . A stochastic process := {(A)}0A is a Poisson point process with intensity [written as PPP()] if: (1) For all) for all A . Theorem 2. PPP() exists. Once you learn why PPP() exists, you should convince yourself does the job. Theorem 3 on page 23 yields the following byproduct for PPP's. Proposition 3

  5. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  6. THE NEXT BIG THING : HISTORIANS, LET US ALL BE BELGIANS ! A few comments about Belgium's heuristic power.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    to capture the circuits of information, power, knowledge, people and their impact comments about Belgium's heuristic power. There is not one ounce of irony and ponder the heuristic power of Belgium as a tool for the historian's craft

  7. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  8. Let A and a be the alleles. Then the genotypes of zygotes are AA, aa, Aa aA.

    E-Print Network [OSTI]

    Kirzhner Valery

    phenotype but the phenotype of Aa is different. Then 11 = 22 (2) but 12 is independent of 11. IV) All), of dimension 1 in the case (II) and of (III) and dimension 0 in the case (IV). In any case with fixed ik we of the population. If (p,q) is a state in a generation then (p', q' ) is the state in the next generation

  9. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  10. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  11. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  12. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  13. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  14. Don't let the river run dry: Efficiency and conservation efforts in the Rio Grande Basin

    E-Print Network [OSTI]

    Supercinski, Danielle

    2010-01-01T23:59:59.000Z

    the U.S. Department of Agriculture?s National Institute of Food and Agriculture, the RGBI project, formally titled Efficient Irrigation for Water Conservation in the Rio Grande Basin, involves about 150 researchers, specialists, and county... the project. This team works with local irrigation districts, agricultural producers, homeowners, and other state and federal agencies to address the various water issues in the basin. ?The Rio Grande Basin Initiative is a model outcome- based program...

  15. Forum: Let there be light Jay Apt and Lester Lave say power blackouts are too frequent, dangerous

    E-Print Network [OSTI]

    of the electricity system. Utilities used to transmit power from a nearby generation plant to customers. Now to federal regulators: The complexity of our electricity system puts impossible demands on human operators, industrial customers can buy power from plants hundreds of miles away, putting major burdens

  16. From ZZ to ZH : How Low Can These Cross Sections Go or Everybody, Let's Cross Section Limbo!

    SciTech Connect (OSTI)

    Strauss, Emanuel Alexandre; /SUNY, Stony Brook

    2009-08-01T23:59:59.000Z

    We report on two searches performed at the D0 detector at the Fermi National Laboratory. The first is a search for Z di-boson production with a theoretical cross section of 1.4 pb. The search was performed on 2.6 fb{sup -1} of data and contributed to the first observation of ZZ production at a hadron collider. The second is a search for a low mass Standard Model Higgs in 4.2 fb{sup -1} of data. The Higgs boson is produced in association with a Z boson where the Higgs decays hadronically and the Z decays to two leptons. The ZZ search was performed in both the di-electron and di-muon channels. For the ZH search, we will focus on the muonic decays where we expanded the traditional coverage by considering events in which one of the two muons fails the selection requirement, and is instead reconstructed as an isolated track. We consider Higgs masses between 100 and 150 GeV, with theoretical cross sections ranging from 0.17 to 0.042 pb, and set upper limits on the ZH production cross-section at 95% confidence level.

  17. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  18. 260 NATURE PHYSICS | VOL 9 | MAY 2013 | www.nature.com/naturephysics Let there be fluid light

    E-Print Network [OSTI]

    Loss, Daniel

    and positrons. Experiments with intense lasers may see this effect within a few years. But here's a theorem of human behaviour. If something is barely possible, you can trust in the inquiring human mind to make to interact more strongly has gone from fantasy to reality, and experiments now routinely produce relatively

  19. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  20. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  1. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  2. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE OGain Unauthorized Access |

  3. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE

  4. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code | Department of

  5. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of EnergyHost

  6. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success| Department ofServicesPointsInjection198: IBM

  7. Control of the specific growth rate of Bacillus subtilis for the production of biosurfactant lipopeptides in bioreactors with foam

    E-Print Network [OSTI]

    Boyer, Edmond

    lipopeptides in bioreactors with foam overflow S. CHENIKHERa , J. S. GUEZb , F. COUTTE b , M. PEKPEa , P

  8. SUR LES COURBES PARCOURS-NERGIE DES IONS POSITIFS DE CHARGE SUPRIEURE A 1 DANS LES MULSIONS NUCLAIRES

    E-Print Network [OSTI]

    Boyer, Edmond

    Foundations of Computer Science (Semester 2) ­ 2014 Assessed Exercise Sheet 5 ­ 10% of Continuous Assessment Mark Deadline : 11pm Sunday 23rd February, via Canvas Question 1 (20 marks) There are three obvious ways of merging two similarly sized heap trees s and t into a single heap tree: (i) Move the items

  9. Automating Object Transformations for Dynamic Software Updating

    E-Print Network [OSTI]

    McKinley, Kathryn S.

    - matically remains an open problem. This paper presents a solution called Targeted Object Synthesis (TOS). TOS first executes the same tests on the old and new program ver- sions separately, observing the program heap state at a few corresponding points. Given two corresponding heap states, TOS matches objects

  10. 11-01

    E-Print Network [OSTI]

    Richards-Kortum, Rebecca

    .Barronsaidtitaniumdioxideisusedtokill virusesandbacteriaandtodecomposeorganicsvia photocatalysis(exposuretolight,usuallyultravio- let

  11. Novel Binders and Methods for Agglomeration of Ore

    SciTech Connect (OSTI)

    S. K. Kawatra; T. C. Eisele; K. A. Lewandowski; J. A. Gurtler

    2006-09-30T23:59:59.000Z

    Heap leaching is one of the methods being used to recover metal from low grade ore deposits. The main problem faced during heap leaching is the migration of fine grained particles through the heap, forming impermeable beds which result in poor solution flow. The poor solution flow leads to less contact between the leach solution and the ore, resulting in low recovery rates. Agglomeration of ore into coarse, porous masses prevents fine particles from migrating and clogging the spaces and channels between the larger ore particles. Currently, there is one facility in the United States which uses agglomeration. This operation agglomerates their ore using leach solution (raffinate), but is still experiencing undesirable metal recovery from the heaps due to agglomerate breakdown. The use of a binder, in addition to the leach solution, during agglomeration would help to produce stronger agglomerates that did not break down during processing. However, there are no known binders that will work satisfactorily in the acidic environment of a heap, at a reasonable cost. As a result, operators of many facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. Increasing copper recovery in heap leaching by the use of binders and agglomeration would result in a significant decrease in the amount of energy consumed. Assuming that 70% of all the leaching heaps would convert to using agglomeration technology, as much as 1.64*10{sup 12} BTU per year would be able to be saved if a 25% increase in copper recovery was experienced, which is equivalent to saving approximately 18% of the energy currently being used in leaching heaps. For every week a leach cycle was decreased, a savings of as much as 1.23*10{sup 11} BTU per week would result. This project has identified several acid-resistant binders and agglomeration procedures. These binders and experimental procedures will be able to be used for use in improving the energy efficiency of heap leaching.

  12. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  13. Lab 2 Routing and Selection In this Lab, we will let you run some experiments with different routings to observe the

    E-Print Network [OSTI]

    Wu, An-Yeu "Andy"

    . [routing] xyz [/routing] [sel] random [/sel] 4. Modify the exploration interval of PIR(packet injection to explorer the design space. [pir] 0.001 0.050 0.005 poisson [/pir] 5. There are some default settings, you self-definition parameters, please add your parameters here. Leave the aggregation tag untouched, pir

  14. In this Appendix, we compute the eigenvectors and the Z .eigenvalues of matrix L as defined by Eq. 8 . Let the column

    E-Print Network [OSTI]

    Reising, Steven C.

    polarization at certain obser¨ation angles. Simulation results compare fa¨orably with reported JPL WINDRAD

  15. Dose-dependent misrejoining of radiation-induced DNA double-strand breaks in human fibroblasts: Experimental and theoretical study for high and low LET radiation

    E-Print Network [OSTI]

    Rydberg, Bjorn; Cooper, Brian; Cooper, Priscilla K.; Holley, William; Chatterjee, Aloke

    2004-01-01T23:59:59.000Z

    S. Kim, and R. M. Myers. Radiation hybrid mapping: a somaticformulation of dual radiation action. Radiat. Res. 75: 471-High-Linear Energy Transfer Radiation in Human Fibroblasts.

  16. The Effects of Sharp Selection under Gaussian Assumptions Assume X, X i.i.d. N(0, 1). Then for 0 < c < 1 let s = (1 -c2

    E-Print Network [OSTI]

    Buja, Andreas

    cX + sX , so that U, B N(0, 1) are jointly normal selection: E[ Y | X = x, Y > x ] = E[ cx + sX | cx + sX > x ] = cx + s E[ X | X > 1 - c s x ] = cx + s 1

  17. Let's Stay Connected! With your help the Alumni Association maintains an up-to-date record on each graduate. Please be sure

    E-Print Network [OSTI]

    Karsai, Istvan

    -mail: alumni@etsu.edu We are open around the clock at: www.etsualumni.org Please include all information possible. Mail this to the ETSU Alumni Office. Please Print. Name Maiden Name Class Year(s) Spouse's Name

  18. http://seattlepi.nwsource.com/business/368079_gatesqa24ww.html Q&A: Gates talks about letting go, the future and the foundation

    E-Print Network [OSTI]

    Sadoway, Donald Robert

    'm prodding people: 'Hey, have you looked at this,' or 'Boy, this is a really good piece of work,' or 'Maybe things, or even helping them with some of their agricultural things, or using DVD availability to help behavior, and at the company's business practices -- would you have done anything differently? Gates: Well

  19. Math 310-3 Midterm Exam 2 Spring 2009 1. Let W(t) be a one-dimensional Brownian motion with parameter 2 = 3.

    E-Print Network [OSTI]

    McClendon, David M.

    be identified with the closure of the vertex set in the polyhedral compactification. 1 #12;In [We1] and [We2 description in terms of lattices respectively seminorms. Besides, the compactification in [We2] can

  20. Is going legal the only way? Let me ease my way into the more serious stuff with a multilingual joke in questionable taste

    E-Print Network [OSTI]

    Sunder, V S

    , with the Govt. of India batting, and me as both pitcher and umpire. (You know who will win this mock game!) 1 as a strong and prosperous country is secure. Try telling that to the mother of a paraplegic child, who lives