National Library of Energy BETA

Sample records for layout bug lets

  1. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  2. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  3. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  4. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  5. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  6. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  7. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  8. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  9. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  10. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  11. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  12. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  13. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  14. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  15. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  16. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  17. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  18. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  19. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  20. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  1. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  2. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  3. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  4. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  5. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  6. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  7. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sensitive Information | Department of Energy 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat

  8. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  9. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  10. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Environmental Management (EM)

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  11. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  12. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  13. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  14. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  15. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  16. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  17. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  18. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial...

  19. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  20. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  1. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  2. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  3. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  4. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PGI PGI Bug Reports PGI Bug Reports Internal compiler error for function pointer with identically named arguments June 9, 2015 by Scott French, NERSC USG Status: Bug 21435...

  5. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  6. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  7. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    pgipgi-bug-reportsrss Internal compiler error for function pointer with identically named arguments http:www.nersc.govuserssoftwarecompilerspgipgi-bug-reports...

  8. CAF Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    caf-coarray-fortrancaf-bug-reportsrss There are currently no significant reported user bugs with CAF. http:www.nersc.govuserssoftwarecompilerscaf-coarray-fortran...

  9. GNU Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    GNU » GNU Bug Reports GNU Bug Reports There are currently no significant reported user bugs with the GNU compilers. November 18, 2013 by Mike Stewart, NERSC USG. Status: No current NERSC user bugs. Read the full post Subscribe via RSS Subscribe Browse by Date November 2013 Last edited: 2016-04-29 11:34:27

  10. Cray Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cray » Cray Bug Reports Cray Bug Reports Cray C/C++ predefined _RELEASE macro returns wrong value [updated] November 18, 2013 by Mike Stewart, NERSC USG Status: Reported to Cray as bug 797442, became documentation bug 805340. Read the full post Subscribe via RSS Subscribe Browse by Date November 2013 Last edited: 2016-04-29 11:34:26

  11. CAF Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    » CAF Bug Reports CAF Bug Reports There are currently no significant reported user bugs with CAF. November 18, 2013 No reported CAF bugs. Read the full post Subscribe via RSS Subscribe Browse by Date November 2013 Last edited: 2016-04-29 11:34:54

  12. Cray Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reports Cray Bug Reports Viewing entries posted in November 2013 Cray C/C++ predefined _RELEASE macro returns wrong value [updated] November 18, 2013 by Mike Stewart, NERSC USG Status: Reported to Cray as bug 797442, became documentation bug 805340. Read the full post Subscribe via RSS Subscribe Browse by Date November 2013 Last edited: 2016-04-29 11:34:26

  13. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  14. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    June 2015 Internal compiler error for function pointer with identically named arguments June 9, 2015 by Scott French, NERSC USG Status: Bug 21435 reported to PGI...

  15. UPC Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    upc-bug-reportsrss Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier updated http:www.nersc.govuserssoftwarecompilers...

  16. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    intel-fortran-c-and-cintel-bug-reportsrss Intel C++ compiler error: stliteratorbasetypes.h http:www.nersc.govuserssoftwarecompilersintel-fortran-c-and-c...

  17. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    November 2013 Does not take an "=" as part of the name of a source file. November 12, 2013 by Mike Stewart, NERSC USG STATUS: Bug 19671 filed with PGI.

  18. UPC Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    » UPC Bug Reports UPC Bug Reports Deadlock during first touch of upc_alloc'd remote memory when target is in upc_barrier [updated] October 16, 2014 Status: This has been reported to Cray (811537) and a workaround is available. Fixed in CCE 8.3.5. Read the full post Subscribe via RSS Subscribe Browse by Date October 2014 Last edited: 2016-04-29 11:34:42

  19. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    January 2014 Invoking any Intel compiler with a Cray wrapper with -g defaults to -O2 optimization contrary to the Intel compiler man pages January 30, 2014 Status: Filed bug 776949 with Cray but they regard it as an Intel feature. Read the full post Intel uses very old version of libstdc++ by default [updated] January 15, 2014 by Mike Stewart, NERSC USG Status: Reported to Cray as case 84319, became bug 806610

  20. Layout 1 | Department of Energy

    Office of Environmental Management (EM)

    Layout 1 Layout 1 Layout 1 (5.93 MB) More Documents & Publications Corrective Action Plan (CAP) 2008 National Defense Authorization Act for Fiscal Year 2005, Information Request, ROOT CAUSE ANALYSIS AND CORRECTIVE ACTION PLAN CLOSURE REPORT

  1. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intel » Intel Bug Reports Intel Bug Reports Intel C++ compiler error: stl_iterator_base_types.h December 7, 2015 by Scott French Because the system-supplied version of GCC is relatively old (4.3.4) it is common practice to load the gcc module on our Cray systems when C++11 support is required under the Intel C++ compilers. Read the full post C++11 header files appear missing on Edison December 3, 2014 by Scott French, NERSC USG Status: Reported to Cray (801693), Workaround available Read the

  2. 4-ID beamline layout

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sector 4 beamline layout Overview Sector 4 uses a canted undulator straight section to operate two beamlines The 4-ID-C beamline operates between 500 and 3000 eV while the 4-ID-D...

  3. Site Recommendation Subsurface Layout

    SciTech Connect (OSTI)

    C.L. Linden

    2000-06-28

    The purpose of this analysis is to develop a Subsurface Facility layout that is capable of accommodating the statutory capacity of 70,000 metric tons of uranium (MTU), as well as an option to expand the inventory capacity, if authorized, to 97,000 MTU. The layout configuration also requires a degree of flexibility to accommodate potential changes in site conditions or program requirements. The objective of this analysis is to provide a conceptual design of the Subsurface Facility sufficient to support the development of the Subsurface Facility System Description Document (CRWMS M&O 2000e) and the ''Emplacement Drift System Description Document'' (CRWMS M&O 2000i). As well, this analysis provides input to the Site Recommendation Consideration Report. The scope of this analysis includes: (1) Evaluation of the existing facilities and their integration into the Subsurface Facility design. (2) Identification and incorporation of factors influencing Subsurface Facility design, such as geological constraints, thermal loading, constructibility, subsurface ventilation, drainage control, radiological considerations, and the Test and Evaluation Facilities. (3) Development of a layout showing an available area in the primary area sufficient to support both the waste inventories and individual layouts showing the emplacement area required for 70,000 MTU and, if authorized, 97,000 MTU.

  4. UPC Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reports UPC Bug Reports Viewing entries posted in October 2014 Deadlock during first touch of upc_alloc'd remote memory when target is in upc_barrier [updated] October 16, 2014 Status: This has been reported to Cray (811537) and a workaround is available. Fixed in CCE 8.3.5. Read the full post Subscribe via RSS Subscribe Browse by Date October 2014 Last edited: 2016-04-29 11:34:42

  5. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  6. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  7. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  8. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  9. The UA9 experimental layout

    SciTech Connect (OSTI)

    Scandale, W.; Robert-Demolaize, G.; Arduini, G.; Assmann, R.; Bracco, C.; et al

    2011-10-13

    The UA9 experimental equipment was installed in the CERN-SPS in March '09 with the aim of investigating crystal assisted collimation in coasting mode. Its basic layout comprises silicon bent crystals acting as primary collimators mounted inside two vacuum vessels. A movable 60 cm long block of tungsten located downstream at about 90 degrees phase advance intercepts the deflected beam. Scintillators, Gas Electron Multiplier chambers and other beam loss monitors measure nuclear loss rates induced by the interaction of the beam halo in the crystal. Two Roman pots installed in the path of the deflected particles are equipped with a Medipix detector to reconstruct the transverse distribution of the impinging beam. Finally UA9 takes advantage of an LHC-collimator prototype installed close to the first Roman pot to help in setting the beam conditions and to analyze the efficiency to deflect the beam. This paper describes in details the hardware installed to study the crystal collimation during 2010.

  10. There are currently no significant reported user bugs with the...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    no significant reported user bugs with the GNU compilers. November 18, 2013 by Mike Stewart, NERSC USG. Status: No current NERSC user bugs. Subscribe via RSS Subscribe Browse by...

  11. There are currently no significant reported user bugs with CAF.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reports » There are currently no significant reported user bugs with CAF. There are currently no significant reported user bugs with CAF. November 18, 2013 No reported CAF bugs. Subscribe via RSS Subscribe Browse by Date November 2013 Last edited: 2013-11-18 15:10:05

  12. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  13. System Definition and Analysis: Power Plant Design and Layout...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System Definition and Analysis: Power Plant Design and Layout Citation Details In-Document Search Title: System Definition and Analysis: Power Plant Design and Layout You are ...

  14. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  15. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  16. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  17. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  18. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  19. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  20. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  1. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  2. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  3. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  4. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  5. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  6. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  7. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  8. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  9. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  10. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  11. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  12. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  13. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  14. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  15. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  16. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  17. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  18. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

  19. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  20. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  1. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  2. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  3. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Office of Energy Efficiency and Renewable Energy (EERE)

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  4. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  5. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  6. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  7. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  8. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  9. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  10. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  11. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure...

  12. There are currently no significant reported user bugs with CAF...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1-800-66-NERSC, option 3 or 510-486-8611 Home For Users Software Compilers CAF (Coarray Fortran) CAF Bug Reports There are currently no significant...

  13. Backup Generators (BUGS): The Next Smart Grid Peak Resource?...

    Open Energy Info (EERE)

    URI: cleanenergysolutions.orgcontentbackup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in...

  14. Microsoft Word - Final BUGS article final.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load Dispatchable Rapidly Deployable (< 2 ...

  15. Dr.L: Distributed Recursive (Graph) Layout

    Energy Science and Technology Software Center (OSTI)

    2007-11-19

    Dr. L provides two-dimensional visualizations of very large abstract graph structures. it can be used for data mining applications including biology, scientific literature, and social network analysis. Dr. L is a graph layout program that uses a multilevel force-directed algorithm. A graph is input and drawn using a force-directed algorithm based on simulated annealing. The resulting layout is clustered using a single link algorithm. This clustering is used to produce a coarsened graph (fewer nodes)more » which is then re-drawn. this process is repeated until a sufficiently small graph is produced. The smallest graph is drawn and then used as a basis for drawing the original graph by refining the series of coarsened graphs that were produced. The layout engine can be run in serial or in parallel.« less

  16. Microsoft Word - Final BUGS article final.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400,

  17. V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen....

  18. 80994.0709_NM:Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    prescription drug coverage through Blue Cross and Blue Shield of New Mexico offers many options, resources and advantages: * Cost savings: Using generic drugs, when right for you, can help you save money. When you visit our Web site at www.bcbsnm.com, you can find out if a brand drug has a generic equivalent available and see a list of generic alternatives. * Convenience: A broad pharmacy network allows you to choose a retail pharmacy close to you. * Time savings: The mail order program lets you

  19. Solar Power Tower Integrated Layout and Optimization Tool Background...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Power Tower Integrated Layout and Optimization Tool Background SolarPILOT(tm) offers several unique capabilities compared to other software tools. Unlike exclusively ...

  20. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be ...

  1. There are currently no significant reported user bugs with the GNU

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    compilers. Reports » There are currently no significant reported user bugs with the GNU compilers. There are currently no significant reported user bugs with the GNU compilers. November 18, 2013 by Mike Stewart, NERSC USG. Status: No current NERSC user bugs. Subscribe via RSS Subscribe Browse by Date November 2013 Last edited: 2013-11-18 14:25:14

  2. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  3. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login ...

  4. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  5. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  6. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  7. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  8. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  9. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  10. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  11. Two linear time, low overhead algorithms for graph layout

    Energy Science and Technology Software Center (OSTI)

    2008-01-10

    The software comprises two algorithms designed to perform a 2D layout of a graph structure in time linear with respect to the vertices and edges in the graph, whereas most other layout algorithms have a running time that is quadratic with respect to the number of vertices or greater. Although these layout algorithms run in a fraction of the time as their competitors, they provide competitive results when applied to most real-world graphs. These algorithmsmore » also have a low constant running time and small memory footprint, making them useful for small to large graphs.« less

  12. Library API for Z-Order Memory Layout

    Energy Science and Technology Software Center (OSTI)

    2015-02-01

    This library provides a simple-to-use API for implementing an altnerative to traditional row-major order in-memory layout, one based on a Morton- order space filling curve (SFC) , specifically, a Z-order variant of the Morton order curve. The library enables programmers to, after a simple initialization step, to convert a multidimensional array from row-major to Z- order layouts, then use a single, generic API call to access data from any arbitrary (i,j,k) location from within themore » array, whether it it be stored in row- major or z-order format. The motivation for using a SFC in-memory layout is for improved spatial locality, which results in increased use of local high speed cache memory. The basic idea is that with row-major order layouts, a data access to some location that is nearby in index space is likely far away in physical memory, resulting in poor spatial locality and slow runtime. On the other hand, with a SFC-based layout, accesses that are nearby in index space are much more likely to also be nearby in physical memory, resulting in much better spatial locality, and better runtime performance. Numerous studies over the years have shown significant runtime performance gains are realized by using a SFC-based memory layout compared to a row-major layout, sometimes by as much as 50%, which result from the better use of the memory and cache hierarchy that are attendant with a SFC-based layout (see, for example, [Beth2012]). This library implementation is intended for use with codes that work with structured, array-based data in 2 or 3 dimensions. It is not appropriate for use with unstructured or point-based data.« less

  13. Integrated Layout and Optimization Tool for Solar Power Towers |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Concentrating Solar Power | NREL Integrated Layout and Optimization Tool for Solar Power Towers The Solar Power Tower Integrated Layout and Optimization Tool (SolarPILOT(tm)) generates and characterizes power tower (central receiver) systems. This software was developed by the National Renewable Energy Laboratory (NREL). SolarPILOT consists of a graphical user interface (GUI) and an application programming interface (API) through which external programs can access SolarPILOT's functionality.

  14. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  15. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  16. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  17. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  18. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  19. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  20. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  1. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host.

  2. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  3. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  4. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  5. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  6. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  7. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  8. Electrochromism vs. the Bugs:DevelopingWO3 Thin Film Windows...

    Office of Scientific and Technical Information (OSTI)

    Title: Electrochromism vs. the Bugs:DevelopingWO3 Thin Film Windows toControl Photoactive Biological Systems. Abstract not provided. Authors: Small, Leo J ; Spoerke, Erik David ; ...

  9. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated...

  10. Compiler-Directed File Layout Optimization for Hierarchical Storage Systems

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ding, Wei; Zhang, Yuanrui; Kandemir, Mahmut; Son, Seung Woo

    2013-01-01

    File layout of array data is a critical factor that effects the behavior of storage caches, and has so far taken not much attention in the context of hierarchical storage systems. The main contribution of this paper is a compiler-driven file layout optimization scheme for hierarchical storage caches. This approach, fully automated within an optimizing compiler, analyzes a multi-threaded application code and determines a file layout for each disk-resident array referenced by the code, such that the performance of the target storage cache hierarchy is maximized. We tested our approach using 16 I/O intensive application programs and compared its performancemore » against two previously proposed approaches under different cache space management schemes. Our experimental results show that the proposed approach improves the execution time of these parallel applications by 23.7% on average.« less

  11. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  12. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of ...

  13. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  14. Solar Decathlon 2015: Let the Competition Begin | Department...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Let the Competition Begin Solar Decathlon 2015: Let the Competition Begin February 13, 2014 - 1:00pm Addthis The Solar Decathlon competition has provided more than 17,000 college ...

  15. Sandia National Laboratories: Let it rain

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Let it rain By Karli Massey Thursday, September 01, 2016 Sandia's clean water stewards focus on stormwater runoff Sandia experts, students explore mechanical challenges at summer institute Environmental technical professional John Kay (4141) inspects a construction site at Sandia before a storm to ensure proper protection measures are in place near stormwater drains. Monsoon season is well underway in New Mexico and other areas across the Southwest. The flash floods caused by monsoon storms

  16. Lower-Temperature Subsurface Layout and Ventilation Concepts

    SciTech Connect (OSTI)

    Christine L. Linden; Edward G. Thomas

    2001-06-20

    This analysis combines work scope identified as subsurface facility (SSF) low temperature (LT) Facilities System and SSF LT Ventilation System in the Technical Work Plan for Subsurface Design Section FY 01 Work Activities (CRWMS M&O 2001b, pp. 6 and 7, and pp. 13 and 14). In accordance with this technical work plan (TWP), this analysis is performed using AP-3.10Q, Analyses and Models. It also incorporates the procedure AP-SI.1Q, Software Management. The purpose of this analysis is to develop an overall subsurface layout system and the overall ventilation system concepts that address a lower-temperature operating mode for the Monitored Geologic Repository (MGR). The objective of this analysis is to provide a technical design product that supports the lower-temperature operating mode concept for the revision of the system description documents and to provide a basis for the system description document design descriptions. The overall subsurface layout analysis develops and describes the overall subsurface layout, including performance confirmation facilities (also referred to as Test and Evaluation Facilities) for the Site Recommendation design. This analysis also incorporates current program directives for thermal management.

  17. Coherent Image Layout using an Adaptive Visual Vocabulary

    SciTech Connect (OSTI)

    Dillard, Scott E.; Henry, Michael J.; Bohn, Shawn J.; Gosink, Luke J.

    2013-03-06

    When querying a huge image database containing millions of images, the result of the query may still contain many thousands of images that need to be presented to the user. We consider the problem of arranging such a large set of images into a visually coherent layout, one that places similar images next to each other. Image similarity is determined using a bag-of-features model, and the layout is constructed from a hierarchical clustering of the image set by mapping an in-order traversal of the hierarchy tree into a space-filling curve. This layout method provides strong locality guarantees so we are able to quantitatively evaluate performance using standard image retrieval benchmarks. Performance of the bag-of-features method is best when the vocabulary is learned on the image set being clustered. Because learning a large, discriminative vocabulary is a computationally demanding task, we present a novel method for efficiently adapting a generic visual vocabulary to a particular dataset. We evaluate our clustering and vocabulary adaptation methods on a variety of image datasets and show that adapting a generic vocabulary to a particular set of images improves performance on both hierarchical clustering and image retrieval tasks.

  18. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  19. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Broader source: Energy.gov (indexed) [DOE]

    T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets ...

  20. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  1. LAYOUT AND SIZING OF ESF ALCOVES AND REFUGE CHAMBERS

    SciTech Connect (OSTI)

    John Beesley and Romeo S. Jurani

    1995-08-25

    The purpose of this analysis is to establish size requirements and approximate locations of Exploratory Studies Facility (ESF) test and operations alcoves, including refuge chambers during construction of the Topopah Spring (TS) loop. Preliminary conceptual layouts for non-deferred test alcoves will be developed to examine construction feasibility based on current test plans and available equipment. The final location and configuration layout for alcoves will be developed when in-situ rock conditions can be visually determined. This will be after the TBM has excavated beyond the alcove location and the rock has been exposed. The analysis will examine the need for construction of walkways and electrical alcoves in the ramps and main drift. Niches that may be required to accommodate conveyor booster drives and alignments are not included in this analysis. The analysis will develop design criteria for refuge chambers to meet MSHA requirements and will examine the strategic location of refuge chambers based on their potential use in various ESF fire scenarios. This document supersedes DI:BABE00000-01717-0200-00003 Rev 01, ''TS North Ramp Alcove and Stubout Location Analysis'' in its entirety (Reference 5-6).

  2. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  3. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  4. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  5. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  6. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  7. SAMPLE (Sandia Agile MEMS Prototyping, Layout tools, and Education)

    SciTech Connect (OSTI)

    Davies, B.R.; Barron, C.C.; Sniegowski, J.J.; Rodgers, M.S.

    1997-08-01

    The SAMPLE (Sandia Agile MEMS Protyping, Layout tools, and Education) service makes Sandia`s state-of-the-art surface-micromachining fabrication process, known as SUMMiT, available to US industry for the first time. The service provides a short cause and customized computer-aided design (CAD) tools to assist customers in designing micromachine prototypes to be fabricated in SUMMiT. Frequent small-scale manufacturing runs then provide SAMPLE designers with hundreds of sophisticated MEMS (MicroElectroMechanical Systems) chips. SUMMiT (Sandia Ultra-planar, Multi-level MEMS Technology) offers unique surface-micromachining capabilities, including four levels of polycrystalline silicon (including the ground layer), flanged hubs, substrate contacts, one-micron design rules, and chemical-mechanical polishing (CMP) planarization. This paper describes the SUMMiT process, design tools, and other information relevant to the SAMPLE service and SUMMiT process.

  8. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  9. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE)

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  10. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    update | Department of Energy 12: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat

  11. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    update | Department of Energy 12: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat

  12. Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness

  13. Sandia Agile MEMS Prototyping, Layout Tools, Education and Services Program

    SciTech Connect (OSTI)

    Schriner, H.; Davies, B.; Sniegowski, J.; Rodgers, M.S.; Allen, J.; Shepard, C.

    1998-05-01

    Research and development in the design and manufacture of Microelectromechanical Systems (MEMS) is growing at an enormous rate. Advances in MEMS design tools and fabrication processes at Sandia National Laboratories` Microelectronics Development Laboratory (MDL) have broadened the scope of MEMS applications that can be designed and manufactured for both military and commercial use. As improvements in micromachining fabrication technologies continue to be made, MEMS designs can become more complex, thus opening the door to an even broader set of MEMS applications. In an effort to further research and development in MEMS design, fabrication, and application, Sandia National Laboratories has launched the Sandia Agile MEMS Prototyping, Layout Tools, Education and Services Program or SAMPLES program. The SAMPLES program offers potential partners interested in MEMS the opportunity to prototype an idea and produce hardware that can be used to sell a concept. The SAMPLES program provides education and training on Sandia`s design tools, analysis tools and fabrication process. New designers can participate in the SAMPLES program and design MEMS devices using Sandia`s design and analysis tools. As part of the SAMPLES program, participants` designs are fabricated using Sandia`s 4 level polycrystalline silicon surface micromachine technology fabrication process known as SUMMiT (Sandia Ultra-planar, Multi-level MEMS Technology). Furthermore, SAMPLES participants can also opt to obtain state of the art, post-fabrication services provided at Sandia such as release, packaging, reliability characterization, and failure analysis. This paper discusses the components of the SAMPLES program.

  14. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  15. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  16. Objectives and layout of a high-resolution x-ray imaging crystal...

    Office of Scientific and Technical Information (OSTI)

    x-ray imaging crystal spectrometer for the large helical device Citation Details In-Document Search Title: Objectives and layout of a high-resolution x-ray imaging ...

  17. Objectives and Layout of a High-Resolution X-ray Imaging Crystal...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Objectives and Layout of a High-Resolution X-ray Imaging Crystal Spectrometer for the Large Helical Device (LHD) Citation Details In-Document Search Title: ...

  18. Objectives and Layout of a High-Resolution X-ray Imaging Crystal...

    Office of Scientific and Technical Information (OSTI)

    Imaging Crystal Spectrometer for the Large Helical Device (LHD) Citation Details In-Document Search Title: Objectives and Layout of a High-Resolution X-ray Imaging Crystal ...

  19. T:\ClearanceEMEUConsumption\cbecs\pubuse89\txt\layouts&formats.txt

    U.S. Energy Information Administration (EIA) Indexed Site

    9/txt/layouts&formats.txt[3/19/2009 11:26:00 AM] December, 2008 1989 CBECS Building Characteristics and Consumption and Expenditures for All Buildings Public Use Files This document contains all the file layouts and format codes for the 1989 Commercial Buildings Energy Consumption Survey (CBECS) building characteristics and consumption and expenditures public use files. The files themselves can be downloaded in CSV (comma separated values) files from the CBECS web site:

  20. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  1. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  2. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  3. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am ...

  4. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  5. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  6. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  7. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  8. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  9. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  10. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  11. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  12. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  13. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  14. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  15. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  16. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  17. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  18. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  19. Layout And Results From The Initial Opeeration Of The High-resolution X-ray

    Office of Scientific and Technical Information (OSTI)

    Imaging Crystal Spectrometer On The Large Helical Device (Technical Report) | SciTech Connect Layout And Results From The Initial Opeeration Of The High-resolution X-ray Imaging Crystal Spectrometer On The Large Helical Device Citation Details In-Document Search Title: Layout And Results From The Initial Opeeration Of The High-resolution X-ray Imaging Crystal Spectrometer On The Large Helical Device First results of ion and electron temperature pro le measurements from the x-ray imaging

  20. Microsoft Word - EN_M278 - NIM Optical Layout.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SSRL ENGINEERING NOTE M278 Page 1 of 6 March 20, 1997 M. Rowen Beam Line 5-4 NIM, Optical Layout and Alignment Data Purpose: This document specifies the optical layout for the beam line 5-4 Normal Incidence Monochromator (NIM) and the position of all otical elements and brass plugs for use in alignment. The 5-4 NIM is optimized for high flux with resolution to match that of a 200 mm SCIENTA electron spectrometer. The energy range is 10 to 40 eV with a resolution of better than 0.3 meV at a slit

  1. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  2. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  3. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  4. Accelerator-based conversion (ABC) of weapons plutonium: Plant layout study and related design issues

    SciTech Connect (OSTI)

    Cowell, B.S.; Fontana, M.H.; Krakowski, R.A.; Beard, C.A.; Buksa, J.J.; Davidson, J.W.; Sailor, W.C.; Williamson, M.A.

    1995-04-01

    In preparation for and in support of a detailed R and D Plan for the Accelerator-Based Conversion (ABC) of weapons plutonium, an ABC Plant Layout Study was conducted at the level of a pre-conceptual engineering design. The plant layout is based on an adaptation of the Molten-Salt Breeder Reactor (MSBR) detailed conceptual design that was completed in the early 1070s. Although the ABC Plant Layout Study included the Accelerator Equipment as an essential element, the engineering assessment focused primarily on the Target; Primary System (blanket and all systems containing plutonium-bearing fuel salt); the Heat-Removal System (secondary-coolant-salt and supercritical-steam systems); Chemical Processing; Operation and Maintenance; Containment and Safety; and Instrumentation and Control systems. Although constrained primarily to a reflection of an accelerator-driven (subcritical) variant of MSBR system, unique features and added flexibilities of the ABC suggest improved or alternative approaches to each of the above-listed subsystems; these, along with the key technical issues in need of resolution through a detailed R&D plan for ABC are described on the bases of the ``strawman`` or ``point-of-departure`` plant layout that resulted from this study.

  5. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  6. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rewards | Department of Energy Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website. Spotlight on Austin, Texas (444.88 KB) More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on

  7. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  8. DESIGN AND LAYOUT CONCEPTS FOR COMPACT, FACTORY-PRODUCED, TRANSPORTABLE, GENERATION IV REACTOR SYSTEMS

    SciTech Connect (OSTI)

    Mynatt Fred R.; Townsend, L.W.; Williamson, Martin; Williams, Wesley; Miller, Laurence W.; Khan, M. Khurram; McConn, Joe; Kadak, Andrew C.; Berte, Marc V.; Sawhney, Rapinder; Fife, Jacob; Sedler, Todd L.; Conway, Larry E.; Felde, Dave K.

    2003-11-12

    The purpose of this research project is to develop compact (100 to 400 MWe) Generation IV nuclear power plant design and layout concepts that maximize the benefits of factory-based fabrication and optimal packaging, transportation and siting. The reactor concepts selected were compact designs under development in the 2000 to 2001 period. This interdisciplinary project was comprised of three university-led nuclear engineering teams identified by reactor coolant type (water, gas, and liquid metal) and a fourth Industrial Engineering team. The reactors included a Modular Pebble Bed helium-cooled concept being developed at MIT, the IRIS water-cooled concept being developed by a team led by Westinghouse Electric Company, and a Lead-Bismuth-cooled concept developed by UT. In addition to the design and layout concepts this report includes a section on heat exchanger manufacturing simulations and a section on construction and cost impacts of proposed modular designs.

  9. Towards a more accurate extraction of the SPICE netlist from MAGIC based layouts

    SciTech Connect (OSTI)

    Geronimo, G.D.

    1998-08-01

    The extraction of the SPICE netlist form MAGIC based layouts is investigated. It is assumed that the layout is fully coherent with the corresponding mask representation. The process of the extraction can be made in three steps: (1) extraction of .EXT file from layout, through MAGIC command extract; (2) extraction of the netlist from .EXT file through ext2spice extractor; and (3) correction of the netlist through ext2spice.corr program. Each of these steps introduces some approximations, most of which can be optimized, and some errors, most of which can be corrected. Aim of this work is the description of each step, of the approximations and errors on each step, and of the corresponding optimizations and corrections to be made in order to improve the accuracy of the extraction. The HP AMOS14TB 0.5 {micro}m process with linear capacitor and silicide block options and the corresponding SCN3MLC{_}SUBM.30.tech27 technology file will be used in the following examples.

  10. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  11. Let7a involves in neural stem cell differentiation relating with TLX level

    SciTech Connect (OSTI)

    Song, Juhyun; Cho, Kyoung Joo; Oh, Yumi; Lee, Jong Eun

    2015-07-10

    Neural stem cells (NSCs) have the potential for differentiation into neurons known as a groundbreaking therapeutic solution for central nervous system (CNS) diseases. To resolve the therapeutic efficiency of NSCs, recent researchers have focused on the study on microRNA's role in CNS. Some micro RNAs have been reported significant functions in NSC self-renewal and differentiation through the post-transcriptional regulation of neurogenesis genes. MicroRNA-Let7a (Let7a) has known as the regulator of diverse cellular mechanisms including cell differentiation and proliferation. In present study, we investigated whether Let7a regulates NSC differentiation by targeting the nuclear receptor TLX, which is an essential regulator of NSC self-renewal, proliferation and differentiation. We performed the following experiments: western blot analysis, TaqMan assay, RT-PCR, and immunocytochemistry to confirm the alteration of NSCs. Our data showed that let7a play important roles in controlling NSC fate determination. Thus, manipulating Let-7A and TLX could be a novel strategy to enhance the efficiency of NSC's neuronal differentiation for CNS disorders. - Highlights: • Let7a influences on NSC differentiation and proliferation. • Let7a involves in mainly NSC differentiation rather than proliferation. • Let7a positively regulates the TLX expression.

  12. Don't Let Your Money and Hot Water Go Down the Drain | Department...

    Energy Savers [EERE]

    Don't Let Your Money and Hot Water Go Down the Drain Don't Let Your Money and Hot Water Go Down the Drain December 9, 2008 - 4:00am Addthis John Lippert Do you look at your ...

  13. Layout 1

    Office of Environmental Management (EM)

    ANNUAL REPORT 2007 SEPA ANNUAL REPORT Contents Fast Facts ..........................................................................................2 Letter to the Secretary .......................................................................3 Marketing Area .................................................................................4 Customer Funding.............................................................................5 Energy Efficiency and Renewable Energy Program

  14. Layout 1

    Office of Environmental Management (EM)

    Southeastern Power Administration Annual Report 2012 Hartwell Dam 50th Anniversary 2 0 1 2 A N N U A L R E P O R T S O U T H E A S T E R N P O W E R A D M I N I S T R A T I O N 2 Fast Facts ....................................................................................................................2 Letter to the Secretary ..............................................................................................3 Human Capital Initiatives

  15. Layout 1

    Office of Environmental Management (EM)

    HE MISSION of Southeastern Power Administration is to market and deliver federal hydroelectric power at the lowest possible cost to public bodies and cooperatives in the southeastern United States. Southeastern will excel in an evolving energy market by maintaining a well-trained, flexible workforce in an open, rewarding and safe environment. Marketing Area: Alabama, Florida, Georgia, Illinois, Kentucky, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, and West Virginia

  16. Layout 1

    Office of Environmental Management (EM)

    vi This page intentionally left blank. vii Contract and Project Management: Corrective Action Plan JULY 2008 Executive Summary Achieving and maintaining excellence in contract and project management is a top priority for the Department of Energy (DOE). To accomplish this goal, the Department has already implemented a series of significant contract and project management reforms, including the conduct of a root cause analysis (RCA) to identify the major challenges to planning and managing DOE

  17. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Table of Contents The inability to globally search the Web is an enormous gap that ... They need to explore the deep Web, where specialized databases are beyond the reach of ...

  18. SQE Layout

    National Nuclear Security Administration (NNSA)

    ASC - SQE-2000-FDRFT-VERS2 February 2001 Goals, Principles, and Guidelines ASCI at Livermore National Laboratory: A Hydrodynamic Instability Calculation on the cover: graphic design and production Michael Vittitow - Creative Arts Department-12620, Sandia National Laboratories, Albuquerque, NM. ASCI Software Quality Engineering: Goals, Principles, and Guidelines Authors Sandia National Laboratories Ann Hodges and Gary Froehlich Information Systems Engineering Center David Peercy Surety Assessment

  19. Layout 1

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... system generation in order to provide a method of sharing all remaining system ... based on the findings of the External Peer Review Panel for Dam Safety (the Panel). ...

  20. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Does Your Poison Center Help You? First Aid for Poisoning If a person 4 stops breathing 4 collapses, or 4 has a seizure Call 911 right away. Poison in the eyes? Rinse eyes with running water. Call your poison center at 1-800-222-1222. Poison on the skin? Take off any clothing that the poison touched. Rinse skin with running water. Call your poison center at 1-800-222-1222. Inhaled poison? Get to fresh air right away. Call your poison center at 1-800-222-1222. Swallowed poison? Call your poison

  1. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    use a Portable Fire Extinguisher Brought to you by www.femalifesafety.org For more fire protection training materials, please visit: www.femalifesafety.org 2006 © Fire Equipment Manufacturers' Association FIRE EQUIPMENT MANUFACTURERS' ASSOCIATION, INC. 1300 Sumner Avenue Cleveland, OH 44115-2851 Tel: 216-241-7333 Fax: 216-241-0105 FEMA, The Life Safety Group is an international, non-profit trade association dedicated to saving lives and protecting property through first line of defense fire

  2. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Yucca Mountain Pursuing a License MiniSAR offers promise Foams fight SARS virus What is Sandia's world-class science, technology, and engineering work define the Lab's value to the nation. These capabilities must remain on the cutting edge, because the security of the U.S. depends directly upon them. Sandia's Laboratory Directed Research and Development ( ) Program provides the flexibility to invest in long- term, high-risk, and potentally high-pay-off research and development that stretches

  3. Layout1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

  4. Layout 1

    Energy Savers [EERE]

    ... the Cumberland River hydroelectric facilities operated by ... which concluded that the dams were at high risk for failure. ... scheduling hydropower generation at the Corps' facilities ...

  5. Layout 1

    Broader source: Energy.gov (indexed) [DOE]

    ... Southeastern's mission is to market Federal hydroelectric ... experts which concluded the dams were at high risk for ... Actual Generation as a Percentage of Average Project ...

  6. Layout 1

    Broader source: Energy.gov (indexed) [DOE]

    ... OFFICE OF INSPECTOR GENERAL 14 We found that, despite various corrective actions, the Department had not fully resolved problems in emergency preparedness planning. For instance, ...

  7. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    22 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION Emerging paradigms for next-generation net- work architectures revolve around the notion of the network as a heterogeneous "multilayer, multitechnology" construct over which multiple "services" can be provided. These services include traditional IP-routed services as well as native access services from lower layers based on technologies such as multiprotocol label switch- ing (MPLS), Ethernet, Ethernet provider back- bone

  8. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    32 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION A grid network is a collection of geographical- ly distributed resources, such as storage clus- ters, supercomputers, and scientific equipment, that are accessible to users over a network. Examples of e-Science grids include the Large Hadron Collider Computing Grid Project, the Biomedical Informatics Research Network, and the George E. Brown Network for Earthquake Engineering and Simulation. These networks typically deal with the trans- fer of

  9. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    14 0163-6804/11/$25.00 © 2011 IEEE 1 See the reports collected at http://www.es.net/ requirements.html 2 See "National Lab" and "User Facilities" tabs at http://www.sc.doe.gov/ INTRODUCTION Across a number of scientific disciplines, users are demanding more network capabilities, including higher network end-to-end throughput, guaranteed bandwidth, and quality of service, in order to collaborate and share large amounts of data around the globe. In many fields, scientific

  10. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SRSCRO As the U. S. Department of Energy's designated Community Reuse Organization (CRO), the SRSCRO is a 501 (C) (3) private non-profit organization. SRSCRO is charged with developing and implementing a comprehensive strategy to diversify the economy of the five-county SRSCRO region in the Central Savannah River Area (CSRA) of Georgia and South Carolina. SRSCRO is governed by a 22-member Board of Directors composed of business, government and academic leaders from Georgia and South Carolina.

  11. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    s in a relay race, if you want your organization's strategic vision to "reach the finish line" and achieve your goals, leaders all down the line must achieve a successful "handoff " of information and develop people and strategies to make it work. The relay race is the only track event where one participates with a team, as opposed to individually. Individual performance during each participant's run is certainly important, but the real measure of a relay team is how the

  12. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    "We can't keep going in our old facility." "It's less expensive to work in a modern, safe facility than to try to heat old buildings and "shore them up." These were things said by Thomas D'Agostino, Under Secretary for Nuclear Security and Administrator, National Nuclear Security Administration (NNSA) during a 2011 trip to the Y-12 National Security Complex in Oak Ridge, TN. But they could just as easily apply to the Savannah River Site (SRS), especially when it comes

  13. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This year ends my first year of a two-year term as Chair of the SRS Community Reuse Organization (SRSCRO). We have made tremendous progress on the three focus areas the Board and I wanted to concentrate on when I took office. Since the space in this Annual Report limits us on what we can cover, I would like to emphasize just two of those areas: * Education, and * Asset Revitalization In addition to my role as Chair of the SRSCRO, my real job is Dean of the Hull Business College at Augusta State

  14. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SRSCRO BOARD OF DIRECTORS 2013 South Carolina Danny R. Black, SC Representative at Large* SouthernCarolina Alliance Congressional Appointment Terra L. Carroll Greater North Augusta Chamber of Commerce Greater North Augusta Chamber of Commerce Appointment Fred E. Humes Economic Development Partnership Economic Development Partnership Appointment J. David Jameson, SRSCRO Immediate Past Chair* Greater Aiken Chamber of Commerce Greater Aiken Chamber of Commerce Appointment Dr. Sandra J. Jordan

  15. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The SRS Community Reuse Organization (SRSCRO) undertook a comprehensive regional education campaign over the past year and a half aimed at developing a community consensus regarding a path forward in responding to the Government's decision to halt work on Yucca Mountain. As a regional voice for issues related to the Savannah River Site (SRS), the SRSCRO campaign was designed to raise awareness of this important topic among community leaders. The SRSCRO made presentations to elected bodies,

  16. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chancellor's Distinguished Lectureship Series Nanotechnology: Thinking Small or Small Thinking? Chad Mirkin Northwestern University Director of Institute for Nanotechnology...

  17. Layout 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Applications Chad Mirkin Northwestern University Director of Institute for Nanotechnology Distinguished Professor of Chemistry Technical Talk Tuesday, September 20, 2005...

  18. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  19. Optical layout and mechanical structure of polarimeter-interferometer system for Experimental Advanced Superconducting Tokamak

    SciTech Connect (OSTI)

    Zou, Z. Y.; Liu, H. Q. Jie, Y. X.; Wang, Z. X.; Shen, J. S.; An, Z. H.; Yang, Y.; Zeng, L.; Wei, X. C.; Li, G. S.; Zhu, X.; Ding, W. X.; Brower, D. L.; Lan, T.

    2014-11-15

    A Far-InfaRed (FIR) three-wave POlarimeter-INTerferometer (POINT) system for measurement current density profile and electron density profile is under development for the EAST tokamak. The FIR beams are transmitted from the laser room to the optical tower adjacent to EAST via ?20 m overmoded dielectric waveguide and then divided into 5 horizontal chords. The optical arrangement was designed using ZEMAX, which provides information on the beam spot size and energy distribution throughout the optical system. ZEMAX calculations used to optimize the optical layout design are combined with the mechanical design from CATIA, providing a 3D visualization of the entire POINT system.

  20. zorder-lib: Library API for Z-Order Memory Layout

    SciTech Connect (OSTI)

    Nowell, Lucy; Edward W. Bethel

    2015-04-01

    This document describes the motivation for, elements of, and use of the zorder-lib, a library API that implements organization of and access to data in memory using either a-order (also known as "row-major" order) or z-order memory layouts. The primary motivation for this work is to improve the performance of many types of data- intensive codes by increasing both spatial and temporal locality of memory accesses. The basic idea is that the cost associated with accessing a datum is less when it is nearby in either space or time.

  1. T:\ClearanceEMEUConsumption\cbecs\pubuse86\txt\cb86sasfmt&layout.txt

    U.S. Energy Information Administration (EIA) Indexed Site

    6/txt/cb86sasfmt&layout.txt[3/17/2009 4:43:14 PM] File 1: Summary File (cb86f01.csv) Ques- tion- naire Variable Variable Variable Variable item Description Name Position Format Building identifier BLDGID3 1- 5 Adjusted weight ADJWT3 7- 14 Variance stratum STRATUM3 16- 17 Pair member PAIR3 19- 19 Census region REGION3 21- 21 $REGION. Census division CENDIV3 23- 23 $CENDIV. Metropolitan statistical area MSA3 25- 25 $MSA. Climate zone CLIMATE3 27- 27 $CLIMAT. B-1 Square footage SQFT3 29- 35

  2. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  3. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  4. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  5. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  6. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  7. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  8. MicroRNAs let-7b/i suppress human glioma cell invasion and migration by targeting IKBKE directly

    SciTech Connect (OSTI)

    Tian, Yuan; Hao, Shaobo; Ye, Minhua; Zhang, Anling; Nan, Yang; Wang, Guangxiu; Jia, Zhifan; Yu, Kai; Guo, Lianmei; Pu, Peiyu; Huang, Qiang; Zhong, Yue

    2015-03-06

    We demonstrated that IKBKE is overexpressed in human gliomas and that the downregulation of IKBKE markedly inhibits the proliferative and invasive abilities of glioma cells, which is consistent with the results reported by several different research groups. Therefore, IKBKE represents a promising therapeutic target for the treatment of glioma. In the present study, we verified that the microRNAs let-7b and let-7i target IKBKE through luciferase assays and found that let-7b/i mimics can knock down IKBKE and upregulate E-cadherin through western blot analysis. Moreover, the expression levels of let-7b/i were significantly lower in glioma cell lines than that in normal brain tissues, as determined by quantitative real-time PCR. Furthermore, let-7b/i inhibit the invasion and migration of glioma cells, as determined through wound healing and Transwell assays. The above-mentioned data suggest that let-7b/i inhibit the invasive ability of glioma cells by directly downregulating IKBKE and indirectly upregulating E-cadherin. - Highlights: • Let-7b and let-7i are downregulated in glioma cell lines. • IKBKE is a target gene of let-7b/i. • Let-7b/i inhibit the invasion and migration of glioma cells. • Let-7b/i upregulate E-cadherin by downregulating IKBKE.

  9. Mirror panel layouts for an icosahedral solar bowl. The Crosbyton Solar Power Project

    SciTech Connect (OSTI)

    Anderson, R.M.; Barnard, R.W.; Ford, W.T.

    1986-03-15

    This study is concerned with designing mirror panel layouts for a spherical shaped solar bowl. It was carried out as part of the Crosbyton Solar Power Project (CSPP). The CSPP is concerned with the development of a technology for producing electric power from steam generated by reflection of the sun's rays from a fixed mirror solar bowl onto a tracking receiver. In this system, the receiver is cantilevered and pivots about the center of curvature of the mirror. This study describes mathematical techniques for designing the mirror surface. The method is based on an icosahedral breakdown of the surface of a sphere and the resulting bowl is called an icosahedral bowl. As an example, a sixty degree icosahedral bowl is constructed from two sets of fifteen identical spherical triangles. These thirty spherical triangles are called superpanels and are used to support several smaller mirrors. The small mirrors used to cover the surface of the icosahedral bowl are hexagonal in shape. This shape mirror gives extremely good coverage of the bowl surface and minimizes parameters such as total mirror perimeter and gap area between mirrors. In addition, this choice of mirror shape yields the same mirror panel layout on each superpanel.

  10. Time cycle analysis and simulation of material flow in MOX process layout

    SciTech Connect (OSTI)

    Chakraborty, S.; Saraswat, A.; Danny, K.M.; Somayajulu, P.S.; Kumar, A.

    2013-07-01

    The (U,Pu)O{sub 2} MOX fuel is the driver fuel for the upcoming PFBR (Prototype Fast Breeder Reactor). The fuel has around 30% PuO{sub 2}. The presence of high percentages of reprocessed PuO{sub 2} necessitates the design of optimized fuel fabrication process line which will address both production need as well as meet regulatory norms regarding radiological safety criteria. The powder pellet route has highly unbalanced time cycle. This difficulty can be overcome by optimizing process layout in terms of equipment redundancy and scheduling of input powder batches. Different schemes are tested before implementing in the process line with the help of a software. This software simulates the material movement through the optimized process layout. The different material processing schemes have been devised and validity of the schemes are tested with the software. Schemes in which production batches are meeting at any glove box location are considered invalid. A valid scheme ensures adequate spacing between the production batches and at the same time it meets the production target. This software can be further improved by accurately calculating material movement time through glove box train. One important factor is considering material handling time with automation systems in place.