Powered by Deep Web Technologies
Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

2

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain...

3

VIQI: A New Approach for Visual Interpretation of Deep Web Query Interfaces  

E-Print Network [OSTI]

Deep Web databases contain more than 90% of pertinent information of the Web. Despite their importance, users don't profit of this treasury. Many deep web services are offering competitive services in term of prices, quality of service, and facilities. As the number of services is growing rapidly, users have difficulty to ask many web services in the same time. In this paper, we imagine a system where users have the possibility to formulate one query using one query interface and then the system translates query to the rest of query interfaces. However, interfaces are created by designers in order to be interpreted visually by users, machines can not interpret query from a given interface. We propose a new approach which emulates capacity of interpretation of users and extracts query from deep web query interfaces. Our approach has proved good performances on two standard datasets.

Boughamoura, Radhouane; Omri, Mohamed Nazih

2012-01-01T23:59:59.000Z

4

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

5

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

6

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

3:15pm 3:15pm Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

7

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

7:03am 7:03am Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

8

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute...

9

Demonstration of User Interfaces for Querying in 3D Architectural Content in PROBADO3D  

E-Print Network [OSTI]

]) (cf. Figure 1(b)). The other uses the modeling capabilities of Google Sketchup [3] (cf. Figure 1(c of the answer models as a query-by-example key. (a) Building model (b) Volume editor (c) Google Sketchup: Google sketchup (2009) http://sketchup.google.com/. #12;

Eckmiller, Rolf

10

Querying genomic databases  

SciTech Connect (OSTI)

A natural-language interface has been developed that retrieves genomic information by using a simple subset of English. The interface spares the biologist from the task of learning database-specific query languages and computer programming. Currently, the interface deals with the E. coli genome. It can, however, be readily extended and shows promise as a means of easy access to other sequenced genomic databases as well.

Baehr, A.; Hagstrom, R.; Joerg, D.; Overbeek, R.

1991-09-01T23:59:59.000Z

11

HDF5-FastQuery: An API for Simplifying Access to Data Storage, Retrieval, Indexing and Querying  

E-Print Network [OSTI]

Accomplishment HDF5-FastQuery: An API for Simplifying Accessprogramming interface (API) that simplifies data storage andindexing/querying. The API, which we call HDF5-FastQuery,

Bethel, E. Wes; Gosink, Luke; Shalf, John; Stockinger, Kurt; Wu, Kesheng

2006-01-01T23:59:59.000Z

12

Query | Department of Energy  

Office of Environmental Management (EM)

Query Query Query Query1.pdf Query More Documents & Publications DOE Retrospective Review Plan and Burden Reduction Report July 29, 2013 DOE EO 13563 January 2014 Update Report...

13

boolean queries Inverted index  

E-Print Network [OSTI]

boolean queries Inverted index query processing Query optimization boolean model September 9, 2014 1 / 39 #12;boolean queries Inverted index query processing Query optimization Outline 1 boolean queries 2 Inverted index 3 query processing 4 Query optimization 2 / 39 #12;boolean queries Inverted index

Lu, Jianguo

14

Query Suggestions for Mobile Search: Understanding Usage Patterns  

E-Print Network [OSTI]

Inc 1600 Amphitheatre Parkway, Mountain View, CA shumeet@google.com ABSTRACT Entering search terms that users who were asked to enter queries on a search interface with query suggestions rated their workload heavily on suggestions if they are provided. Users who were asked to enter queries on a search interface

Tomkins, Andrew

15

CRAWLING DEEP WEB CONTENT THROUGH QUERY FORMS Jun Liu, Zhaohui Wu, Lu Jiang, Qinghua Zheng, Xiao Liu  

E-Print Network [OSTI]

CRAWLING DEEP WEB CONTENT THROUGH QUERY FORMS Jun Liu, Zhaohui Wu, Lu Jiang, Qinghua Zheng, Xiao: Deep Web, Deep Web Surfacing, Minimum Executable Pattern, Adaptive Query Abstract: This paper proposes-based Deep Web adaptive query method. The query method extends query interface from single textbox to MEP set

Shamos, Michael I.

16

TVDG LET Calculator  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

To The B N L Tandem Van de Graaff Accelerator To The B N L Tandem Van de Graaff Accelerator TVDG LET Calculator This program calculates the Peak LET, Corresponding Energy and Range as well as the LET and Range at the Specified Energy for the Specified Ion in the Specified Target. Select the Target Material from the dropdown list. Select the Ion Specie from the dropdown list. Enter the Total Ion Energy in the text box. This is equal to the Atomic Mass times the Energy/Nucleon. Click the 'Calculate' button or press the 'Enter' key. The Peak LET, Corresponding Energy and Range as well as the LET and Range at the Specified Energy for the Specified Ion in the Specified Target will be returned. Select your Target from the list Air Aluminum Oxide Carbon Copper Gallium Arsenide Gold Polyester Polyethylene Silicon Silicon Dioxide Skin Soda Lime Glass Sodium Iodide Water Select your Ion from the list

17

Query optimization in nested relational databases  

E-Print Network [OSTI]

optimization in nested relational systems and does not make any assumptions on the physical implementation of the system. C. Contributions of this research This research could be divided into three phases: 1. Study of query languages and algebras... does so by treating both relation-valued attributes and relations uniformly. Let name be the set of valid names to be used for naming relations and their attributes. 1. Descriptions: A description 6 is an ordered pair (n, s), where n C name...

Rathakrishnan, Balaji

2012-06-07T23:59:59.000Z

18

Application Programming Interface | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

(API). Using the API, users can query the same analytical tools available through the web interface, without compromising the security or anonymity of the database. The API...

19

Query shredding: efficient relational evaluation of queries over nested multisets  

Science Journals Connector (OSTI)

Nested relational query languages have been explored extensively, and underlie industrial language-integrated query systems such as Microsoft's LINQ. However, relational databases do not natively support nested collections in query results. This can ... Keywords: language-integrated query, querying nested collections

James Cheney; Sam Lindley; Philip Wadler

2014-06-01T23:59:59.000Z

20

Cognos Query Studio NUFinancials  

E-Print Network [OSTI]

@northwestern.edu · Please review this guide before calling the help desk with data definition questions. #12;Cognos Query. Hover over the same items to see the definition in a tool tip. Who has access? · Users with the security-up and down-drill capability, you must have the Ad Hoc Query Author role. Where to get help? · For assistance

Shull, Kenneth R.

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Query Optimization Techniques Class Hierarchies  

E-Print Network [OSTI]

Query Optimization Techniques Exploiting Class Hierarchies Sophie Cluet 1 Guido Moerkotte 2 1 INRIA Since the introduction of object base management systems (OBMS), many query optimization techniques tailored for object query languages have been proposed. They adapt known optimization techniques

Mannheim, Universität

22

Complex Queries | Open Energy Information  

Open Energy Info (EERE)

Complex Queries Complex Queries < User:Jweers Jump to: navigation, search Contents 1 Using Nested Queries 1.1 Programs 2 Using Inverse Property Ask Query 3 Using Wildcards Plus Array Print with Count 3.1 States start with A (4) Using Nested Queries Complex Help:Inline queries are queries which involve multiple subjects, properties, or nested queries. The following is an example of a nested query which will return only Programs (Category:Programs) in the Energy Sector (Property:ProgramSector = Energy) within the subsector of Wind (Property:Sector = Wind) which have been developed by National Labs (Category:United States Department of Energy National Laboratories). The last piece mentioned is where the nested query comes into play. To find Programs which have been developed by National Labs, we must search the

23

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Broader source: Energy.gov (indexed) [DOE]

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

24

HDF5-FastQuery: An API for Simplifying Access to Data Storage,Retrieval, Indexing and Querying  

SciTech Connect (OSTI)

This work focuses on research and development activities that bridge a gap between fundamental data management technology index, query, storage and retrieval and use of such technology in computational and computer science algorithms and applications. The work has resulted in a streamlined applications programming interface (API) that simplifies data storage and retrieval using the HDF5 data I/O library, and eases use of the FastBit compressed bitmap indexing software for data indexing/querying. The API, which we call HDF5-FastQuery, will have broad applications in domain sciences as well as associated data analysis and visualization applications.

Bethel, E. Wes; Gosink, Luke; Shalf, John; Stockinger, Kurt; Wu,Kesheng

2006-06-15T23:59:59.000Z

25

ask queries | OpenEI Community  

Open Energy Info (EERE)

16 May, 2013 - 14:22 Multicolor Maps from Compound Queries ask queries compound queries developer Google maps maps multicolor result formats results Semantic Mediawiki Hi all,...

26

compound queries | OpenEI Community  

Open Energy Info (EERE)

Jweers's picture Submitted by Jweers(83) Contributor 16 May, 2013 - 14:22 Multicolor Maps from Compound Queries ask queries compound queries developer Google maps maps...

27

High-let radiation carcinogenesis  

SciTech Connect (OSTI)

Recent results for neutron radiation-induced tumors are presented to illustrate the complexities of the dose-response curves for high-LET radiation. It is suggested that in order to derive an appropriate model for dose-response curves for the induction of tumors by high-LET radiation it is necessary to take into account dose distribution, cell killing and the susceptibility of the tissue under study. Preliminary results for the induction of Harderian gland tumors in mice exposed to various heavy ion beams are presented. The results suggest that the effectiveness of the heavy ion beams increases with increasing LET. The slopes of the dose-response curves for the different high-LET radiations decrease between 20 and 40 rads and therefore comparisons of the relative effectiveness should be made from data obtained at doses below about 20 to 30 rads.

Fry, R.J.M.; Powers-Risius, P.; Alpen, E.L.; Ainsworth, E.J.; Ullrich, R.L.

1982-01-01T23:59:59.000Z

28

Two Queries Harry Buhrman  

E-Print Network [OSTI]

Two Queries Harry Buhrman #3; CWI PO Box 94079 1090 GB Amsterdam The Netherlands Lance Fortnow y \\ B) [ (A \\ B). For complexity classes C and D define the class C#1;D as fA#1;B j A 2 C and B 2 Dg

Fortnow, Lance

29

Approximate XML query answers  

Science Journals Connector (OSTI)

The rapid adoption of XML as the standard for data representation and exchange foreshadows a massive increase in the amounts of XML data collected, maintained, and queried over the Internet or in large corporate data-stores. Inevitably, this will result ...

Neoklis Polyzotis; Minos Garofalakis; Yannis Ioannidis

2004-06-01T23:59:59.000Z

30

EIA 176 Query System, 2004  

Gasoline and Diesel Fuel Update (EIA)

4 4 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2004 The EIA-176 Query System is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please refer to the documentation listed below.

31

EIA 176 Query System, 2001  

Gasoline and Diesel Fuel Update (EIA)

1 1 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2001 The EIA-176 Query system is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please read the documentation file(s) listed below

32

EIA 176 Query System, 2003  

Gasoline and Diesel Fuel Update (EIA)

3 3 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2003 The EIA-176 Query System is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please refer to the documentation read the documentation file(s) listed below.

33

Introduction Inverted index Processing Boolean queries Query optimization Web Search and Text Mining  

E-Print Network [OSTI]

Introduction Inverted index Processing Boolean queries Query optimization Web Search and Text Institute of Technology, College of Computing 2011 Gray: Boolean Retrieval 1 / 39 #12;Introduction Inverted index Processing Boolean queries Query optimization Overview 1 Introduction 2 Inverted index 3

Gray, Alexander

34

MaximumLetThrough.PDF  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 9 Maximum Let-Through Currents in the APS Storage Ring Quadrupole, Sextupole, and Corrector Magnets J. Carwardine, D. McGhee, G. Markovich May 18, 1999 Abstract Limits are described for the maximum magnet currents, under specified fault conditions, for the storage ring quadrupole, sextupole, and corrector magnets. Introduction In computing the maximum let-through current for the magnets for the storage ring, several factors must be considered. In general, the maximum current likely to occur even under fault conditions is less than the maximum theoretical DC current given the magnet resistance and the maximum available DC voltage. The first level of protection against magnet current overloads is the over-current interlock that is built into the converter electronics package. The threshold is set to approximately 110% of

35

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

36

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

37

Web Intelligence and Agent Systems: An International Journal 0 (2010) 10 1 Selecting Queries from Sample to Crawl  

E-Print Network [OSTI]

Queries from Sample to Crawl Deep Web Data Sources Yan Wang a Jianguo Lu a,c Jie Liang a Jessica Chen crawl a deep web data source using a set of sample documents. Crawling deep web is the process of collecting data from search interfaces by issuing queries. One of the major challenges in crawling deep web

Lu, Jianguo

38

EIA 176 Query System, 2002  

Gasoline and Diesel Fuel Update (EIA)

2 2 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2002 EIA 176 Query System 2002 Release date: February 2, 2004 Next release date: February 2005 The EIA-176 Query system is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please read the documentation file(s) listed below.

39

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

40

Let's Move! Enjoy Moving as a Family  

E-Print Network [OSTI]

and employer.This material is partially funded by USDA's Supplemental Nutrition Assistance Program ­ SNAP which by the Expanded Food Nutrition Education Program, USDA, NIFA. Let's Move...Cold Weather Fun! Let's Move, Virginia Polytechnic Institute and State University, 2013 Virginia Cooperative Extension programs

Liskiewicz, Maciej

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Assisting Web Search Using Query Suggestion Based on Word Similarity Measure and Query Modification  

E-Print Network [OSTI]

. For example, when the word "Tiger" is entered by a user, current web search engines are mostly focusedAssisting Web Search Using Query Suggestion Based on Word Similarity Measure and Query Modification search engines is query suggestion (QS), which assists users in formulating keyword queries by suggesting

Ng, Yiu-Kai Dennis

42

Introduction Inverted index Processing Boolean queries Query optimization Course overview Introduction to Information Retrieval  

E-Print Network [OSTI]

Introduction Inverted index Processing Boolean queries Query optimization Course overview Retrieval 1 / 60 #12;Introduction Inverted index Processing Boolean queries Query optimization Course overview Take-away Sch¨utze: Boolean Retrieval 2 / 60 #12;Introduction Inverted index Processing Boolean

Nejdl, Wolfgang

43

Exploiting External Collections for Query Expansion  

Science Journals Connector (OSTI)

A persisting challenge in the field of information retrieval is the vocabulary mismatch between a users information need and the relevant documents. One way of addressing this issue is to apply query modeling: to add terms to the original query ... Keywords: Query modeling, blog post retrieval, external expansion

Wouter Weerkamp; Krisztian Balog; Maarten de Rijke

2012-11-01T23:59:59.000Z

44

MEXICO: GE Lets Mexicans Buy In  

Science Journals Connector (OSTI)

MEXICO: GE Lets Mexicans Buy In ... General Electric de Mexico, the country's biggest manufacturer of electrical products, had been one of the major Mexican firms still wholly owned by a foreign parent. ...

1968-07-15T23:59:59.000Z

45

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote...  

Broader source: Energy.gov (indexed) [DOE]

Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary...

46

T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets...  

Broader source: Energy.gov (indexed) [DOE]

3: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information...

47

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

48

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

49

U-094: EMC Documentum Content Server Lets Local Administrative...  

Broader source: Energy.gov (indexed) [DOE]

4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated...

50

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

51

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

52

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

53

U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am...

54

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

55

Incremental Data Structures and Algorithms for Dynamic Query Interfaces*  

E-Print Network [OSTI]

implementation han- dles an active subset that is an order of magnitude *This paper will be presented as a preview bar that dis- plays the number of hits), and charts (which provide other cumulative information

Shneiderman, Ben

56

Incremental Data Structures and Algorithms for Dynamic Query Interfaces \\Lambda  

E-Print Network [OSTI]

implementation han­ dles an active subset that is an order of magnitude larger than the databases that previous of hits), bars (such as a preview bar that dis­ plays the number of hits), and charts (which provide other

Beigel, Richard

57

Querying the World Wide Web Alberto O. Mendelzon George A. Mihaila  

E-Print Network [OSTI]

, heterogeneous, distributed collection of documents connected by hypertext links. The most common technology" that index as many documents as they can find by navigating the network. One problem with this is that users), of their strengths and weaknesses, and of the peculiarities of their query interfaces. A more serious problem

Milo, Tova

58

Example Queries | Open Energy Information  

Open Energy Info (EERE)

Example Queries Example Queries Jump to: navigation, search Example Queries SEP Funding SEP Funding Alabama 55,570,000 Alaska 28,232,000 Arizona 55,447,000 Arkansas 39,416,000 California 226,093,000 Colorado 49,222,000 Connecticut 38,542,000 Delaware 24,231,000 Florida 126,089,000 Georgia 82,495,000 Hawaii 25,930,000 Idaho 28,572,000 Illinois 101,321,000 Indiana 68,621,000 Iowa 40,546,000 Kansas 38,284,000 Kentucky 52,533,000 Louisiana 71,694,000 Maine 27,305,000 Maryland 51,772,000 Massachusetts 54,911,000 Michigan 82,035,000 Minnesota 54,172,000 Mississippi 40,418,000 Missouri 57,393,000 Montana 25,855,000 Nebraska 30,910,000 Nevada 34,714,000 New Hampshire 25,827,000 New Jersey 73,643,000 New Mexico 31,821,000 New York 123,110,000 North Carolina 75,989,000 North Dakota 24,585,000

59

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

60

FastQuery: A Parallel Indexing System for Scientific Data  

SciTech Connect (OSTI)

Modern scientific datasets present numerous data management and analysis challenges. State-of-the- art index and query technologies such as FastBit can significantly improve accesses to these datasets by augmenting the user data with indexes and other secondary information. However, a challenge is that the indexes assume the relational data model but the scientific data generally follows the array data model. To match the two data models, we design a generic mapping mechanism and implement an efficient input and output interface for reading and writing the data and their corresponding indexes. To take advantage of the emerging many-core architectures, we also develop a parallel strategy for indexing using threading technology. This approach complements our on-going MPI-based parallelization efforts. We demonstrate the flexibility of our software by applying it to two of the most commonly used scientific data formats, HDF5 and NetCDF. We present two case studies using data from a particle accelerator model and a global climate model. We also conducted a detailed performance study using these scientific datasets. The results show that FastQuery speeds up the query time by a factor of 2.5x to 50x, and it reduces the indexing time by a factor of 16 on 24 cores.

Chou, Jerry; Wu, Kesheng; Prabhat,

2011-07-29T23:59:59.000Z

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Restricting query relaxation through user constraints  

SciTech Connect (OSTI)

This paper describes techniques to restrict and to heuristically control relaxation of deductive database queries. The process of query relaxation provides a user with a means to automatically identify new queries that are related to the user`s original query. However, for large databases, many relaxations may be possible. The methods to control and restrict the relaxation process introduced in this paper focus the relaxation process and make it more efficient. User restrictions over the data base domain may be expressed as user constraints. This paper describes how user constraints can restrict relaxed queries. Also, a set of heuristics based on cooperative answering techniques are presented for controlling the relaxation process. Finally, the interaction of the methods for relaxing queries, processing user constraints, and applying the heuristic rules is described.

Gaasterland, T.

1993-07-01T23:59:59.000Z

62

Query  

Broader source: Energy.gov (indexed) [DOE]

Queryl Queryl Detailees Name From To Proposed Start Date Proposed End Date Office of the Director of Alex, Aileen DOE/CFO National Intelligence 5/27/2007 5/27/2009 Federal Railroad Alexander, Alice Administration DOE/CFO 7/1/2007 1/1/2008 Arnaudo, Raymond Dept of State DOE/NNSA Moscow Office 3/5/2006 3/3/2008 Cambridge Energy Research Ashley, Peter DOE/PI Associates (CERA) 1/4/2009 3/27/2009 Executive Office of the Barringer, Jody DOE/EE President/OMB 11/16/2008 3/14/2009 Benigni, Deborah Dept of State DOE/IN 4/30/2007 4/30/2009 Federal Bureau of Borgia, Stanley Investigation DOE/IN 6/12/2006 6/12/2008 Federal Bureau of Borgia, Stanley Investigation DOE/IN 6/12/2008 6/12/2009 Department of State/US Brosnahan, Kevin DOE/EE Embassy of Paris 12/1/2007 5/1/2008 Office of the Director of

63

Discovering and Loading Data with Power Query  

Science Journals Connector (OSTI)

Discovering, loading, cleaning, and modifying source data is where Power Query comes in. Using this, the... Data DiscoveryFind and connect to a myriad of data sources ...

Adam Aspin

2014-01-01T23:59:59.000Z

64

SLQ: a user-friendly graph querying system  

Science Journals Connector (OSTI)

Querying complex graph databases such as knowledge graphs is a challenging task for non-professional users. In this demo, we present SLQ, a user-friendly graph querying system enabling schemales and structures graph querying, where a user need not describe ... Keywords: graph databases, keyword query, schemaless graph querying

Shengqi Yang; Yanan Xie; Yinghui Wu; Tianyu Wu; Huan Sun; Jian Wu; Xifeng Yan

2014-06-01T23:59:59.000Z

65

Query Expansion Using a Collection Dependent Probabilistic Latent Semantic Thesaurus  

Science Journals Connector (OSTI)

Many queries on collections of text documents are too short to produce informative results. Automatic query expansion is a method of adding terms to the query without interaction from the user in order to obtain ...

Laurence A. F. Park; Kotagiri Ramamohanarao

2007-01-01T23:59:59.000Z

66

Solar Decathlon 2015: Let the Competition Begin | Department...  

Broader source: Energy.gov (indexed) [DOE]

5: Let the Competition Begin Solar Decathlon 2015: Let the Competition Begin February 13, 2014 - 1:00pm Addthis The Solar Decathlon competition has provided more than 17,000...

67

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

68

E-Print Network 3.0 - ad hoc query Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

query Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc query...

69

E-Print Network 3.0 - ad hoc queries Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

queries Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc queries...

70

Relational Database SQL: Querying the Relational DB  

E-Print Network [OSTI]

: auto-completion and command history Weigang Qiu Relational Database & SQL #12;Relational Database SQLRelational Database SQL: Querying the Relational DB Workshop: the "genome" Database Relational Database & SQL Weigang Qiu Department of Biological Sciences Hunter College BIOL 425 Computational

Qiu, Weigang

71

Table Name query? | OpenEI Community  

Open Energy Info (EERE)

Table Name query? Home > Groups > Databus Is there an API feature which returns the names of tables? Submitted by Hopcroft on 28 October, 2013 - 15:37 1 answer Points: 0 if you are...

72

XClean: Providing Valid Spelling Suggestions for XML Keyword Queries  

E-Print Network [OSTI]

{yifeil, weiw}@cse.unsw.edu.au Swinburne University of Technology {jianxinli, cliu}@swin.edu.au Abstract with low quality. Query cleaning has been proposed to alleviate this problem by suggesting several that the query result will be empty. An intelligent query cleaning system will suggest the clean query hinrich

Liu, Chengfei

73

Classifying Web Search Queries to Identify High Revenue Generating Customers  

E-Print Network [OSTI]

searching, the set of terms for which a user searches is called the query. If a user enters a query and then clicks on a result, these query terms are embedded within the URL that is passed from the search engineClassifying Web Search Queries to Identify High Revenue Generating Customers Adan Ortiz-Cordova 329

Jansen, James

74

Minimum-Hot-Spot Query Trees for Wireless Sensor Networks  

E-Print Network [OSTI]

an energy- efficient query routing tree. (a) Energy harvesting for battery- less nodes for the (b) Voltree to the querying node. Energy-efficient query routing trees are needed in a plethora of systems such as PeopleMinimum-Hot-Spot Query Trees for Wireless Sensor Networks Georgios Chatzimilioudis Dept

Zeinalipour, Demetris

75

Spatial Data Models and Query Processing Hanan Samet  

E-Print Network [OSTI]

Spatial Data Models and Query Processing Hanan Samet Walid G. Aref Computer Science Department databases. The focus is on data models and query processing. Query optimization in a spatial environment is also brie y discussed. Keywords and phrases: spatial databases, data models, spatial query processing

Samet, Hanan

76

EMSL - interfaces  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

interfaces en The Mechanisms of Oxygen Reduction and Evolution Reactions in Nonaqueous Lithium-Oxygen Batteries. http:www.emsl.pnl.govemslwebpublicationsmechanisms-oxygen-redu...

77

Failure Analysis in Query Construction: Data and Analysis from A Large Sample of Web Queries  

E-Print Network [OSTI]

­ more details are on its Web site. Excite searches are based on the exact terms that a user enters in the query, however, capitalization is disregarded. Stemming is not available. Multiple term searches return,473 queries from 18,113 users of Excite, a major Web search engine. Given that many digital libraries

Jansen, James

78

V-055: Firefly Media Server Null Pointer Dereference Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference...

79

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

80

CS 525: Advanced Database Organization Study of relational, semantic, and object-oriented data models and interfaces. Database management system  

E-Print Network [OSTI]

History of database management. Goals of database system development. Relational systems Data modelsCS 525: Advanced Database Organization Objectives Study of relational, semantic, and object-oriented data models and interfaces. Database management system techniques for query optimization, concurrency

Heller, Barbara

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

E-Print Network 3.0 - assisted query reformulation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

query reformulation Page: << < 1 2 3 4 5 > >> 1 Predicting Query Reformulation During Web Searching Summary: and Assistance account for approximately 45 percent of all query...

82

Query-based database policy assurance using semantic web technologies  

E-Print Network [OSTI]

In this thesis, we present a novel approach to database security which looks at queries instead of the database tables themselves. In doing so, we use a number of Semantic Web technologies to define rules, translate queries, ...

Soltren, Jos Hiram

2009-01-01T23:59:59.000Z

83

On the Query Complexity of Perfect Gate Discrimination  

E-Print Network [OSTI]

On the Query Complexity of Perfect Gate Discrimination Giulio Chiribella1 , Giacomo Mauro D'Ariano2 queries are called at different time steps [5]. T Q C © Giulio Chiribella, Giacomo Mauro D

D'Ariano, Giacomo Mauro

84

Using a Medical Thesaurus to Predict Query Difficulty  

Science Journals Connector (OSTI)

Estimating query performance is the task of predicting the quality of results returned by a search engine in response to a query. In this paper, we focus on pre-retrieval prediction methods for the medical domain...

Florian Boudin; Jian-Yun Nie; Martin Dawes

2012-01-01T23:59:59.000Z

85

CSP Techniques for Solving Combinatorial Queries within Relational Databases  

Science Journals Connector (OSTI)

A combinatorial query is a request for tuples from multiple relations that satisfy a conjunction of constraints on tuple attribute values. Managing combinatorial queries using the traditional database systems is ...

Malek Mouhoub; Chang Feng

2009-01-01T23:59:59.000Z

86

Zeus: a distributed triple store for proactive SPARQL queries  

Science Journals Connector (OSTI)

The RDF framework is the underpinning element of semantic web stack; its widespread adoption requires efficient tools to store and query RDF data. A number of efficient local RDF stores already exist, while distributed indexing and distributed query processing are only starting to appear; furthermore dynamically growing and fail-safe solutions are not yet available. To remedy this situation, in this paper we present Zeus: an approach for efficient and scalable query processing over RDF graphs based on grid computing. Zeus is based on a distributed architecture, where neither single point of failure nor specialised nodes exist. The query processing framework, presented in the paper, includes a sophisticated query planning and query execution algorithm, which is designed expressively for storage and query of a stream of RDF triples. This mechanism allows Zeus users to register queries that will be notified in real time of new relevant results.

Marcello Leida; Andrej Chu

2014-01-01T23:59:59.000Z

87

The Spatial Skyline Queries Mehdi Sharifzadeh  

E-Print Network [OSTI]

- tively. We propose two algorithms, B2 S2 and VS2 , for static query points and one algorithm, VCS2 outperform the best competitor approach in terms of processing time by a wide margin (4-6 times better-15, 2006, Seoul, Korea. Copyright 2006 VLDB Endowment, ACM 1-59593-385-9/06/09. team located at different

Shahabi, Cyrus

88

Controller's Office Departmental Queries Revised January 2014  

E-Print Network [OSTI]

need. (Query Viewer Job Aid) NOTE: Please remember that it is necessary to enter the wildcard account use descriptions Account # % FSU_DPT_CODES_CATEGORY_BY_ACCT Purchasing Categories and G/L Accounts % Chartfield 2 % Chartfield 3 % FSU_DPT_LEDGER_SUM_W_CF Net ledger activity for a range of accounting periods

Sura, Philip

89

A Simple Model for Classifying Web Queries by User Intent  

E-Print Network [OSTI]

València, Spain 3 NLE Lab.- ELiRF, Universitat Politècnica de València, Spain 4 PRHLT, Universitat query classification, User intent, Query analysis 1 Introduction Web Search Engines (WSEs) are the most in an interaction with a Web Search Engine. Query Classification based on user intent is different from traditional

Rosso, Paolo

90

Generalized Labeled LCA Queries Jrmy Barbay, Ehsan Chiniforooshan, Alexander Golynski,  

E-Print Network [OSTI]

Generalized Labeled LCA Queries Jérémy Barbay, Ehsan Chiniforooshan, Alexander Golynski, Jui-Yi Kao without knowing their schema. Among them, lowest common ancestor (LCA) queries were introduced in several variants on labeled trees. We de#28;ne threshold LCA queries to generalize all those variants

Waterloo, University of

91

Natural Gas Annual Respondent Query System  

Gasoline and Diesel Fuel Update (EIA)

loading new table loading new table Home > Natural Gas > Natural Gas Annual Respondent Query System Natural Gas Annual Respondent Query System (EIA-176 Data through 2012) Report: 176 Natural Gas Deliveries 176 Natural Gas Supply Items 176 Natural Gas Other Disposition Items 176 Type of Operations and Sector Items 176 Continuation Text Lines 176 Company List 191 Field Level Storage Data 757 Processing Capacity 176 Custom Report (User-defined) Years: 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 to 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 Sort by: Area, Company, Item Company, Area, Item Item, Area, Company Company: Show only Company ID Show only Company Name Show both Company ID, Name 2012 Total

92

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

93

U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

30: Apache Tomcat Lets Untrusted Web Applications Gain Elevated 30: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am Addthis PROBLEM: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges. PLATFORM: Apache Tomcat 7.0.0-7.0.21. ABSTRACT: An untrusted web application can access Manager application functions. reference LINKS: Apache Tomcat 7.x vulnerabilities SecurityTracker Alert ID: 1026295 CVE-2011-3376 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A local user (application) can obtain elevated privileges on the target system. A local web application (that is not trusted) can access Manager application functions without being marked as privileged. This can be exploited to obtain

94

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

95

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

96

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Broader source: Energy.gov (indexed) [DOE]

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

97

LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY  

E-Print Network [OSTI]

LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY Anna CRETI Jérôme JOAUG Cahier n:chantal.poujouly@polytechnique.edu hal-00751743,version1-14Nov2012 #12;Let the sun shine: optimal deployment of photovoltaics in Germany-in tari¤s to foster the di¤usion of photovoltaics is recently being rediscussed in several countries

Paris-Sud XI, Université de

98

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy Savers [EERE]

Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or...

99

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Office of Environmental Management (EM)

727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

100

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code...

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

102

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

103

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

104

T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service T-719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service September 16, 2011 -...

105

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Execute Arbitrary Commands V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code U-058: Apache Struts Conversion Error...

106

Iconic and Diagrammatic Interfaces: An Integrated Approach T.Catarci, A.Massari and G.Santucci  

E-Print Network [OSTI]

Iconic and Diagrammatic Interfaces: An Integrated Approach T.Catarci, A.Massari and G. Afterwards we consider the two main visual expressions, i.e. icons and diagrams, used to represent both data a man­machine interface, together with a visual query language, providing an integrated, both iconic

107

Multicolor Maps from Compound Queries | OpenEI Community  

Open Energy Info (EERE)

Multicolor Maps from Compound Queries Multicolor Maps from Compound Queries Home > Groups > OpenEI Community Central Jweers's picture Submitted by Jweers(83) Contributor 16 May, 2013 - 14:22 ask queries compound queries developer Google maps maps multicolor result formats results Semantic Mediawiki Hi all, Recently, a couple of people on OpenEI have asked me how to do compound (or multicolor) maps like this one: Thanks to the new Google Maps v3 API, this is really easy. I put together a quick sample of how this is done, complete with code snippits, here: http://en.openei.org/wiki/User:Jweers/Test5. First, create a compound query, then atttribute a custom marker icon to each query using the ;param=value syntax. The new OpenEI maps extension will take care of the rest. Here is an example of it in use on OpenEI by NREL's Geothermal team:

108

www.cnrs.fr Hello jQuery !  

E-Print Network [OSTI]

www.cnrs.fr Hello jQuery ! par Daric Vladimir @IGM #12;JavaScript ?JavaScript ? · Mauvais choix apparaître ...Firefox 1.0.x, quelques problèmes peuvent apparaître ... #12;Hello jQyeryHello jQyery Demo Demo. #12;« Hello jQuery » décortiqué« Hello jQuery » décortiqué · Step 1 : télécharger jQueryStep 1

van Tiggelen, Bart

109

RIS-M-2308 HIGH-LET DOSE-RESPONSE CHARACTERISTICS DESCRIBED BY TRACK  

E-Print Network [OSTI]

DOSEMETERS. CYANIDES, DOSE-RE- SPONSE RELATIONSHIPS, DYES, IONIZING RADIATIONS. LET. PARTICLE TRACKS by Katz and co- workers ascribes the effect of high-LET radiation to the highly inhomogeneous dose irradiation is used as a reference low-LET radiation, while high-LET radiation ranging from 16 MeV protons

110

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

111

Solar Decathlon 2013: Let the Building Begin | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian, Energy Department Day 7 Construction 3 of 22 Day 7 Construction Kevin Davis, of West Virginia University, fills his house's water tank while team members discuss a potential problem. Water was delivered to all team houses today. Image: Amy Vaughn, Energy Department

112

Low Dose Radiation Research Program: Low-LET Microdosimetry Calculations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Low-LET Microdosimetry Calculations Low-LET Microdosimetry Calculations Authors: W.E. Wilson, J.H. Miller, D.J. Lynch, R.R. Lewis and M. Batdorf Institutions: Washington State University, Richland, WA, USA Liquid Model Calculations of low-linear-transfer (LET) microdosimetry have been extended to condensed phase by introducing new modules into the PITS code suite. Probability tables for inelastic interactions are constructed using the Dingfelder-GSF model for liquid-water cross-sections. Dingfelder et al. 1 re-evaluated low-energy electron interactions in liquid water in terms of five excitation and five ionization channels, and without assuming any collective interactions (plasmons). We use Dingfelder’s algorithms to calculate differential energy-loss distributions for the ten channels; by

113

Solar Decathlon 2013: Let the Building Begin | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Let the Building Begin Let the Building Begin Solar Decathlon 2013: Let the Building Begin Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian, Energy Department Day 7 Construction 3 of 22 Day 7 Construction Kevin Davis, of West Virginia University, fills his house's water tank while team members discuss a potential problem. Water was delivered to all team houses today. Image: Amy Vaughn, Energy Department Day 6 Construction 4 of 22 Day 6 Construction

114

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

115

Solar Decathlon 2013: Let the Building Begin | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian, Energy Department Day 7 Construction 3 of 22 Day 7 Construction Kevin Davis, of West Virginia University, fills his house's water tank while team members discuss a potential problem. Water was delivered to all team houses today. Image: Amy Vaughn, Energy Department

116

Buried Interface  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

H. Ohldag, J. Lüning and J. Stöhr H. Ohldag, J. Lüning and J. Stöhr Computer hard drives and other advanced electronic devices depend on layered stacks of magnetic and non-magnetic materials, but researchers don't fully understand why such layered materials exhibit new properties that cannot be predicted from the properties of the individual layers. In a recent publication a team working at SSRL and the ALS describes new methods, based on x-ray spectroscopy and x-ray microscopy, that reveal the magnetic structures at the boundaries between these layers. Their data show that the boundaries are not as clean as previously assumed but a new ultrathin interface layer may be formed by a chemical reaction. The thickness of the interfacial layer is found to change with temperature and this change can be directly correlated with the magnetic properties of the multilayer stack. The work provides the first magnetic images of a buried interface and gives direct experimental evidence for the existence and long-assumed importance of interfacial magnetic spins.

117

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.  

E-Print Network [OSTI]

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w(D)) Pumping Lemma for Regular Sets #12;proof: Let w L(D), |w| n, w = w1, w2, . . . , wn · u w = w1 w2 w3, 2, . . . Pumping Lemma for Regular Sets #12;Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F

Immerman, Neil

118

How big must complete XML query languages be?  

Science Journals Connector (OSTI)

Marx and de Rijke have shown that the navigational core of the w3c XML query language XPath is not first-order complete -- that is it cannot express every query definable in firstorder logic over the navigational predicates. How can one extend XPath ...

Clemens Ley; Michael Benedikt

2009-03-01T23:59:59.000Z

119

Mercury: Supporting Scalable Multi-Attribute Range Queries  

E-Print Network [OSTI]

Mercury: Supporting Scalable Multi-Attribute Range Queries Ashwin R. Bharambe Mukesh Agrawal 15213 Abstract This paper presents the design of Mercury, a scalable protocol for supporting multi-attribute range- based searches. Mercury differs from previous range-based query systems in that it supports mul

Keinan, Alon

120

Chaining, Referral, Subscription, Leasing: New Mechanisms in Distributed Query Optimization  

E-Print Network [OSTI]

Chaining, Referral, Subscription, Leasing: New Mechanisms in Distributed Query Optimization Arnaud, exploit!) a rich variety of information ow mechanisms like chaining, referral, proxying, brokering referral (following [33]), is when a site A ships a query to a site B and may get back, instead

Pennsylvania, University of

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Encoding range minima and range top-2 queries  

Science Journals Connector (OSTI)

...problem of supporting lowest common ancestor (LCA) queries on a binary tree, the Cartesian...answer to RMQ(i,j) is the label of the LCA of the nodes labelled by-i and-j. Thus...in 2n+o(n) bits, while supporting LCA queries in O(1) time. 1 Unfortunately...

2014-01-01T23:59:59.000Z

122

Top-Down XML Keyword Query Processing Junfeng Zhou1  

E-Print Network [OSTI]

keyword query w.r.t. LCA/SLCA/ELCA semantics. By "top-down", we mean that we visit all common ancestor (CA to define meaningful results, for which the basic semantics is Lowest Common Ancestor (LCA). Based on LCA, the most widely adopted query semantics are Exclusive LCA (ELCA) [3,7,10,23,27] and Smallest LCA (SLCA) [3

New South Wales, University of

123

Overhead Analysis of Query Localization Optimization and Wenzheng Xu  

E-Print Network [OSTI]

to localize the query flooding to a limited region of the networks. The simulation results in [3] demonstrated of global flooding and provide an optimization solution to it. We finally perform experimental simulations routing histories to localize the query flood to a limited region of a network. However, the lifetime

Liang, Weifa

124

Preserving and Querying Histories of XML-Published Relational Databases  

E-Print Network [OSTI]

Preserving and Querying Histories of XML-Published Relational Databases Fusheng Wang and Carlo the evolution history of such a view as yet another XML document, whereby the complete history of the database, and identify and select those which are best for representing and querying database histories. We show

Zaniolo, Carlo

125

Efficient Complex Query Support for Multiversion XML Documents  

E-Print Network [OSTI]

Efficient Complex Query Support for Multiversion XML Documents Shu-Yao Chien1 , Vassilis J. Tsotras documents represents a critical requirement for many applications. Also, there has been much recent interest). In this paper, we examine the problem of supporting efficiently complex queries on multiversioned XML documents

Zhang, Donghui

126

Query Processing over Incomplete Autonomous Databases Garrett Wolf Hemal Khatri  

E-Print Network [OSTI]

Query Processing over Incomplete Autonomous Databases Garrett Wolf Hemal Khatri Bhaumik Chokshi}@asu.edu ABSTRACT Incompleteness due to missing attribute values (aka "null values") is very common in autonomous missing attributes, even if they wind up being relevant to a user query. Ideally we would like

Kambhampati, Subbarao

127

Optimizing Nested Queries with Parameter Sort Orders Ravindra Guravannavar  

E-Print Network [OSTI]

Optimizing Nested Queries with Parameter Sort Orders Ravindra Guravannavar Ramanujam H.s@sybase.com Indian Institute of Technology Bombay sudarsha@cse.iitb.ac.in Abstract Nested iteration is an important technique for query evaluation. It is the default way of execut- ing nested subqueries in SQL. Although

Sudarshan, S.

128

Nested Queries in Object Bases Sophie Cluet Guido Moerkotte  

E-Print Network [OSTI]

Nested Queries in Object Bases Sophie Cluet Guido Moerkotte INRIA Lehrstuhl f¨ur Informatik III BP for object­oriented (oo) databases allow nested subqueries. This paper contains (1) the first algebra which is capable of handling arbitrary nested queries and (2) the first complete classification of oo nested

Mannheim, Universität

129

A typed higher-order calculus for querying XML databases  

Science Journals Connector (OSTI)

As the eXtensible Markup Language (XML) is about to emerge as a new standard for databases, the problem of providing solid logical grounds for XML query languages arises. For the relational data model first-order logic, i.e. the Relational Calculus turned ... Keywords: eXten-sible markup language, higher-order logic, object model, query language, type system

Qing Wang; Klaus-Dieter Schewe

2008-01-01T23:59:59.000Z

130

Article ID: Query Translation on the Fly in Deep Web  

E-Print Network [OSTI]

Article ID: Query Translation on the Fly in Deep Web Integration Jiang Fangjiao, Jia Linlin, Meng users to access the desired information, many researches have dedicated to the Deep Web (i.e. Web databases) integration. We focus on query translation which is an important part of the Deep Web integration

131

Combining query translation techniques to improve cross-language information retrieval  

Science Journals Connector (OSTI)

In this paper we address the combination of query translation approaches for cross-language information retrieval (CLIR). We translate queries with Google Translate and extend them with new translations obtained by mapping noun phrases in the query to ...

Benjamin Herbert; Gyrgy Szarvas; Iryna Gurevych

2011-04-01T23:59:59.000Z

132

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

133

Natural Gas EIA-176 Query System Readme(1999)  

Gasoline and Diesel Fuel Update (EIA)

176 Query System Readme 176 Query System Readme 1.0 INTRODUCTION TO THE EIA-176 FRONT END QUERY FACILITY This system provides a method of extracting and using the EIA-176 data, and saving the query results in various mediums and formats. There are pre-set data extractions available, which allow the user to select and run the most often-used queries. 1.1 Hardware Requirements The minimum hardware requirements are: - An IBM-compatible personal computer (PC) 386SX 16 MHZ with 2 megabytes RAM. (A 486DX 33MHZ with 4 megabytes RAM is recommended). - MS-DOS operating system (version 3.x or greater), or compatible, or Network operating system capable of emulating MS-DOS. - MS-DOS file handles should be set to at least 50 in the CONFIG.SYS. In Windows NT, this file is called CONFIG.NT.

134

Increasing ask query limit | OpenEI Community  

Open Energy Info (EERE)

Increasing ask query limit Increasing ask query limit Home > Groups > Utility Rate Rmckeel's picture Submitted by Rmckeel(297) Contributor 22 June, 2012 - 09:30 developer utility rate An NREL user who is trying to use the utility rate service was having an issue. He writes "I noticed that any rates past 10,000 are not accessible via json. For example, this query only returns two entries: http://en.openei.org/services/rest/utility_rates?version=latest&format=json_plain&offset=9998&limit=30&detail=basic". Twong mentioned "It looks like there's a default total max limit of 10000 results retrieved, even for special query pages in SemanticMediawiki. $smwgQMaxLimit Maximal number of results ever retrieved, even when using special query pages. Default: 10000"

135

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

136

Web Browser Interface (WBUI)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OSCARS and Future Tech OSCARS Standard and Open Grid Forum OSCARS Developers Community Web Browser Interface (WBUI) Web Service Interface (API) Read More... Fasterdata IPv6...

137

Web Service Interface (API)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OSCARS and Future Tech OSCARS Standard and Open Grid Forum OSCARS Developers Community Web Browser Interface (WBUI) Web Service Interface (API) Read More... Fasterdata IPv6...

138

Argonne CNM Highlight: Let a Virus Do All the Work  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Let a Virus Do All the Work Let a Virus Do All the Work Developing an efficient method to fabricate nanoscale building blocks and organize them into functional architectures is the key to nanoscience and nanotechnology. As a result of millions years of evolution, biological systems can provide spatially defined host systems that can be used as templates for uniform fabrication of structured materials with different length scales. Viruses, in this regard, exemplify an extraordinarily organized nano-architecture: they are complex molecular biosystems in which nucleic acid strands are confined within a nano-size compartment (capsid). This project engages the use of an emptied ligand-displayed phage virus as a template to synthesize magnetic nanoparticles. Benefiting from the phage display technology, the particle generated inside the hollow phage has integrated biorecognition elements with high affinity and specificity for selected target molecules. In addition, the size and shape of the magnetic particles can be highly regulated by molecularly engineering virus capsid.

139

T-621: Citrix XenServer Lets Local Administrative Users on the...  

Broader source: Energy.gov (indexed) [DOE]

1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

140

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

69: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service July 15, 2011 - 2:14am Addthis PROBLEM:...

142

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

143

T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

01: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges April 13, 2011 - 5:12am Addthis...

144

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

145

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

146

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 -...

147

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

148

T-692: VMware vFabric tc Server Lets Remote Users Login Using...  

Broader source: Energy.gov (indexed) [DOE]

2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

149

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...  

Energy Savers [EERE]

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

150

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

151

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

152

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

153

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-052:...

154

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

155

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Broader source: Energy.gov (indexed) [DOE]

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

156

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

157

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

158

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

159

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

160

V-194: Citrix XenServer Memory Management Error Lets Local Administrat...  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local...

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets...  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe AcrobatReader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe AcrobatReader PRC Memory Corruption Error Lets Remote Users Execute...

162

Effect of pronunciations on OOV queries in spoken term detection  

E-Print Network [OSTI]

The spoken term detection (STD) task aims to return relevant segments from a spoken archive that contain the query terms whether or not they are in the system vocabulary. This paper focuses on pronunciation modeling for ...

Can, Dogan

163

Semantic Load Shedding for Prioritized Continuous Queries over Data Streams  

Science Journals Connector (OSTI)

A data stream management system (DSMS) has to handle high-volume and bursty data streams with large number of continuous queries. When an input rate of any data stream exceeds the system capacity, the DSMS has to...

Jaeseok Park; Haengrae Cho

2005-01-01T23:59:59.000Z

164

Towards a Query-by-Example System for Knowledge Graphs  

Science Journals Connector (OSTI)

We witness an unprecedented proliferation of knowledge graphs that record millions of heterogeneous entities and their diverse relationships. While knowledge graphs are structure-flexible and content-rich, it is difficult to query them. The challenge ...

Nandish Jayaram; Arijit Khan; Chengkai Li; Xifeng Yan; Ramez Elmasri

2014-06-01T23:59:59.000Z

165

Updating and Querying Databases that Track Mobile Units  

Science Journals Connector (OSTI)

In this paper, we consider databases representing information about moving objects (e.g., vehicles), particularly their location. We address the problems of updating and querying such databases. Specifically, the update problem is to determine when the ...

Ouri Wolfson; A. Prasad Sistla; Sam Chamberlain; Yelena Yesha

1999-07-01T23:59:59.000Z

166

Say What? Why users choose to speak their web queries Maryam Kamvar, Doug Beeferman  

E-Print Network [OSTI]

a higher probability of being typed than shorter queries. Index Terms: speech, voice, search, Google, query of voice web search (where the query is entered by speaking rather than by keyboard) is sparse, most likely on an aggregate level factors that are correlated with a decision to speak a web search query rather than type it

Tomkins, Andrew

167

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network [OSTI]

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

168

Adaptation of the Concept Hierarchy Model with Search Logs for Query Recommendation on Intranets  

E-Print Network [OSTI]

Adaptation of the Concept Hierarchy Model with Search Logs for Query Recommendation on Intranets for query recommendation on Intranets by ranking terms according to the strength of their links to the query for identical queries and rebuilding it from scratch periodically can be extremely inefficient due to the high

Kruschwitz, Udo

169

Condensative Stream Query Language for Data Streams Lisha Ma1 Werner Nutt2 Hamish Taylor1  

E-Print Network [OSTI]

Condensative Stream Query Language for Data Streams Lisha Ma1 Werner Nutt2 Hamish Taylor1 1 School the answer to a similar non-aggregate query making query processing condensative. Cur- rent proposals for declarative query languages over data streams do not support such condensative pro- cessing. Nor is it yet

Taylor, Hamish

170

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.  

E-Print Network [OSTI]

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w: Pumping Lemma CS250: Discrete Math for Computer Science #12;proof: Let w L(D), |w| n, w = w1, w2 F Thus, xykz L(D) for k = 0, 1, 2, . . . L30: Pumping Lemma CS250: Discrete Math for Computer

Massachusetts at Amherst, University of

171

Design of FastQuery: How to Generalize Indexing and Querying System for Scientific Data  

SciTech Connect (OSTI)

Modern scientific datasets present numerous data management and analysis challenges. State-of-the-art index and query technologies such as FastBit are critical for facilitating interactive exploration of large datasets. These technologies rely on adding auxiliary information to existing datasets to accelerate query processing. To use these indices, we need to match the relational data model used by the indexing systems with the array data model used by most scientific data, and to provide an efficient input and output layer for reading and writing the indices. In this work, we present a flexible design that can be easily applied to most scientific data formats. We demonstrate this flexibility by applying it to two of the most commonly used scientific data formats, HDF5 and NetCDF. We present two case studies using simulation data from the particle accelerator and climate simulation communities. To demonstrate the effectiveness of the new design, we also present a detailed performance study using both synthetic and real scientific workloads.

Wu, Jerry; Wu, Kesheng

2011-04-18T23:59:59.000Z

172

Threshold LET for SEU induced by low energy ions  

SciTech Connect (OSTI)

Simulations to determine the threshold LET as a function of the length of the ion track are consistent with there being two regions of charge collection. In the top layer which contains the depletion region all the charge generated is collected in time to upset the device. In the next layer, 10% to 20% of the charge generated is collected and contributes to upsetting the device. This second layer of partial charge collection may significantly impact the accuracy of SEU predictions involving low-energy neutrons and protons. A simple method of including this contribution in calculations is proposed.

McNulty, P.J.; Roche, P.; Palau, J.M.; Gasiot, J.

1999-12-01T23:59:59.000Z

173

U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

174

1. Jordan Lemma Let R0 be a positive number and a a real number with |a| < R0. Let  

E-Print Network [OSTI]

= R -(R) (R) e-mR sin f(Rei ) d R max z R |f(z)| -(R) (R) e-mR sin d R max z R |f(z)| 0 e-mR sin d = 2R max z R |f(z)| 2 0 e-mR sin d. Now we use the following simple lemma. 1.2. Lemma. Let [0 e- 2mR 2 0 = 2mR 1 - e-mR 2mR . Combining this with the above we get R eimz f(z) dz m max z

Milicic, Dragan

175

Parallel Index and Query for Large Scale Data Analysis  

SciTech Connect (OSTI)

Modern scientific datasets present numerous data management and analysis challenges. State-of-the-art index and query technologies are critical for facilitating interactive exploration of large datasets, but numerous challenges remain in terms of designing a system for process- ing general scientific datasets. The system needs to be able to run on distributed multi-core platforms, efficiently utilize underlying I/O infrastructure, and scale to massive datasets. We present FastQuery, a novel software framework that address these challenges. FastQuery utilizes a state-of-the-art index and query technology (FastBit) and is designed to process mas- sive datasets on modern supercomputing platforms. We apply FastQuery to processing of a massive 50TB dataset generated by a large scale accelerator modeling code. We demonstrate the scalability of the tool to 11,520 cores. Motivated by the scientific need to search for inter- esting particles in this dataset, we use our framework to reduce search time from hours to tens of seconds.

Chou, Jerry; Wu, Kesheng; Ruebel, Oliver; Howison, Mark; Qiang, Ji; Prabhat,; Austin, Brian; Bethel, E. Wes; Ryne, Rob D.; Shoshani, Arie

2011-07-18T23:59:59.000Z

176

Frostbite Theater - Liquid Nitrogen Experiments - Let's Pour Liquid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Shattering Flowers! Shattering Flowers! Previous Video (Shattering Flowers!) Frostbite Theater Main Index Next Video (Giant Koosh Ball!) Giant Koosh Ball! Let's Pour Liquid Nitrogen on the Floor! Liquid nitrogen?! On the floor?! Who's going to clean that mess up?! See what really happens when one of the world's most beloved cryogenic liquids comes into contact with a room temperature floor. [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: From time to time, we spill a little liquid nitrogen! The reaction we sometimes get is.... Shannon: Did they just pour LIQUID NITROGEN on the FLOOR?!?! Joanna: Yes. Yes we did. Steve: One thing people seem to have a problem with is the mess that liquid

177

Frostbite Theater - Liquid Nitrogen Experiments - Let's Freeze Liquid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Shattering Pennies! Shattering Pennies! Previous Video (Shattering Pennies!) Frostbite Theater Main Index Next Video (Liquid Nitrogen in a Microwave!) Liquid Nitrogen in a Microwave! Let's Freeze Liquid Nitrogen! By removing the hottest molecules, we're able to freeze liquid nitrogen! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: Today, we're going to freeze liquid nitrogen! Joanna and Steve: Yeah! Joanna: The obvious way to do this is to put the liquid nitrogen into something colder. Something that we have lots of around here! Something like... liquid helium! Steve: Yes! Joanna: Yeah, but we're not going to do that. Instead, we're going to freeze the nitrogen by removing the hottest molecules!

178

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

179

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

180

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

The vendor has issued a fix for some affected products. Addthis Related Articles U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive...

182

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

time of this entry. Addthis Related Articles U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-080: Linux Kernel XFS Heap Overflow May Let Remote Users...

183

WikiTranslate: Query Translation for Cross-Lingual Information Retrieval Using Only Wikipedia  

Science Journals Connector (OSTI)

This paper presents WikiTranslate, a system which performs query translation for cross-lingual information retrieval (CLIR) using only Wikipedia to obtain translations. Queries are mapped to Wikipedia concepts...

Dong Nguyen; Arnold Overwijk; Claudia Hauff

2009-01-01T23:59:59.000Z

184

A Genetic Algorithm for Load Balancing in Parallel Query Evaluation for Deductive Relational Data Bases  

Science Journals Connector (OSTI)

Datalog is a query language for deductive databases. This language allows to evaluate a query incrementally on a network of processes. The tuples flow among them in parallel in order to compute the solution to...

E. Alba; J. F. Aldana; J. M. Troya

1995-01-01T23:59:59.000Z

185

Dynamic LCA Queries on Trees # Richard Cole + Ramesh Hariharan #  

E-Print Network [OSTI]

Dynamic LCA Queries on Trees # Richard Cole + Ramesh Hariharan # Abstract We show how to maintain. The primary use of LCA computations in a su#x tree is to determine the longest common prefix of two substrings common ancestor of the corresponding nodes. The first constant time LCA computation algorithm was due

Cole, Richard

186

Complex Group-By Queries for XML C. Gokhale+  

E-Print Network [OSTI]

CDs, etc. Books are organized by Subject, e.g., physics, chemistry. For each book- termediate result of a query. The catalogue is heteroge- neous: it contains information about books, music, there is information on its Title, Author, Year, #Sold, Price, (publisher) Name, etc. Books may have multiple authors

Ng, Raymond T.

187

PET: Reducing Database Energy Cost via Query Optimization  

E-Print Network [OSTI]

the potential of energy saving. However, the state-of-art architec- ture of DBMS does not take energy usage the existence of and study the energy-saving potential of many energy-efficient query plans. The database increase of energy cost in database services [3, 5]. Techniques such as hard- ware power-model control

Tu, Yicheng

188

Active Query Forwarding in Sensor Networks Narayanan Sadagopan  

E-Print Network [OSTI]

, response latency and storage requirements. We show that with optimal parameter settings, depending on the update frequency, ACQUIRE obtains order of magnitude reduction over FBQ and potentially 60 to 85% energy days with a frequency of 1 measurement per hour") versus One-shot queries, which have a simple response

Krishnamachari, Bhaskar

189

WEB QUERY STRUCTURE: IMPLICATIONS FOR IR SYSTEM DESIGN  

E-Print Network [OSTI]

WEB QUERY STRUCTURE: IMPLICATIONS FOR IR SYSTEM DESIGN Bernard J. Jansen Computer Science Program Military Academy West Point, New York 10996 Please Cite: Jansen, B. J., Spink, A., & Pfaff, A. 2000. Web in the context of the Web (Jansen, Spink, & Saracevic, 2000; Jansen and Pooch (under review), Lawrence & Giles

Jansen, James

190

3-query locally decodable codes of subexponential length  

Science Journals Connector (OSTI)

Locally Decodable Codes (LDC) allow one to decode any particular symbol of the input message by making a constant number of queries to a codeword, even if a constant fraction of the codeword is damaged. In a recent work [Yek08] Yekhanin constructs a ... Keywords: PIR schemes, locally decodable codes, private information retrieval schemes

Klim Efremenko

2009-05-01T23:59:59.000Z

191

CAT: Correct Answers of Continuous Queries Using Triggers  

E-Print Network [OSTI]

down the speed between 4:30PM and 9:30PM. Tr1 enters that segment after 4:30PM, and its future portion, issued the query Q1, we have to re-evaluate the answer. Research partially supported by NSF grant EIA-000

Scheuermann, Peter

192

Assertion Absorption in Object Queries over Knowledge Bases  

E-Print Network [OSTI]

Assertion Absorption in Object Queries over Knowledge Bases Jiewen Wu, Alexander Hudek, David Toman contribute to this development by introducing a novel adaptation of bi- nary absorption for DL knowledge satisfaction problems in which consistency is assumed, and then revisit absorption in this new setting. To date

Waterloo, University of

193

A Comparative Study of Code Query Technologies Tiago L. Alves  

E-Print Network [OSTI]

A Comparative Study of Code Query Technologies Tiago L. Alves Jurriaan Hage Peter Rademaker t.alves@sig.eu Jurriaan Hage University of Utrecht, Netherlands jur@cs.uu.nl Peter Rademaker University of Utrecht, Netherlands peter.rademaker@gmail.com Abstract When analyzing software systems we

Utrecht, Universiteit

194

DATA CONCERN AWARE QUERYING FOR THE INTEGRATION OF DATA SERVICES  

E-Print Network [OSTI]

DATA CONCERN AWARE QUERYING FOR THE INTEGRATION OF DATA SERVICES Muhammad Intizar Ali, Reinhard,dustdar}@infosys.tuwien.ac.at Keywords: Data Services, Database as a Service, Data Services Integration, Data Concerns, XQuery. Abstract: There is an increasing trend for organizations to publish data over the web using data services. The published data

Dustdar, Schahram

195

Tools of the Job Queries, Reports, Resources Account Management  

E-Print Network [OSTI]

Tools of the Job ­ Queries, Reports, Resources Account Management The minimum required review trans detail, Ledger, grants award, and Invoice tables. The invoice tables are used by the dean's office of a grant or contract such as the chartstring, begin date, end date, sponsor, etc. The ledger data contains

196

Sequencing XML data and query twigs for fast pattern matching  

Science Journals Connector (OSTI)

We propose a new way of indexing XML documents and processing twig patterns in an XML database. Every XML document in the database can be transformed into a sequence of labels by prfer's method that constructs a one-to-one correspondence between ... Keywords: XML indexing, prfer sequences, twig query processing

Praveen Rao; Bongki Moon

2006-03-01T23:59:59.000Z

197

Type-based detection of XML query-update independence  

Science Journals Connector (OSTI)

This paper presents a novel static analysis technique to detect XML query-update independence, in the presence of a schema. Rather than types, our system infers chains of types. Each chain represents a path that can be traversed on a valid document ...

Nicole Bidoit-Tollu; Dario Colazzo; Federico Ulliana

2012-05-01T23:59:59.000Z

198

Scaling XML query processing: distribution, localization and pruning  

Science Journals Connector (OSTI)

Distributing data collections by fragmenting them is an effective way of improving the scalability of a database system. While the distribution of relational data is well understood, the unique characteristics of the XML data and query model present ... Keywords: Distributed, Localization, Pruning, XML

Patrick Kling; M. Tamer zsu; Khuzaima Daudjee

2011-10-01T23:59:59.000Z

199

WikiTranslate: query translation for cross-lingual information retrieval using only Wikipedia  

Science Journals Connector (OSTI)

This paper presents WikiTranslate, a system which performs query translation for cross-lingual information retrieval (CLIR) using only Wikipedia to obtain translations. Queries are mapped to Wikipedia concepts and the corresponding translations of these ... Keywords: Wikipedia, comparable corpus, cross-lingual information retrieval, query translation, word sense disambiguation

Dong Nguyen; Arnold Overwijk; Claudia Hauff; Dolf R. B. Trieschnigg; Djoerd Hiemstra; Franciska De Jong

2008-09-01T23:59:59.000Z

200

Automatic Reformulation of Children's Search Queries Maarten van Kalsbeek, Joost de Wit, Dolf Trieschnigg,  

E-Print Network [OSTI]

Terms Algorithms, Human Factors, Design Keywords Automatic Query Expansion, Search Behavior, 1 children may make. Most of the search engines offer only the possibility to enter a Boolean queryAutomatic Reformulation of Children's Search Queries Maarten van Kalsbeek, Joost de Wit, Dolf

Hiemstra, Djoerd

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

SEARCHING FOR MULTIMEDIA: AN ANALYSIS OF AUDIO, VIDEO, AND IMAGE WEB QUERIES  

E-Print Network [OSTI]

search engine. From this data set, terms were used to identify queries for audio, image, and video multimedia files by searching for file extensions and matching the filename to terms in the query (WittenSEARCHING FOR MULTIMEDIA: AN ANALYSIS OF AUDIO, VIDEO, AND IMAGE WEB QUERIES Bernard J. Jansen

Jansen, James

202

Query Processing and Inverted Indices in Shared-Nothing Text Document Information Retrieval Systems  

E-Print Network [OSTI]

Query Processing and Inverted Indices in Shared-Nothing Text Document Information Retrieval Systems by the organization of the inverted index. This paper compares the performance impact on query processing of various physical organizations for inverted lists. We present a new probabilistic model of the database and queries

Zimmerman, John

203

Publishing and Querying the Histories of Archived Relational Databases in XML Fusheng Wang Carlo Zaniolo  

E-Print Network [OSTI]

Publishing and Querying the Histories of Archived Relational Databases in XML Fusheng Wang Carlo queries on past content of database relations and their evo- lution. Indeed, using XML, the histories mappings from relations to XML that are most conducive to modeling and query- ing database histories

Zaniolo, Carlo

204

The Effects of Search Engines and Query Operators on Top Ranked Results Bernard J. Jansen  

E-Print Network [OSTI]

The Effects of Search Engines and Query Operators on Top Ranked Results Bernard J. Jansen School of the advanced query operators. Jansen (2000) examines the changes in results when different searching operators queries [3, 4, 8]. Jansen et al. [3] reports a Boolean operator usage of about 8%. Silverstein et al. [8

Jansen, James

205

Fuzzy Rough Set Based Web Query Expansion Martine De Cock and Chris Cornelis  

E-Print Network [OSTI]

Fuzzy Rough Set Based Web Query Expansion Martine De Cock and Chris Cornelis Fuzziness, Krijgslaan 281 (S9), 9000 Gent, Belgium {Martine.DeCock, Chris.Cornelis}@UGent.be Abstract Fuzzy rough set on average -- we focus on query ex- pansion, i.e. the process of adding related terms to the query. Rough set

Gent, Universiteit

206

ANDES: efficient evaluation of NOT-twig queries in relational databases  

Science Journals Connector (OSTI)

Despite a large body of work on XPath query processing in relational environment, systematic study of queries containing not-predicates have received little attention in the literature. Particularly, several xml supports of industrial-strength commercial ... Keywords: NOT-twig, Performance, Plan diagrams, Relational database, Twig evaluation tree, XML query processing, Xpath

Kheng Hong Soh; Ba Quan Truong; Sourav S. Bhowmick

2012-12-01T23:59:59.000Z

207

In-Route Nearest Neighbor Queries Jin Soung Yoo Shashi Shekhar  

E-Print Network [OSTI]

query [4, 14] (e.g., "find the nearest gas station to my hotel"). A variant to the point-NN query is a closest pair query between two point datasets [1, 7] (e.g., "find the pair of a gas station of any point on the line segments [26, 27] (e.g., "find all nearest gas stations on my route from

Shekhar, Shashi

208

SEEDEEP: A System for Exploring and Querying Scientific Deep Web Data Sources  

E-Print Network [OSTI]

SEEDEEP: A System for Exploring and Querying Scientific Deep Web Data Sources Fan Wang Gagan that are hidden behind query forms, thus forming what is re- ferred to as the deep web. In this paper, we propose SEEDEEP, a System for Exploring and quErying scientific DEEP web data sources. SEEDEEP is able

Agrawal, Gagan

209

Web Browser Interface (WBUI)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Browser Interface (WBUI) Browser Interface (WBUI) Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Web Browser Interface (WBUI) 1. Login Before you can access the server you must login using the user name that

210

Fig. 1. The conversational case retrieval process in CCBR CaseQuery := Case-Query-formalize(InitialProblemDescription);  

E-Print Network [OSTI]

Fig. 1. The conversational case retrieval process in CCBR CaseQuery := Case questions to ask the user in the conversational process. There are two ways to realize this task: one successfully probed in the troubleshooting domain [3], and in the selection of products or services in E

Aamodt, Agnar

211

Ultra Heavy Ion LET Determination with Solid State Nuclear Track Detectors  

Science Journals Connector (OSTI)

......Ion LET Determination with Solid State Nuclear Track Detectors C. Domingo C. Baixeras...such particles. If we know the linear energy transfer (LET) of these particles...mission will be exposed. Solid state nuclear track detector stacks can give us information......

C. Domingo; C. Baixeras; F. Fernndez; A. Vidal-Quadras

1990-12-01T23:59:59.000Z

212

Panel Interfaces: Fundamentals  

Science Journals Connector (OSTI)

This chapter describes the fundamentals of interfaces between graphics adapters (or graphics controllers) as signal sources and the input of display modules. We distinguish between analog and digital transmiss...

Dr. Karlheinz Blankenbach

2012-01-01T23:59:59.000Z

213

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

214

T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny  

Broader source: Energy.gov (indexed) [DOE]

1: Linux Kernel dns_resolver Key Processing Error Lets Local 1: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services March 7, 2011 - 3:05pm Addthis PROBLEM: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services. PLATFORM: Linux Kernel 2.6.37 and prior versions ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID:1025162 Latest Stable Kernel CVE-2011-1076 IMPACT ASSESSMENT: High Discussion: When a DNS resolver key is instantiated with an error indication, a local user can attempt to read the key to trigger a null pointer dereference and cause a kernel crash. A local user can cause the target system to crash.

215

U-044: HP Operations Agent and Performance Agent Lets Local Users Access a  

Broader source: Energy.gov (indexed) [DOE]

44: HP Operations Agent and Performance Agent Lets Local Users 44: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory November 23, 2011 - 8:00am Addthis PROBLEM: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory. PLATFORM: HP Operations Agent v11.00 and Performance Agent v4.73, v5.0 for AIX, HP-UX, Linux, and Solaris ABSTRACT: A local user can access a directory on the target system. reference LINKS: HP Security Bulletin Document ID: c03091656 CVE-2011-4160 SecurityTracker Alert ID: 1026345 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Operations Agent and Performance Agent. A local user can access data on the target system. A local user can gain

216

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

217

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

218

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

219

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

220

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

222

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

223

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

224

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

225

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Broader source: Energy.gov (indexed) [DOE]

6: HP StorageWorks File Migration Agent Buffer Overflows Let 6: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. 1. (ZDI-12-127) The specific flaw exists within the HsmCfgSvc.exe service

226

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Broader source: Energy.gov (indexed) [DOE]

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

227

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

228

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

229

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

230

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Broader source: Energy.gov (indexed) [DOE]

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability.

231

T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

69: Linux Kernel GFS2 Allocation Error Lets Local Users Deny 69: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service July 15, 2011 - 2:14am Addthis PROBLEM: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. PLATFORM: 2.6.39 and prior versions ABSTRACT: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service. references LINKS: SecurityTracker Alert ID: 1025776 Linux Kernel Updates CVE-2011-2689 IMPACT ASSESSMENT: Medium Discussion: A local user can invoke the gfs2_fallocate() function in 'fs/gfs2/file.c' in certain cases to allocate a non-blksize aligned amount, resulting in an error in subsequent code that requires blksize aligned offsets. Impact: A local user can cause denial of service conditions on the target system.

232

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

233

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

234

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

235

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

236

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

237

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

238

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

239

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

240

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

242

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

243

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Broader source: Energy.gov (indexed) [DOE]

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

244

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

245

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

246

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local  

Broader source: Energy.gov (indexed) [DOE]

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets 0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges August 8, 2012 - 7:00am Addthis PROBLEM: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) ABSTRACT: An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5. reference LINKS: Advisory: RHSA-2012:1149-1 SecurityTracker Alert ID: 1027356 Sudo Main Page Bugzilla 844442 CVE-2012-3440 IMPACT ASSESSMENT: Medium Discussion: A local user can exploit a temporary file symbolic link flaw in the %postun

247

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

248

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

249

V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain 3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges February 18, 2013 - 12:53am Addthis PROBLEM: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges PLATFORM: Symantec PGP Desktop 10.2.x,10.1.x,10.0.x Symantec Encryption Desktop 10.3.0 ABSTRACT: Two vulnerabilities were reported in Symantec PGP Desktop. REFERENCE LINKS: Symantec Security Advisory SYM13-001 Bugtraq ID: 57170 SecurityTracker Alert ID: 1028145 CVE-2012-4351 CVE-2012-4352 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger an integer overflow in 'pgpwded.sys' to execute arbitrary code on the target system [CVE-2012-4351]. On Windows XP and Windows Sever 2003, a local user can trigger a buffer

250

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

251

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

252

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

253

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Broader source: Energy.gov (indexed) [DOE]

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

254

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

255

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

256

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

257

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

258

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Broader source: Energy.gov (indexed) [DOE]

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

259

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

260

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Broader source: Energy.gov (indexed) [DOE]

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

262

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

263

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

264

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

265

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

266

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

267

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

268

Low-Dose/Dose-Rate Low-LET Radiation Protects Us from Cancer  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Dose/Dose-Rate Low-LET Radiation Protects Us from Cancer Dose/Dose-Rate Low-LET Radiation Protects Us from Cancer Bobby R. Scott, Ph.D. and Jennifer D. Di Palma Lovelace Respiratory Research Institute, 2425 Ridgecrest Drive SE Albuquerque, NM 87108 USA Life on earth evolved in a low-level ionizing radiation environment comprised of terrestrial radiation and cosmic rays. Today we all reside in an ionizing radiation environment comprised of both natural background radiation and radiation from human activities (e.g., Chernobyl accident). An evolutionary benefit of the interaction of low-level, low linear-energy-transfer (LET) ionizing radiation with mammalian life forms on earth is adapted protection. Adapted protection involves low-dose/dose-rate, low-LET radiation induced high-fidelity DNA repair in cooperation with normal apoptosis (presumed p53

269

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

270

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Broader source: Energy.gov (indexed) [DOE]

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

271

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

272

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

273

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

274

U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry PlayBook File Sharing Option Lets Local Users 9: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges December 13, 2011 - 6:00am Addthis PROBLEM: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges. PLATFORM: BlackBerry PlayBook tablet software version 1.0.8.4985 and earlier ABSTRACT: A local user can obtain root privileges on the target tablet system. reference LINKS: SecurityTracker Alert ID:1026386 Vulnerability Summary for CVE-2011-0291 BlackBerry Technical Solution Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A local user can obtain elevated privileges on the target system. On a tablet with File Sharing enabled and connected via USB to a system running BlackBerry

275

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Broader source: Energy.gov (indexed) [DOE]

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

276

U-095: HP Data Protector Media Operations Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: HP Data Protector Media Operations Lets Remote Users Execute 5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 - 1:33am Addthis PROBLEM: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code PLATFORM: Windows (2003, XP, 2008), HP Data Protector Media Operations version 6.11 and earlier ABSTRACT: Remote execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026626 HP Support Center Document ID: c03179046 CVE-2011-4791 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Data Protector Media Operations. A remote user can execute arbitrary code on the target system. Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Impact:

277

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

278

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

0: Apple Remote Desktop Encryption Failure Lets Remote Users 0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information August 21, 2012 - 7:00am Addthis PROBLEM: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Apple Remote Desktop after 3.5.1 and prior to 3.6.1 ABSTRACT: A remote user can monitor potentially sensitive information. reference LINKS: Apple.com Apple Article: HT5433 SecurityTracker Alert ID: 1027420 CVE-2012-0681 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apple Remote Desktop. When a user connects to a third-party VNC server with the 'Encrypt all network data' setting enabled, network data is not encrypted. A remote user monitoring the

279

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

280

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

282

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

283

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Broader source: Energy.gov (indexed) [DOE]

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

284

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

285

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

286

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

287

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

288

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

289

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

290

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

291

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

292

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

293

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

294

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

295

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

296

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

297

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

298

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

299

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

300

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

302

U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

7: HP MFP Digital Sending Software Lets Local Users Obtain 7: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information October 24, 2011 - 12:30pm Addthis PROBLEM: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information . PLATFORM: HP MFP Digital Sending Software v4.91.21 and all previous 4.9x versions ABSTRACT: A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information. reference LINKS: HP Advisory ID: c03052686 SecurityTracker Alert ID: 1026228 CVE-2011-3163 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP MFP Digital Sending Software running on Windows. The vulnerability could result in

303

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

304

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Broader source: Energy.gov (indexed) [DOE]

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

305

U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

36: Microsoft JScript and VBScript Engine Integer Overflow Lets 36: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code August 15, 2012 - 7:00am Addthis PROBLEM: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 5.8 ABSTRACT: Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target REFERENCE LINKS: technet.microsoft.com/en-us/security/bulletin/ms12-056 http://www.securitytracker.com/id/1027392 CVE-2012-2523 Impact assessment: Medium Discussion: Vulnerability was reported in Microsoft JScript and VBScript. A remote user can cause arbitrary code to be executed on the target user's system. A

306

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

307

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

308

V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Flash Plug-in Lets Remote Users Conduct 4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 - 12:56am Addthis PROBLEM: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028694 CVE-2013-2866 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted Flash content that, when loaded by the target user, will display the Flash settings in a transparent manner, which may allow the remote user to cause the target user to modify their Flash settings. This may allow the remote user to obtain potentially

309

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

310

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

311

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

312

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

313

T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges  

Broader source: Energy.gov (indexed) [DOE]

01: Windows Kernel win32k.sys Lets Local Users Gain Elevated 01: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges April 13, 2011 - 5:12am Addthis PROBLEM: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 1 and Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*, Windows Server 2008 for x64-based Systems

314

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

315

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

316

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

317

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Broader source: Energy.gov (indexed) [DOE]

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

318

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

319

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

320

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

322

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

323

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

324

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

325

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

326

V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe ColdFusion Lets Local Users Bypass Sandbox 5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: A vulnerability was reported in Adobe ColdFusion. REFERENCE LINKS: SecurityTracker Alert ID: 1027853 Adobe Vulnerability identifier: APSB12-26 CVE 2012-5675 IMPACT ASSESSMENT: High DISCUSSION: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This hotfix resolves a vulnerability which could result in a sandbox permissions violation in a shared hosting environment. Adobe recommends users update their product installation using

327

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

328

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

329

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Broader source: Energy.gov (indexed) [DOE]

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

330

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

331

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

332

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

333

V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take  

Broader source: Energy.gov (indexed) [DOE]

10: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote 10: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions October 25, 2012 - 6:00am Addthis PROBLEM: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions PLATFORM: 3COM, and H3C Routers & Switches Specific products and model numbers is provided in the vendor's advisory. ABSTRACT: A vulnerability was reported in 3Com, HP, and H3C Switches. REFERENCE LINKS: HP Support document ID: c03515685 SecurityTracker Alert ID: 1027694 CVE-2012-3268 IMPACT ASSESSMENT: High DISCUSSION: A remote user with knowledge of the SNMP public community string can access potentially sensitive data (e.g., user names, passwords) in the

334

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

335

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

336

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

337

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Attachmate Reflection Buffer Overflow in FTP Client Lets 3: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code November 22, 2011 - 8:00am Addthis PROBLEM: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code. PLATFORM: 14.1.1173 and prior versions The following product versions are affected: Reflection for HP version 14.x Reflection for UNIX and OpenVMS version 14.x Reflection for ReGIS Graphics version 14.x Reflection for IBM version 14.x Reflection X version 14.x ABSTRACT: A remote server can execute arbitrary code on the connected target system. reference LINKS: Security Updates and Reflection Attachmate Support Lifecycle Attachmate Downloads

338

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

339

U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets 7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code November 16, 2011 - 7:43am Addthis PROBLEM: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Kernel version 2.6.x ABSTRACT: A remote server can cause the target connected client to crash. reference LINKS: The Linux Kernel Archives CVE-2011-4131 SecurityTracker Alert ID: 1026324 Linux Kernel [PATCH 1/1] NFSv4 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in the Linux Kernel. A remote user can cause denial of service conditions. Impact: A remote server can return specially crafted data to the connected target

340

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

342

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

343

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

344

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

345

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

346

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

347

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Broader source: Energy.gov (indexed) [DOE]

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

348

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

349

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

350

V-009: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

09: Adobe Shockwave Player Buffer Overflows and Array Error Lets 09: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code V-009: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code October 24, 2012 - 6:00am Addthis PROBLEM: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Shockwave Player 11.6.7.637 and earlier versions for Windows and Macintosh ABSTRACT: Several vulnerabilities were reported in Adobe Shockwave. REFERENCE LINKS: Adobe Security bulletin SecurityTracker Alert ID: 1027692 CVE-2012-4172 CVE-2012-4173 CVE-2012-4174 CVE-2012-4175 CVE-2012-4176 CVE-2012-5273 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on

351

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

352

U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

4: Symantec LiveUpdate Administrator Lets Local Users Gain 4: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges June 19, 2012 - 7:00am Addthis PROBLEM: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privileges . PLATFORM: Version(s): 2.3 and prior versions Abstract: Users Gain Elevated Privileges reference LINKS: Vendor Advisory SecurityTracker Alert ID: 1027182 CVE-2012-0304 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Symantec LiveUpdate Administrator. A local user can obtain elevated privileges on the target system.The default installation of Symantec LiveUpdate Administrator installs files with full control privileges granted to the 'Everyone' group.A local user can exploit

353

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

354

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

355

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

356

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

357

T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges  

Broader source: Energy.gov (indexed) [DOE]

1: Red Hat system-config-firewall Lets Local Users Gain Root 1: Red Hat system-config-firewall Lets Local Users Gain Root Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges July 19, 2011 - 2:42pm Addthis PROBLEM: A vulnerability was reported in Red Hat system-config-firewall. A local user can obtain root privileges on the target system. PLATFORM Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat system-config-firewall Lets Local Users Gain Root Privileges reference LINKS: RHSA-2011:0953-1 SecurityTracker Alert ID: 1025793 CVE-2011-2520 Red hat Article ID: 11259 IMPACT ASSESSMENT: Medium Discussion: The system-config-firewall utility uses the Python pickle module in an

358

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

359

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

360

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

362

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

363

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

364

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

365

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

366

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers [EERE]

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

367

Stochastic modeling of the cell killing effect for low- and high-LET radiation  

E-Print Network [OSTI]

length distribution, with deterministic RMR models. For low LET radiation and at high dose rates the stochastic survival results agree well with the deterministic survival results. Also the stochastic model allows for non-linearity at low doses due...

Partouche, Julien

2005-02-17T23:59:59.000Z

368

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

369

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

EMC AutoStart Technical Info EMC Support Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code T-639:...

370

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

IMPACT: Denial of service via network SOLUTION: The vendor has issued a fix (7.5 Patch 1). Addthis Related Articles U-244: McAfee Email Gateway Lets Remote Users Bypass...

371

U-017: HP MFP Digital Sending Software Lets Local Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

vulnerability. HP MFP Digital Sending Software v4.20 can be downloaded from HP Driver, Patch, Security and Support Addthis Related Articles V-210: HP LaserJet Pro Printer Bug Lets...

372

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Broader source: Energy.gov (indexed) [DOE]

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

373

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A...

374

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

375

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Broader source: Energy.gov (indexed) [DOE]

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

376

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

377

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

0: HP-UX System Administration Manager Lets Local Users Gain 0: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

378

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

379

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

380

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

382

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

383

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

384

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

385

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

386

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

387

U-094: EMC Documentum Content Server Lets Local Administrative Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: EMC Documentum Content Server Lets Local Administrative 4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges February 2, 2012 - 9:15am Addthis PROBLEM: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges PLATFORM: EMC Documentum Content Server 6.0, 6.5, 6.6 ABSTRACT: EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. reference LINKS: SecurityTracker Alert ID: 1026624 EMC Resource Library CVE-2011-4144 bugtraq ESA-2012-009 IMPACT ASSESSMENT: Medium Discussion: EMC Documentum Content Server contains a security vulnerability that may allow a system administrator to elevate their or other users privileges to

388

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Broader source: Energy.gov (indexed) [DOE]

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

389

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

390

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Attachmate Reflection Buffer Overflow in FTP Client Lets 3: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code November 22, 2011 - 8:00am Addthis PROBLEM: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code. PLATFORM: 14.1.1173 and prior versions The following product versions are affected: Reflection for HP version 14.x Reflection for UNIX and OpenVMS version 14.x Reflection for ReGIS Graphics version 14.x Reflection for IBM version 14.x Reflection X version 14.x ABSTRACT: A remote server can execute arbitrary code on the connected target system. reference LINKS: Security Updates and Reflection Attachmate Support Lifecycle Attachmate Downloads

391

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

392

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

40: HP-UX System Administration Manager Lets Local Users Gain 40: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

393

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

394

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets 45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger a heap corruption error in 'vidplin.dll' and execute arbitrary code on the target system. The code will run with the

395

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

396

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

397

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

398

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

399

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Broader source: Energy.gov (indexed) [DOE]

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

400

Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1  

E-Print Network [OSTI]

Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1 and Tom K. There is a progressive increase in genomic instability, determined either by gene amplification or allelic imbalance

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...  

Broader source: Energy.gov (indexed) [DOE]

a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-114: RealPlayer MP4...

402

U-038: BIND 9 Resolver crashes after logging an error in query.c |  

Broader source: Energy.gov (indexed) [DOE]

8: BIND 9 Resolver crashes after logging an error in query.c 8: BIND 9 Resolver crashes after logging an error in query.c U-038: BIND 9 Resolver crashes after logging an error in query.c November 16, 2011 - 8:37am Addthis PROBLEM: BIND 9 Resolver crashes after logging an error in query.c. PLATFORM: Multiple version of BIND 9. Specific versions under investigation ABSTRACT: A remote server can cause the target connected client to crash. Organizations across the Internet are reporting crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crash after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions are reported as being affected, including all currently supported release versions of ISC BIND 9. ISC is actively investigating the root cause and

403

V-204: A specially crafted query can cause BIND to terminate abnormally |  

Broader source: Energy.gov (indexed) [DOE]

V-204: A specially crafted query can cause BIND to terminate V-204: A specially crafted query can cause BIND to terminate abnormally V-204: A specially crafted query can cause BIND to terminate abnormally July 27, 2013 - 4:35am Addthis PROBLEM: A specially crafted query that includes malformed rdata can cause named to terminate with an assertion failure while rejecting the malformed query. PLATFORM: BIND 9.7 ABSTRACT: A specially crafted query sent to a BIND nameserver can cause it to crash (terminate abnormally). REFERENCE LINKS: ISC Knowledge Base CVE-2013-4854 IMPACT ASSESSMENT: High DISCUSSION: BIND is an implementation of the Domain Name System (DNS) protocols. Authoritative and recursive servers are equally vulnerable. Intentional exploitation of this condition can cause a denial of service in all nameservers running affected versions of BIND 9. Access Control Lists do

404

Adaptive Join Query Processing in Data Grids: Exploring Relation Partial Replicas and Load Balancing  

Science Journals Connector (OSTI)

Query processing in data grids is a complex issue due to ... investigates the issues and proposes an adaptive, load-balanced join processing approach. Analytical and experimental...

Donghua Yang; Jianzhong Li; Hong Gao

2007-01-01T23:59:59.000Z

405

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

406

Interfacing to accelerator instrumentation  

SciTech Connect (OSTI)

As the sensory system for an accelerator, the beam instrumentation provides a tremendous amount of diagnostic information. Access to this information can vary from periodic spot checks by operators to high bandwidth data acquisition during studies. In this paper, example applications will illustrate the requirements on interfaces between the control system and the instrumentation hardware. A survey of the major accelerator facilities will identify the most popular interface standards. The impact of developments such as isochronous protocols and embedded digital signal processing will also be discussed.

Shea, T.J.

1995-12-31T23:59:59.000Z

407

Real time search on the web: Queries, topics, and economic value Bernard J. Jansen a,  

E-Print Network [OSTI]

examine aggregate usage of the search engine, including number of users, queries, and terms. We term interest in a topic and the polling nature of real time queries. Concerning search topics geographical affinity, pointing to a location-based aspect to real time search. In terms of economic value, we

Jansen, James

408

Particle swarm optimization with query-based learning for multi-objective power contract problem  

Science Journals Connector (OSTI)

Particle swarm optimization (PSO) is one of the most important research topics on swarm intelligence. Existing PSO techniques, however, still contain some significant disadvantages. In this paper, we present a new QBL-PSO algorithm that uses QBL (query-based ... Keywords: Multi-objective optimization, Particle swarm optimization, Power contract, Query-based learning

Ray-I Chang; Shu-Yu Lin; Yuhsin Hung

2012-02-01T23:59:59.000Z

409

Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications  

Science Journals Connector (OSTI)

......of applications, including smart battlefield, environment and...whole network into several small grids.) for query and data transmission...maintaining and recalculating the grid would be very high [31...important class of queries that can benefit from algorithms that are tailored......

Long Cheng; Yimin Chen; Canfeng Chen; Jian Ma; Lei Shu; Athanasios V. Vasilakos; Naixue Xiong

2010-12-01T23:59:59.000Z

410

Joint Video and Text Parsing for Understanding Events and Answering Queries  

E-Print Network [OSTI]

1 Joint Video and Text Parsing for Understanding Events and Answering Queries Kewei Tu, Meng Meng to process video and text jointly for understanding events and answering user queries. Our framework produces) in the video and text. The knowledge representation of our framework is based on a spatial-temporal-causal And

Zhu, Song Chun

411

Understanding Query Complexity and its Implications for Energy-Efficient Web Search Emily Bragg,1  

E-Print Network [OSTI]

Understanding Query Complexity and its Implications for Energy-Efficient Web Search Emily Bragg,1 the workload as a large, monolithic piece of software. But a workload is often comprised of many, diverse software tasks. For example, a web search engine executes many individual queries. There is a vast

Lee, Benjamin C.

412

A SpatioTemporal Placement Model for Caching Location Dependent Queries Anand Murugappan and Ling Liu  

E-Print Network [OSTI]

objects of the location queries are still ob- jects such as gas stations, restaurants, or moving objects is driving on the I85 North highway at 60 mph speed, and wants to find the nearest gas stations within certain range. If the query is asking for gas stations within 5 miles, then the spatial validity

Liu, Ling

413

Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks  

E-Print Network [OSTI]

Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks Yuzhen is of paramount importance. Energy-efficient routing trees built for in-network pro- cessing play a central role multiple routing trees in sensor networks for the evaluation of a class of aggre- gate queries including

Liang, Weifa

414

Spatial Querying of Imaging Mass Spectrometry Data for the Biochemical Characterization of Anatomical Regions in Tissue  

E-Print Network [OSTI]

Spatial Querying of Imaging Mass Spectrometry Data for the Biochemical Characterization tissue section. In this paper we develop methods that enable spatial querying of MSI data. The objective that adds spatial information to mass spectral biochemical analysis. It delivers insight into the spatial

415

Supporting retrieval of diverse biomedical data using evidence-aware queries  

Science Journals Connector (OSTI)

Though there have been many advances in providing access to linked and integrated biomedical data across repositories, developing methods which allow users to specify ambiguous and exploratory queries over disparate sources remains a challenge to extracting ... Keywords: Bioinformatics, Data diversity and provenance, Data integration, Database management, Information storage and retrieval, Ontology, Query language

Eithon Cadag; Peter Tarczy-Hornoch

2010-12-01T23:59:59.000Z

416

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks  

E-Print Network [OSTI]

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye and B. Sikdar a "Dynamic Query-tree Energy Balancing" (DQEB) protocol to dynamically adjust the tree structure and minimize networks. In [15] it has been shown that the minimum- energy broadcast tree problem is NP

Sikdar, Biplab

417

A LINGUISITICAL ANALYSIS OF WORLD WIDE WEB QUERIES Bernard J. Jansen  

E-Print Network [OSTI]

A LINGUISITICAL ANALYSIS OF WORLD WIDE WEB QUERIES Bernard J. Jansen Computer Science Program@exmail.usma.edu Please Cite: Jansen, B. J., Spink, A., & Pfaff, A. 2000. Linguistic Aspects of Web Queries. American. There is also a growing body of literature focusing on IR in the context of the Web (Croft, 1995; Jansen, Spink

Jansen, James

418

Distributed XML Repositories: Top-down Design and Transparent Query Processing  

E-Print Network [OSTI]

Distributed XML Repositories: Top-down Design and Transparent Query Processing Michael Gertz Jan over the Web. However, design and query processing models for distributed XML data have not yet been studied in detail. The goal of this paper is to study the design and management of distributed XML

Gertz, Michael

419

Performance of a distributed architecture for query processing on workstation clusters  

Science Journals Connector (OSTI)

A network of workstations (NOWs) is an attractive alternative to parallel database systems due to the cost advantage. In a typical database, client workstations (nodes) submit queries/transactions and receive responses from the database server. With ... Keywords: load sharing, networks of workstations, parallel database systems, parallel query processing, workstation clusters

Cyrus Soleimany; Sivarama P. Dandamudi

2003-05-01T23:59:59.000Z

420

QPIAD: Query Processing over Incomplete Autonomous Databases Hemal Khatri Jianchun Fan Yi Chen Subbarao Kambhampati  

E-Print Network [OSTI]

QPIAD: Query Processing over Incomplete Autonomous Databases Hemal Khatri Jianchun Fan Yi Chen.khatri,jcf,yi,rao}@asu.edu Abstract Incompleteness due to missing attribute values (aka "null values") is very common in autonomous missing attributes, even if they wind up being rel- evant to a user query. Ideally we would like

Chen, Yi

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Query Optimization as a Datalog Program Mengmeng Liu, Zachary G. Ives, and Boon Thau Loo  

E-Print Network [OSTI]

Query Optimization as a Datalog Program Mengmeng Liu, Zachary G. Ives, and Boon Thau Loo University is that of specifying the transformation rules and search process of a query optimizer [1]. In certain emerging domains universally understood than the languages used in transformational optimizers like those generated by Volcano

Loo, Boon Thau

422

Rethinking Query Processing for Energy Efficiency: Slowing Down to Win the Race  

E-Print Network [OSTI]

Rethinking Query Processing for Energy Efficiency: Slowing Down to Win the Race Willis Lang of an energy efficiency metric along with traditional performance metrics. This change is fueled by the growing, real, and urgent demand for energy-efficient database processing. Database query processing engines

Patel, Jignesh

423

GUIDAGE: A FAST AUDIO QUERY GUIDED ASSEMBLAGE Arshia Cont Shlomo Dubnov Gerard Assayag  

E-Print Network [OSTI]

GUIDAGE: A FAST AUDIO QUERY GUIDED ASSEMBLAGE Arshia Cont Shlomo Dubnov G´erard Assayag UCSD, Music for fast and auto- matic retrieval of factors of audio content in a large au- dio database based on user's audio query. The proposed method, unlike most existing systems, takes explicit con- siderations

Paris-Sud XI, Université de

424

Query Planning for Searching Inter-Dependent Deep-web Databases  

E-Print Network [OSTI]

Query Planning for Searching Inter-Dependent Deep-web Databases Fan Wang1 , Gagan Agrawal1 query forms, thus forming what is referred to as the deep web. It is de- sirable to have systems data retrieval from the deep web. However, such systems need to address the following challenges. First

Agrawal, Gagan

425

Query Planning for Searching Inter-dependent Deep-Web Databases  

E-Print Network [OSTI]

Query Planning for Searching Inter-dependent Deep-Web Databases Fan Wang1 , Gagan Agrawal1 query forms, thus forming what is referred to as the deep web. It is de- sirable to have systems data retrieval from the deep web. However, such systems need to address the following challenges. First

Jin, Ruoming

426

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

427

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

428

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

429

Solid-Solid Interfaces  

Science Journals Connector (OSTI)

... electron microscopy by G. Weatherley demonstrated how coherency could be lost by a variety of processes, such as the attraction of dislocations of suitable Burgers vectors from the matrix, these ... only in a number of well-established cases. He emphasized that a large number of interrelated factors was involved in the failure at interfaces in metals and it was not simply ...

A Correspondent

1968-04-13T23:59:59.000Z

430

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets 4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service May 17, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in Novell eDirectory. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HP/UX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user can cause denial of service conditions. reference LINKS: Novell eDirectory - LDAP-SSL SECURELIST.ORG SecurityFocus BugTrackID: 47858 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Novell eDirectory. A remote user can cause

431

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

432

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

433

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

434

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

435

T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

1: VMware vmrun Utility Lets Local Users Gain Elevated 1: VMware vmrun Utility Lets Local Users Gain Elevated Privileges T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges March 30, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware. A local user can obtain elevated privileges on the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. reference LINKS: VM Advisory ID:VMSA-2011-0006 Secunia Advisory: SA43885 SecurityTracker Alert ID: 1025270 CVE-2011-1126 VM Post IMPACT ASSESSMENT: Medium Discussion: A security issue has been reported in VMware Workstation, which can be exploited by malicious, local users to gain potentially escalated

436

LET is a Critical Factor in Accelerating Development of Lymphoma in  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is a Critical Factor in Accelerating Development of Lymphoma in is a Critical Factor in Accelerating Development of Lymphoma in Irradiated Bax Transgenic C57/B6 Mice James Jacobus University of Iowa Abstract A major risk during exposure to both low and high linear energy transfer (LET) radiation is the development of lymphoma. Both occupationally and therapeutically exposed individuals are at risk for lymphoma development induced by low LET radiation, while deeply penetrating high LET radiation is a significant concern for those planning and undertaking long duration missions in space where a high degree of uncertainty on actual risk exists due to the lack of epidemiologically-based datasets. The C57/B6 transgenic mice used in this study have been genetically engineered to possess either one (Bax 1) or two (Bax 38/1) extra copies of

437

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

3: Windows Remote Desktop Client DLL Loading Error Lets Remote 3: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code March 9, 2011 - 3:05pm Addthis PROBLEM: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution. PLATFORM: Remote Desktop Connection Client Version(s): 5.2, 6.0, 6.1, 7.0 ABSTRACT: A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Microsoft Security Bulletin MS11-017 SecurityTracker Alert ID:1025172 CVE-2011-0029 IMPACT ASSESSMENT: Moderate Discussion: A remote user can create a specially crafted DLL file on a remote share (e.g., WebDAV, SMB share). When the target user opens a valid Remote

438

INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

INFOGRAPHIC: Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of solar energy systems in the United States. Learn more about what the Energy Department is doing to lower soft costs and increase deployment of solar energy systems. | Infographic by SunShot Learn how soft costs are contributing to the price of solar energy systems in the United States. Learn more about what the Energy Department is doing to lower soft costs and increase deployment of solar energy systems. | Infographic by SunShot Addthis Related Articles Soft costs now account for more than 60% of the total price of installing residential solar energy systems. View the full infographic to learn more.

439

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

440

V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5: Cisco Mobility Services Engine Configuration Error Lets 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an unauthenticated, remote attacker to connect to a database replication port anonymously via Secure Sockets Layer (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to the misconfiguration of the Oracle SSL service. An attacker could exploit this vulnerability by connecting to an

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

442

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

443

V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets  

Broader source: Energy.gov (indexed) [DOE]

1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support 1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information October 26, 2012 - 6:00am Addthis PROBLEM: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Software version: 6.2.3, 6.2.3.1 ABSTRACT: A vulnerability was reported in IBM Tivoli Monitoring. REFERENCE LINKS: IBM Support Document: 1614003 IBM Support Portal SecurityTracker Alert ID: 1027692 IMPACT ASSESSMENT: High DISCUSSION: A remote user may be able to conduct HTTP TRACE and HTTP TRACK attacks to access sensitive information from the HTTP headers.

444

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

445

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

446

V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

0: VLC Media Player Buffer Overflow in HTML Subtitle Parser 0: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code January 2, 2013 - 1:00am Addthis PROBLEM: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code PLATFORM: VLC Media Player 2.0.4, possibly earlier versions ABSTRACT: Some vulnerabilities have been reported in VLC Media Player REFERENCE LINKS: SecurityTracker Alert ID: 1027929 Secunia Advisory SA51692 IMPACT ASSESSMENT: Medium DISCUSSION: Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to errors when parsing HTML subtitles in

447

U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of  

Broader source: Energy.gov (indexed) [DOE]

91: cURL Lets Remote Users Decrypt SSL/TLS Traffic 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows

448

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

449

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the  

Broader source: Energy.gov (indexed) [DOE]

48: Avaya IP Office Manager TFTP Server Lets Remote Users 48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Avaya IP Office Manager. A remote user can view files on the target system. PLATFORM: Versions 5.0.x - 6.1.x ABSTRACT: The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. reference LINKS: ASA-2011-156 SecurityTracker Alert ID: 1025664 Secunia Advisory: SA43884 Avaya Support IMPACT ASSESSMENT: Medium Discussion: Avaya IP Office Manager is an application for viewing and editing an IP Office system's configuration. It can be used to securely connect to and

450

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

451

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

452

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

453

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

454

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

455

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

456

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

457

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

458

U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets  

Broader source: Energy.gov (indexed) [DOE]

3: libvirt virTypedParameterArrayClear() Memory Access Error 3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service August 24, 2012 - 7:00am Addthis PROBLEM: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service PLATFORM: Version(s): 0.9.13 and prior ABSTRACT: A vulnerability was reported in libvirt. reference LINKS: libvirt SecurityTracker Alert ID: 1027437 Secunia Advisory SA50118 Bugtraq ID: 54748 CVE-2012-3445 IMPACT ASSESSMENT: Medium Discussion A remote user can send a specially crafted RPC call with the number of parameters set to zero to libvirtd to trigger a memory access error in virTypedParameterArrayClear() and cause the target service to crash. Impact:

459

LET and gender are critical factors in accelerating development of lymphoma  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and gender are critical factors in accelerating development of lymphoma and gender are critical factors in accelerating development of lymphoma in irradiated Bax transgenic C57Bl/6 mice James A. Jacobus The University of Iowa Abstract Humans are exposed to sparsely ionizing (low LET) radiation from environmental sources and radiotherapy as well as densely ionizing (high LET) radiation during radiotherapy and from cosmic radiations, particularly during space travel. To test the hypothesis that defects in mitochondrial metabolism leading to increased ROS levels could alter responses to radiation, lymphoma-prone C57Bl/6 mice over expressing the mitochondrial-acting Bax protein in thymocytes (which demonstrate increased steady-state levels of superoxide; FRBM 44: 1677-1686, 2008) were irradiated with both low and high LET radiations and the onset of tumor

460

V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: RealPlayer Buffer Overflow and Memory Corruption Error Let 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028953 RealNetworks Security Bulletin CVE-2013-4973 CVE-2013-4974 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted RMP file that, when loaded by the target user, will trigger a stack overflow and execute arbitrary code on the target system. A remote user can create a specially crafted RealMedia file that, when

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

462

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Buffer Overflows and Memory Corruption 8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code November 7, 2012 - 6:00am Addthis PROBLEM: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.4.402.287 and prior for Windows and OS X; 11.2.202.243 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-24 SecurityTracker Alert ID: 1027730 CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Adobe Flash Player. A remote user

463

V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7: VMware Workstation and Player vmware-mount Command Flaw Lets 7: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges August 26, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation and Player on Debian-based systems PLATFORM: VMware Workstation 8.x, 9.x and Player 4.x, 5.x ABSTRACT: VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command REFERENCE LINKS: Security Tracker Alert ID 1028948 VMware Security Advisory VMSA-2013-0010 CVE-2013-1662 IMPACT ASSESSMENT: Medium DISCUSSION: A local malicious user may exploit this vulnerability to escalate their privileges to root on the host OS. The issue is present when Workstation or

464

T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Rational System Architect ActiveBar ActiveX Control Lets 5: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code May 4, 2011 - 7:15am Addthis PROBLEM: A vulnerability was reported in IBM Rational System Architect. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: IBM Rational System 11.4 and prior versions ABSTRACT: There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect. reference LINKS: IBM Advisory: 21497689 SecurityTracker Alert ID: 1025464 CVE-2011-1207 Secunia Advisory: SA43399 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted HTML that, when loaded by the

465

V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

0: VLC Media Player Buffer Overflow in HTML Subtitle Parser 0: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code January 2, 2013 - 1:00am Addthis PROBLEM: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code PLATFORM: VLC Media Player 2.0.4, possibly earlier versions ABSTRACT: Some vulnerabilities have been reported in VLC Media Player REFERENCE LINKS: SecurityTracker Alert ID: 1027929 Secunia Advisory SA51692 IMPACT ASSESSMENT: Medium DISCUSSION: Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to errors when parsing HTML subtitles in

466

T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS  

Broader source: Energy.gov (indexed) [DOE]

21: Citrix XenServer Lets Local Administrative Users on the 21: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 - 3:00pm Addthis PROBLEM: A vulnerability was reported in Citrix XenServer. A local administrative user on the guest operating system can cause denial of service conditions. PLATFORM: Citrix XenServer 5.6 Feature Pack 1 and prior ABSTRACT: A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor. reference LINKS: Document ID: CTX129208 SecurityTracker Alert ID: 1025524 Document ID: CTX129103 Document ID: CTX129102 Document ID: CTX128844 Document ID: CTX129101 Document ID: CTX129100 Citrix Support IMPACT ASSESSMENT Medium Discussion:

467

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

468

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

469

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

470

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Broader source: Energy.gov (indexed) [DOE]

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

471

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

472

Let's Keep Talking: Women in STEM Tweet Up | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Let's Keep Talking: Women in STEM Tweet Up Let's Keep Talking: Women in STEM Tweet Up Let's Keep Talking: Women in STEM Tweet Up April 11, 2012 - 2:37pm Addthis The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department file photo The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department file photo Gloria B. Smith Deputy Director, Office of Diversity & Inclusion We recently held a Tweet Up about women in science, technology, engineering, and mathematics (STEM). During the event, experts in STEM wrote more than 1,500 tweets as part of a conversation about the challenges

473

T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

664: Apache Santuario Buffer Overflow Lets Remote Users Deny 664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service July 8, 2011 - 12:32pm Addthis PROBLEM: A vulnerability was reported in Apache Santuario. A remote user can cause denial of service conditions. PLATFORM: Prior to 1.6.1 - Apache Santuario XML Security for C++ library versions prior to V1.6.1 ABSTRACT: A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. reference LINKS: SecurityTracker Alert ID: 1025755 Bugzilla: 719698: CVE-2011-2516 xml-security-c The Apache Software Foundation - CVE-2011-2516

474

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

475

U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets  

Broader source: Energy.gov (indexed) [DOE]

8: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference 8: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges March 19, 2012 - 7:00am Addthis PROBLEM: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges PLATFORM: ESX 4.0, 4.1; ESXi 4.0, 4.1, 5.0 ABSTRACT: A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system. reference LINKS: Secunia Advisory SA48378 SecurityTracker Alert ID: 1026818 CVE-2010-0405 IMPACT ASSESSMENT: Medium Discussion: A local user on a guest operating system can trigger a buffer overflow or null pointer dereference in the display drivers to execute arbitrary code

476

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

477

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

478

INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

INFOGRAPHIC: Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of solar energy systems in the United States. Learn more about what the Energy Department is doing to lower soft costs and increase deployment of solar energy systems. | Infographic by SunShot Learn how soft costs are contributing to the price of solar energy systems in the United States. Learn more about what the Energy Department is doing to lower soft costs and increase deployment of solar energy systems. | Infographic by SunShot Addthis Related Articles Soft costs now account for more than 60% of the total price of installing residential solar energy systems. View the full infographic to learn more.

479

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Broader source: Energy.gov (indexed) [DOE]

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

480

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

Note: This page contains sample records for the topic "query interface lets" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let  

Broader source: Energy.gov (indexed) [DOE]

14: Cisco Prime Data Center Network Manager JBoss RMI Services 14: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands November 1, 2012 - 6:00am Addthis PROBLEM: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands PLATFORM: All Cisco Prime Data Center Network Manager releases prior to release 6.1(1), for both the Microsoft Windows and Linux platforms, are affected by this vulnerability. ABSTRACT: A vulnerability was reported in Cisco Prime Data Center Network Manager. REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20121031-dcnm SecurityTracker Alert ID: 1027712 CVE-2012-5417 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability exists because JBoss Application Server Remote Method

482

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

483

V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

2: Samba smbd CPU Processing Loop Lets Remote Users Deny 2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba PLATFORM: Samba 3.0.x - 4.0.7 ABSTRACT: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection REFERENCE LINKS: Secunia Advisory SA54436 Samba Security Release CVE-2013-4124 IMPACT ASSESSMENT: Medium DISCUSSION: A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This

484

Low Dose Radiation Research Program: Using a Low LET Electron Microbeam to  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Using a Low LET Electron Microbeam to Investigate Non-Targeted Using a Low LET Electron Microbeam to Investigate Non-Targeted Effects of Low Dose Radiation Authors: William F. Morgan1 and Marianne B. Sowa2 Institutions: 1Radiation Oncology Research Laboratory, University of Maryland, Baltimore, Maryland; 2Chemical Structure and Dynamics, Pacific Northwest National Laboratory, Richland Washington We have recently installed a low-linear energy transfer (LET) electron microbeam that generates energetic electrons to mimic radiation damage from gamma- and x-ray sources. It has been designed such that high-energy electrons deposit energy in a pre-selected subset of cells, leaving neighboring cells unirradiated (Figure 1). In this way it is possible to examine non-targeted effects associated with low dose radiation exposure,

485

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

486

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

487

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

488

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

489

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

490

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

491

T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users  

Broader source: Energy.gov (indexed) [DOE]

583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local 583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information March 18, 2011 - 5:15pm Addthis PROBLEM: A vulnerability was reported in the Linux Kernel. A local user can obtain information from kernel memory. PLATFORM: Version(s): 2.4.x, 2.6.x ABSTRACT: A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. reference LINKS: http://www.securitytracker.com/id/1025225 CVE-2011-1163 http://www.kernel.org/ IMPACT ASSESSMENT: Moderate Discussion: A local user can create a storage device with specially crafted OSF

492

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

493

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

494

T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets  

Broader source: Energy.gov (indexed) [DOE]

95: Avaya Aura Application Server Buffer Overflow in 95: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code August 17, 2011 - 3:23pm Addthis PROBLEM: A vulnerability was reported in Avaya Aura Application Server (Nortel Media Application Server). PLATFORM: Avaya Aura Application Server 5300 version(s): 1.0, 2.0 ABSTRACT: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code. reference LINKS: Avaya Advisory: 100146108 Security Tracker Alert ID: 1025942 IMPACT ASSESSMENT: Medium Discussion: A flaw was found in one of the Media Application Server listening processes. If a remote attacker was able to successfully establish a

495

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

496

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

497

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

498

Low Dose Radiation Research Program: Using a Low LET Electron Microbeam to  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a Low LET Electron Microbeam to Investigate Non-Targeted Effects of a Low LET Electron Microbeam to Investigate Non-Targeted Effects of Low Dose Radiation William F. Morgan Radiation Oncology Research Laboratory, Pacific Northwest National Laboratory Why this Project? To examine genomic instability and bystander effects as non-targeted effects associated with low dose radiation exposure. Project Goals To provides a robust, reliable, highly sensitive assay for detecting delayed events occurring in cells exposed to low doses of ionizing radiation. Experimental Approach To mimic radiation damage from gamma and x-ray sources, a low-LET electron microbeam that generates energetic electrons has been designed such that high-energy electrons deposit energy in a pre-selected subset of cells leaving neighboring cells unirradiated. Using a novel green fluorescence gene (GFP) reporter assay, a high through

499

Mechanisms Underlying Cellular Responses to Low Doses/Low LET Ionizing Radiation in Primary Haemopoietic Cells.  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mechanisms Underlying Cellular Responses to Low Doses/Low LET Ionizing Radiation Mechanisms Underlying Cellular Responses to Low Doses/Low LET Ionizing Radiation in Primary Haemopoietic Cells. Munira Kadhim 1 , Stefania Militi 1 , Debbie Bowler 1 , Denise Macdonald 1 and Kevin Prise 2 1 Radiation and Genome Stability Unit, MRC, Harwell, Didcot, Oxon, OX11 0RD, UK 2 Gray Cancer Institute ,PO Box 100, Mount Vernon Hospital, Northwood, HA6 2JR, UK Because the human population is genetically heterogeneous, it is important to understand the role that heterogeneity may play in radiation response. Exposure to ionizing radiation can lead to a suite of changes, including increased mutation rate, delayed reproductive cell death, and delayed chromosomal aberrations, all of which are manifestations of the complex genomic instability (GI) phenotype. Following exposure to either high LET

500

T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed  

Broader source: Energy.gov (indexed) [DOE]

53: Linux Kernel sigqueueinfo() Process Lets Local Users Send 53: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM: Userland should be able to trust the pid and uid of the sender of a signal if the si_code is SI_TKILL. PLATFORM: Version(s): prior to 2.6.38 ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. reference LINKS: OSVDB ID: 71652 SecurityTracker Alert ID: 1025690 Linux Update CVE-2011-1182 Linux Reference 1 Linux Reference 2 IMPACT ASSESSMENT: High Discussion: A local user with the ability to send signals to a process can spoof the uid and pid of the sending process via the sigqueueinfo() system call.